Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Pocatello

Region: Idaho

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 134.50.2.159
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 56192
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;134.50.2.159.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2024121001 1800 900 604800 86400

;; Query time: 70 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Dec 11 09:36:28 CST 2024
;; MSG SIZE  rcvd: 105
Host info
Host 159.2.50.134.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 159.2.50.134.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
218.92.0.202 attackbotsspam
Jan 31 14:14:53 MK-Soft-Root1 sshd[16232]: Failed password for root from 218.92.0.202 port 45649 ssh2
Jan 31 14:14:56 MK-Soft-Root1 sshd[16232]: Failed password for root from 218.92.0.202 port 45649 ssh2
...
2020-01-31 21:54:13
103.68.11.25 attack
Unauthorized connection attempt from IP address 103.68.11.25 on Port 445(SMB)
2020-01-31 21:32:58
222.186.169.192 attackspam
Jan 31 08:53:00 NPSTNNYC01T sshd[8421]: Failed password for root from 222.186.169.192 port 16764 ssh2
Jan 31 08:53:13 NPSTNNYC01T sshd[8421]: error: maximum authentication attempts exceeded for root from 222.186.169.192 port 16764 ssh2 [preauth]
Jan 31 08:53:20 NPSTNNYC01T sshd[8425]: Failed password for root from 222.186.169.192 port 29840 ssh2
...
2020-01-31 21:59:51
192.241.175.48 attackspam
Unauthorized connection attempt detected from IP address 192.241.175.48 to port 2220 [J]
2020-01-31 21:30:20
178.78.208.160 attack
TCP Port Scanning
2020-01-31 21:57:22
3.211.74.210 attack
20 attempts against mh-ssh on echoip
2020-01-31 21:57:52
118.172.204.235 attackspambots
Unauthorized connection attempt from IP address 118.172.204.235 on Port 445(SMB)
2020-01-31 21:24:06
139.199.219.235 attack
Automatic report - SSH Brute-Force Attack
2020-01-31 21:32:37
187.162.40.141 attackbots
Automatic report - Port Scan Attack
2020-01-31 21:56:17
3.122.114.11 attackspam
MultiHost/MultiPort Probe, Scan, Hack -
2020-01-31 21:48:11
114.67.239.215 attackspambots
Jan 28 20:40:18 nexus sshd[4140]: Invalid user dasharathi from 114.67.239.215 port 50969
Jan 28 20:40:18 nexus sshd[4140]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=114.67.239.215
Jan 28 20:40:19 nexus sshd[4140]: Failed password for invalid user dasharathi from 114.67.239.215 port 50969 ssh2
Jan 28 20:40:20 nexus sshd[4140]: Received disconnect from 114.67.239.215 port 50969:11: Bye Bye [preauth]
Jan 28 20:40:20 nexus sshd[4140]: Disconnected from 114.67.239.215 port 50969 [preauth]


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=114.67.239.215
2020-01-31 21:35:28
190.15.210.81 attackbotsspam
Email address rejected
2020-01-31 21:25:10
180.242.183.47 attack
Attempt to attack host OS, exploiting network vulnerabilities, on 31-01-2020 08:45:18.
2020-01-31 21:34:34
1.64.203.220 attackspam
Unauthorized connection attempt detected from IP address 1.64.203.220 to port 5555 [J]
2020-01-31 21:58:21
122.51.223.20 attackspam
Invalid user shaswati from 122.51.223.20 port 34580
2020-01-31 21:21:18

Recently Reported IPs

46.42.92.150 124.24.1.10 199.132.109.208 4.87.128.204
248.66.247.12 68.66.104.54 22.108.203.34 58.97.7.70
186.94.150.97 72.232.200.122 217.244.69.244 201.155.12.39
179.180.207.197 68.111.112.220 122.108.88.56 172.31.8.165
143.238.67.209 203.60.203.6 151.17.154.180 117.84.59.246