Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Canada

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 131.138.50.65
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 27115
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;131.138.50.65.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025020901 1800 900 604800 86400

;; Query time: 17 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Feb 10 06:49:58 CST 2025
;; MSG SIZE  rcvd: 106
Host info
Host 65.50.138.131.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 65.50.138.131.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
47.104.183.126 attack
2020-01-06T22:27:13Z - RDP login failed multiple times. (47.104.183.126)
2020-01-07 06:46:43
54.39.145.123 attackbotsspam
Unauthorized connection attempt detected from IP address 54.39.145.123 to port 2220 [J]
2020-01-07 06:42:34
222.186.52.189 attack
Unauthorized connection attempt detected from IP address 222.186.52.189 to port 22 [T]
2020-01-07 06:39:04
124.122.253.37 attack
Automatic report - Port Scan Attack
2020-01-07 06:37:09
156.67.250.205 attackspambots
2020-01-06T17:31:40.6493031495-001 sshd[39339]: Invalid user administrativo from 156.67.250.205 port 44280
2020-01-06T17:31:40.6579721495-001 sshd[39339]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=156.67.250.205
2020-01-06T17:31:40.6493031495-001 sshd[39339]: Invalid user administrativo from 156.67.250.205 port 44280
2020-01-06T17:31:42.6589441495-001 sshd[39339]: Failed password for invalid user administrativo from 156.67.250.205 port 44280 ssh2
2020-01-06T17:35:08.1127301495-001 sshd[39433]: Invalid user dggim from 156.67.250.205 port 45056
2020-01-06T17:35:08.1160701495-001 sshd[39433]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=156.67.250.205
2020-01-06T17:35:08.1127301495-001 sshd[39433]: Invalid user dggim from 156.67.250.205 port 45056
2020-01-06T17:35:10.0062081495-001 sshd[39433]: Failed password for invalid user dggim from 156.67.250.205 port 45056 ssh2
2020-01-06T17:38:33.4317451495-00
...
2020-01-07 07:03:53
187.141.135.181 attackspambots
Unauthorized connection attempt detected from IP address 187.141.135.181 to port 2220 [J]
2020-01-07 06:52:34
124.239.216.233 attackbots
Jan  6 23:51:40 legacy sshd[22987]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=124.239.216.233
Jan  6 23:51:42 legacy sshd[22987]: Failed password for invalid user ts2 from 124.239.216.233 port 39342 ssh2
Jan  6 23:55:03 legacy sshd[23249]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=124.239.216.233
...
2020-01-07 06:58:25
149.56.141.193 attackbotsspam
Unauthorized connection attempt detected from IP address 149.56.141.193 to port 2220 [J]
2020-01-07 07:03:31
216.10.249.73 attackspambots
Jan  6 20:51:04 ws25vmsma01 sshd[50450]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=216.10.249.73
Jan  6 20:51:07 ws25vmsma01 sshd[50450]: Failed password for invalid user zach from 216.10.249.73 port 47104 ssh2
...
2020-01-07 06:53:34
223.97.201.24 attack
firewall-block, port(s): 23/tcp
2020-01-07 06:37:42
45.136.109.87 attackbotsspam
01/06/2020-16:49:29.740456 45.136.109.87 Protocol: 6 ET SCAN NMAP -sS window 1024
2020-01-07 06:43:49
149.56.101.239 attackbotsspam
149.56.101.239 - - \[06/Jan/2020:21:51:08 +0100\] "POST /wp-login.php HTTP/1.0" 200 6699 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0"
149.56.101.239 - - \[06/Jan/2020:21:51:10 +0100\] "POST /wp-login.php HTTP/1.0" 200 6499 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0"
149.56.101.239 - - \[06/Jan/2020:21:51:11 +0100\] "POST /wp-login.php HTTP/1.0" 200 6515 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0"
2020-01-07 06:50:38
130.176.13.86 attackbots
Automatic report generated by Wazuh
2020-01-07 06:48:13
50.236.62.30 attackbots
$f2bV_matches
2020-01-07 06:49:31
159.203.201.177 attack
8047/tcp 70/tcp 8945/tcp...
[2019-11-07/2020-01-06]39pkt,32pt.(tcp),1pt.(udp)
2020-01-07 07:00:50

Recently Reported IPs

214.195.75.185 172.212.114.51 212.173.119.140 69.120.6.132
29.53.102.31 235.2.73.182 8.152.126.191 217.148.185.18
144.162.31.219 224.79.95.80 177.19.104.96 206.12.251.8
188.241.125.96 229.142.195.190 5.254.136.110 130.8.35.50
86.7.251.60 123.7.55.226 32.95.100.233 185.186.102.207