Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: San Antonio

Region: Texas

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 136.50.41.45
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 57425
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;136.50.41.45.			IN	A

;; AUTHORITY SECTION:
.			93	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022022802 1800 900 604800 86400

;; Query time: 18 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Mar 01 12:35:17 CST 2022
;; MSG SIZE  rcvd: 105
Host info
45.41.50.136.in-addr.arpa domain name pointer 136-50-41-45.googlefiber.net.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
45.41.50.136.in-addr.arpa	name = 136-50-41-45.googlefiber.net.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
106.12.9.10 attackspambots
SSH Brute Force
2020-04-05 15:21:21
165.227.197.15 attack
Automatic report - XMLRPC Attack
2020-04-05 15:25:09
51.91.157.114 attack
Apr  4 21:28:24 web9 sshd\[31647\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.91.157.114  user=root
Apr  4 21:28:26 web9 sshd\[31647\]: Failed password for root from 51.91.157.114 port 37170 ssh2
Apr  4 21:32:23 web9 sshd\[32249\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.91.157.114  user=root
Apr  4 21:32:25 web9 sshd\[32249\]: Failed password for root from 51.91.157.114 port 46804 ssh2
Apr  4 21:36:16 web9 sshd\[523\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.91.157.114  user=root
2020-04-05 15:52:50
118.89.189.176 attack
Invalid user caroline from 118.89.189.176 port 51434
2020-04-05 15:34:30
104.248.149.130 attackspam
$f2bV_matches
2020-04-05 16:07:57
41.216.167.107 attackbots
scan r
2020-04-05 16:04:35
146.88.240.4 attack
[portscan] udp/1900 [ssdp]
[portscan] udp/3702 [ws-discovery]
[portscan] udp/5353 [mdns]
[scan/connect: 4 time(s)]
*(RWIN=-)(04051002)
2020-04-05 15:23:45
125.227.197.123 attackspambots
$f2bV_matches
2020-04-05 15:46:39
139.59.65.8 attackspam
Automatic report - XMLRPC Attack
2020-04-05 15:28:05
80.211.52.58 attack
Apr  5 09:20:52 server sshd[4138]: Failed password for root from 80.211.52.58 port 57746 ssh2
Apr  5 09:25:39 server sshd[5580]: Failed password for root from 80.211.52.58 port 36194 ssh2
Apr  5 09:28:02 server sshd[6153]: Failed password for root from 80.211.52.58 port 38534 ssh2
2020-04-05 15:52:36
157.230.176.155 attackbots
Automatic report BANNED IP
2020-04-05 15:31:21
70.122.247.113 attackbots
<6 unauthorized SSH connections
2020-04-05 15:35:06
159.203.82.104 attackspambots
Apr  5 07:14:19 [HOSTNAME] sshd[12583]: User **removed** from 159.203.82.104 not allowed because not listed in AllowUsers
Apr  5 07:14:19 [HOSTNAME] sshd[12583]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.203.82.104  user=**removed**
Apr  5 07:14:20 [HOSTNAME] sshd[12583]: Failed password for invalid user **removed** from 159.203.82.104 port 40651 ssh2
...
2020-04-05 16:03:45
132.148.129.180 attackspambots
SSH Brute-Force reported by Fail2Ban
2020-04-05 15:37:05
5.156.83.25 attackspam
Brute force attack against VPN service
2020-04-05 15:23:15

Recently Reported IPs

160.122.18.204 249.144.93.54 240.136.77.21 62.249.117.245
231.133.95.160 156.224.39.21 90.118.35.250 146.118.221.189
63.198.4.107 200.92.40.159 167.124.68.96 176.248.232.110
230.38.238.27 89.87.65.190 103.28.119.150 254.198.131.61
128.116.216.111 242.11.212.96 9.162.140.241 95.195.120.209