Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: None

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 136.201.161.50
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 5039
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;136.201.161.50.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025021901 1800 900 604800 86400

;; Query time: 17 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Feb 20 04:00:14 CST 2025
;; MSG SIZE  rcvd: 107
Host info
Host 50.161.201.136.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 50.161.201.136.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
222.186.173.201 attackbots
Jun 16 01:51:52 vps46666688 sshd[24928]: Failed password for root from 222.186.173.201 port 41178 ssh2
Jun 16 01:52:05 vps46666688 sshd[24928]: error: maximum authentication attempts exceeded for root from 222.186.173.201 port 41178 ssh2 [preauth]
...
2020-06-16 13:02:04
58.69.251.165 attack
Brute forcing RDP port 3389
2020-06-16 12:55:51
218.92.0.172 attack
2020-06-16T07:57:01.601779afi-git.jinr.ru sshd[22142]: Failed password for root from 218.92.0.172 port 55775 ssh2
2020-06-16T07:57:05.100070afi-git.jinr.ru sshd[22142]: Failed password for root from 218.92.0.172 port 55775 ssh2
2020-06-16T07:57:08.482976afi-git.jinr.ru sshd[22142]: Failed password for root from 218.92.0.172 port 55775 ssh2
2020-06-16T07:57:08.483140afi-git.jinr.ru sshd[22142]: error: maximum authentication attempts exceeded for root from 218.92.0.172 port 55775 ssh2 [preauth]
2020-06-16T07:57:08.483154afi-git.jinr.ru sshd[22142]: Disconnecting: Too many authentication failures [preauth]
...
2020-06-16 13:12:02
65.49.20.69 attackbots
Unauthorized connection attempt detected from IP address 65.49.20.69 to port 22
2020-06-16 13:18:24
222.186.175.212 attackspambots
Brute force attempt
2020-06-16 13:33:51
119.157.71.63 attack
Automatic report - XMLRPC Attack
2020-06-16 13:12:25
89.248.167.131 attack
Hit honeypot r.
2020-06-16 13:20:58
180.242.116.116 attackbots
20/6/15@23:53:58: FAIL: Alarm-Network address from=180.242.116.116
...
2020-06-16 13:20:37
198.27.80.123 attackbotsspam
198.27.80.123 - - [16/Jun/2020:07:00:18 +0200] "POST /wp-login.php HTTP/1.1" 200 5338 "-" "Mozilla/5.0 (Windows NT 10.0; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/46.0.2490.80 Safari/537.36"
198.27.80.123 - - [16/Jun/2020:07:01:55 +0200] "POST /wp-login.php HTTP/1.1" 200 5358 "-" "Mozilla/5.0 (Windows NT 10.0; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/46.0.2490.80 Safari/537.36"
198.27.80.123 - - [16/Jun/2020:07:03:25 +0200] "POST /wp-login.php HTTP/1.1" 200 5338 "-" "Mozilla/5.0 (Windows NT 10.0; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/46.0.2490.80 Safari/537.36"
198.27.80.123 - - [16/Jun/2020:07:04:29 +0200] "POST /wp-login.php HTTP/1.1" 200 5338 "-" "Mozilla/5.0 (Windows NT 10.0; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/46.0.2490.80 Safari/537.36"
198.27.80.123 - - [16/Jun/2020:07:05:45 +0200] "POST /wp-login.php HTTP/1.1" 200 5338 "-" "Mozilla/5.0 (Windows NT 10.0; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/46.0.2490.80 Safar
...
2020-06-16 13:23:16
198.12.227.90 attackspambots
REQUESTED PAGE: /wp-login.php
2020-06-16 13:18:55
162.243.136.95 attackspambots
20/6/15@23:54:21: FAIL: IoT-SSH address from=162.243.136.95
...
2020-06-16 13:02:54
192.227.223.181 attackspam
2020-06-16T05:54:31.194285h2857900.stratoserver.net sshd[29752]: Invalid user fake from 192.227.223.181 port 34752
2020-06-16T05:54:33.036290h2857900.stratoserver.net sshd[29754]: Invalid user admin from 192.227.223.181 port 35767
...
2020-06-16 12:53:04
113.0.42.52 attackspambots
Jun 16 03:54:19 powerpi2 sshd[4967]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=113.0.42.52
Jun 16 03:54:19 powerpi2 sshd[4967]: Invalid user train5 from 113.0.42.52 port 50747
Jun 16 03:54:20 powerpi2 sshd[4967]: Failed password for invalid user train5 from 113.0.42.52 port 50747 ssh2
...
2020-06-16 13:03:22
103.104.119.158 attack
2020-06-16T05:32:24.426790  sshd[16409]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.104.119.158  user=root
2020-06-16T05:32:26.537113  sshd[16409]: Failed password for root from 103.104.119.158 port 50874 ssh2
2020-06-16T05:53:56.123056  sshd[16817]: Invalid user webhost from 103.104.119.158 port 35848
...
2020-06-16 13:24:11
148.71.44.11 attackspam
2020-06-16T04:59:09.629457shield sshd\[4489\]: Invalid user rj from 148.71.44.11 port 51372
2020-06-16T04:59:09.633378shield sshd\[4489\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=11.44.71.148.rev.vodafone.pt
2020-06-16T04:59:11.639426shield sshd\[4489\]: Failed password for invalid user rj from 148.71.44.11 port 51372 ssh2
2020-06-16T05:02:33.994335shield sshd\[5042\]: Invalid user fuq from 148.71.44.11 port 51568
2020-06-16T05:02:33.999323shield sshd\[5042\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=11.44.71.148.rev.vodafone.pt
2020-06-16 13:10:07

Recently Reported IPs

143.240.195.36 165.6.118.22 97.176.91.61 125.184.138.227
136.225.163.218 47.185.206.145 101.81.2.223 21.185.45.119
217.14.132.99 173.128.155.88 76.247.225.205 26.151.245.87
245.171.48.242 201.240.13.120 236.247.147.137 117.198.114.227
71.163.40.73 226.207.99.223 74.108.207.22 13.118.250.72