Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States of America (the)

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 136.9.50.121
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 18654
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;136.9.50.121.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025021200 1800 900 604800 86400

;; Query time: 12 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Feb 12 20:54:43 CST 2025
;; MSG SIZE  rcvd: 105
Host info
Host 121.50.9.136.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 121.50.9.136.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
182.74.25.246 attack
invalid user jc from 182.74.25.246 port 21091 ssh2
2020-07-19 15:53:02
192.241.233.101 attackbots
 TCP (SYN) 192.241.233.101:45501 -> port 9999, len 44
2020-07-19 15:41:04
211.159.186.152 attackbots
SSH Brute-force
2020-07-19 15:29:38
192.241.222.224 attackbots
Fail2Ban Ban Triggered
2020-07-19 15:48:40
1.235.192.218 attack
$f2bV_matches
2020-07-19 15:34:50
165.22.54.19 attack
invalid user sales from 165.22.54.19 port 33034 ssh2
2020-07-19 15:41:43
106.13.37.164 attackspam
Failed password for invalid user admin from 106.13.37.164 port 46168 ssh2
2020-07-19 15:37:56
51.77.111.30 attackbotsspam
Fail2Ban
2020-07-19 15:23:52
54.38.75.44 attackbots
Web Server Attack
2020-07-19 15:32:29
94.102.49.65 attack
Jul 19 06:34:14 WHD8 dovecot: pop3-login: Aborted login \(auth failed, 1 attempts in 2 secs\): user=\, method=PLAIN, rip=94.102.49.65, lip=10.64.89.208, session=\
Jul 19 06:41:21 WHD8 dovecot: pop3-login: Aborted login \(auth failed, 1 attempts in 2 secs\): user=\, method=PLAIN, rip=94.102.49.65, lip=10.64.89.208, session=\
Jul 19 07:05:50 WHD8 dovecot: pop3-login: Aborted login \(auth failed, 1 attempts in 2 secs\): user=\, method=PLAIN, rip=94.102.49.65, lip=10.64.89.208, session=\
Jul 19 07:12:57 WHD8 dovecot: pop3-login: Aborted login \(auth failed, 1 attempts in 2 secs\): user=\, method=PLAIN, rip=94.102.49.65, lip=10.64.89.208, session=\
Jul 19 07:37:27 WHD8 dovecot: pop3-login: Aborted login \(auth failed, 1 attempts in 2 secs\): user=\, method=PLAIN, rip=94.102.49.65, lip=10.64.89.208, s
...
2020-07-19 15:55:04
115.79.139.176 attack
 TCP (SYN) 115.79.139.176:38962 -> port 23, len 44
2020-07-19 15:24:17
144.34.130.211 attackbotsspam
2020-07-19T07:50:10.247292shield sshd\[20215\]: Invalid user med from 144.34.130.211 port 39224
2020-07-19T07:50:10.256143shield sshd\[20215\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=144.34.130.211.16clouds.com
2020-07-19T07:50:12.354422shield sshd\[20215\]: Failed password for invalid user med from 144.34.130.211 port 39224 ssh2
2020-07-19T07:56:03.652738shield sshd\[21516\]: Invalid user freeside from 144.34.130.211 port 56882
2020-07-19T07:56:03.661428shield sshd\[21516\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=144.34.130.211.16clouds.com
2020-07-19 15:56:43
142.93.101.148 attackspambots
Jul 19 08:08:00 electroncash sshd[48203]: Invalid user user2 from 142.93.101.148 port 34434
Jul 19 08:08:00 electroncash sshd[48203]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.101.148 
Jul 19 08:08:00 electroncash sshd[48203]: Invalid user user2 from 142.93.101.148 port 34434
Jul 19 08:08:02 electroncash sshd[48203]: Failed password for invalid user user2 from 142.93.101.148 port 34434 ssh2
Jul 19 08:12:06 electroncash sshd[49315]: Invalid user pp from 142.93.101.148 port 49666
...
2020-07-19 15:44:02
69.116.62.74 attackspambots
Jul 19 04:19:31 IngegnereFirenze sshd[18862]: Failed password for invalid user lingqi from 69.116.62.74 port 45515 ssh2
...
2020-07-19 15:23:29
201.187.99.212 attack
WEB remote command
2020-07-19 15:25:00

Recently Reported IPs

153.243.31.245 228.173.87.106 80.204.178.170 133.215.251.103
167.154.0.231 247.180.215.104 80.176.141.144 22.170.88.83
203.113.224.52 165.2.27.215 132.57.124.65 83.64.158.125
235.47.92.68 235.23.4.51 155.140.73.154 108.235.178.255
88.38.17.219 155.189.45.178 62.38.11.205 208.124.5.96