Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: China

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 120.45.64.50
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 29874
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;120.45.64.50.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025020302 1800 900 604800 86400

;; Query time: 13 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Feb 04 12:51:28 CST 2025
;; MSG SIZE  rcvd: 105
Host info
Host 50.64.45.120.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 50.64.45.120.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
198.20.103.242 attackbotsspam
Unauthorized connection attempt detected from IP address 198.20.103.242 to port 9943
2020-06-17 15:35:16
125.91.124.125 attackspam
Invalid user zhang from 125.91.124.125 port 58501
2020-06-17 16:06:41
58.87.120.53 attackbots
2020-06-17T03:46:40.757823dmca.cloudsearch.cf sshd[8347]: Invalid user radu from 58.87.120.53 port 35742
2020-06-17T03:46:40.763165dmca.cloudsearch.cf sshd[8347]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=58.87.120.53
2020-06-17T03:46:40.757823dmca.cloudsearch.cf sshd[8347]: Invalid user radu from 58.87.120.53 port 35742
2020-06-17T03:46:41.934296dmca.cloudsearch.cf sshd[8347]: Failed password for invalid user radu from 58.87.120.53 port 35742 ssh2
2020-06-17T03:49:43.931240dmca.cloudsearch.cf sshd[8577]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=58.87.120.53  user=root
2020-06-17T03:49:45.894872dmca.cloudsearch.cf sshd[8577]: Failed password for root from 58.87.120.53 port 42320 ssh2
2020-06-17T03:52:33.927541dmca.cloudsearch.cf sshd[8789]: Invalid user amine from 58.87.120.53 port 48886
...
2020-06-17 15:49:07
186.4.251.107 attackbots
port
2020-06-17 15:45:29
111.68.98.152 attack
Jun 17 10:02:58 sso sshd[11022]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.68.98.152
Jun 17 10:03:00 sso sshd[11022]: Failed password for invalid user ftp from 111.68.98.152 port 57762 ssh2
...
2020-06-17 16:07:10
106.12.175.218 attack
2020-06-17T09:52:22.486263  sshd[23911]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.175.218  user=root
2020-06-17T09:52:24.478751  sshd[23911]: Failed password for root from 106.12.175.218 port 55052 ssh2
2020-06-17T10:01:39.506480  sshd[24183]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.175.218  user=root
2020-06-17T10:01:41.633467  sshd[24183]: Failed password for root from 106.12.175.218 port 35316 ssh2
...
2020-06-17 16:03:12
95.85.9.94 attackbotsspam
Invalid user gts from 95.85.9.94 port 41798
2020-06-17 16:08:40
49.88.112.77 attackspambots
Jun 17 10:34:25 pkdns2 sshd\[30076\]: Failed password for root from 49.88.112.77 port 11858 ssh2Jun 17 10:35:06 pkdns2 sshd\[30082\]: Failed password for root from 49.88.112.77 port 36699 ssh2Jun 17 10:35:08 pkdns2 sshd\[30082\]: Failed password for root from 49.88.112.77 port 36699 ssh2Jun 17 10:35:10 pkdns2 sshd\[30082\]: Failed password for root from 49.88.112.77 port 36699 ssh2Jun 17 10:35:45 pkdns2 sshd\[30156\]: Failed password for root from 49.88.112.77 port 16735 ssh2Jun 17 10:35:47 pkdns2 sshd\[30156\]: Failed password for root from 49.88.112.77 port 16735 ssh2Jun 17 10:35:49 pkdns2 sshd\[30156\]: Failed password for root from 49.88.112.77 port 16735 ssh2
...
2020-06-17 15:50:44
222.221.248.242 attackbotsspam
2020-06-17T06:53:12.562143vps751288.ovh.net sshd\[1398\]: Invalid user suporte from 222.221.248.242 port 37886
2020-06-17T06:53:12.569573vps751288.ovh.net sshd\[1398\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.221.248.242
2020-06-17T06:53:14.106498vps751288.ovh.net sshd\[1398\]: Failed password for invalid user suporte from 222.221.248.242 port 37886 ssh2
2020-06-17T06:55:05.866082vps751288.ovh.net sshd\[1417\]: Invalid user am from 222.221.248.242 port 60510
2020-06-17T06:55:05.876780vps751288.ovh.net sshd\[1417\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.221.248.242
2020-06-17 15:37:39
167.71.216.20 attackspambots
$f2bV_matches
2020-06-17 16:12:40
180.96.62.247 attackbots
Jun 17 06:48:49 ift sshd\[31829\]: Invalid user csgoserver from 180.96.62.247Jun 17 06:48:51 ift sshd\[31829\]: Failed password for invalid user csgoserver from 180.96.62.247 port 43440 ssh2Jun 17 06:50:45 ift sshd\[32308\]: Invalid user coq from 180.96.62.247Jun 17 06:50:47 ift sshd\[32308\]: Failed password for invalid user coq from 180.96.62.247 port 56781 ssh2Jun 17 06:52:36 ift sshd\[32558\]: Invalid user webmaster from 180.96.62.247
...
2020-06-17 15:47:29
41.208.68.4 attackspambots
Jun 17 08:52:45 vmd48417 sshd[32437]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=41.208.68.4
2020-06-17 16:03:43
54.37.75.210 attack
Jun 17 09:46:11 ArkNodeAT sshd\[18420\]: Invalid user zjb from 54.37.75.210
Jun 17 09:46:11 ArkNodeAT sshd\[18420\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=54.37.75.210
Jun 17 09:46:13 ArkNodeAT sshd\[18420\]: Failed password for invalid user zjb from 54.37.75.210 port 56918 ssh2
2020-06-17 15:52:15
202.45.144.9 attack
Invalid user atendimento from 202.45.144.9 port 39083
2020-06-17 15:39:45
13.95.211.158 attackspam
Invalid user wordpress from 13.95.211.158 port 40580
2020-06-17 15:55:06

Recently Reported IPs

154.106.140.243 169.11.108.5 162.235.144.18 74.145.249.215
242.94.168.86 155.202.123.104 55.3.75.3 71.24.211.217
254.210.233.85 196.175.163.132 153.52.186.174 249.129.111.38
196.207.127.245 226.206.205.157 250.238.249.137 166.142.79.103
30.28.105.96 140.225.224.56 175.11.255.48 63.42.157.89