Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States of America (the)

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 147.85.130.50
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 46001
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;147.85.130.50.			IN	A

;; AUTHORITY SECTION:
.			29	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025020600 1800 900 604800 86400

;; Query time: 11 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 07 00:24:29 CST 2025
;; MSG SIZE  rcvd: 106
Host info
Host 50.130.85.147.in-addr.arpa not found: 2(SERVFAIL)
Nslookup info:
;; Got SERVFAIL reply from 183.60.83.19, trying next server
Server:		183.60.82.98
Address:	183.60.82.98#53

** server can't find 50.130.85.147.in-addr.arpa: SERVFAIL

Related IP info:
Related comments:
IP Type Details Datetime
45.7.228.12 attackbots
Jul 29 04:36:09 dev0-dcde-rnet sshd[15840]: Failed password for root from 45.7.228.12 port 51883 ssh2
Jul 29 04:41:42 dev0-dcde-rnet sshd[15849]: Failed password for root from 45.7.228.12 port 48643 ssh2
2019-07-29 11:55:21
179.108.245.233 attackspambots
failed_logins
2019-07-29 11:56:20
211.151.95.139 attack
SSH Brute Force
2019-07-29 11:48:26
106.52.202.59 attackspam
Jul 29 03:28:02 mail sshd\[28433\]: Failed password for invalid user qwaszx!@ from 106.52.202.59 port 42482 ssh2
Jul 29 03:43:49 mail sshd\[28774\]: Invalid user ln5203344\*\*\* from 106.52.202.59 port 49632
...
2019-07-29 12:23:48
222.114.73.159 attackbots
Automatic report - Port Scan Attack
2019-07-29 11:55:44
35.234.44.28 attackbots
Jul 28 21:05:26 wildwolf wplogin[3350]: 35.234.44.28 prometheus.ngo [2019-07-28 21:05:26+0000] "POST /wp-login.php HTTP/1.1" "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0" "admin" "admin2018!"
Jul 28 21:05:33 wildwolf wplogin[3350]: 35.234.44.28 prometheus.ngo [2019-07-28 21:05:33+0000] "POST /wp-login.php HTTP/1.1" "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0" "alina" "alina2018!"
Jul 28 21:05:39 wildwolf wplogin[1350]: 35.234.44.28 prometheus.ngo [2019-07-28 21:05:39+0000] "POST /wp-login.php HTTP/1.1" "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0" "burko" "burko2018!"
Jul 28 21:05:43 wildwolf wplogin[376]: 35.234.44.28 prometheus.ngo [2019-07-28 21:05:43+0000] "POST /wp-login.php HTTP/1.1" "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0" "pavlo" "pavlo2018!"
Jul 28 21:05:46 wildwolf wplogin[6381]: 35.234.44.28 prometheus.ngo [2........
------------------------------
2019-07-29 11:32:48
188.165.255.8 attack
Jul 28 22:20:18 localhost sshd\[128849\]: Invalid user hello2015 from 188.165.255.8 port 35126
Jul 28 22:20:18 localhost sshd\[128849\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.165.255.8
Jul 28 22:20:20 localhost sshd\[128849\]: Failed password for invalid user hello2015 from 188.165.255.8 port 35126 ssh2
Jul 28 22:24:09 localhost sshd\[128987\]: Invalid user daho from 188.165.255.8 port 56750
Jul 28 22:24:09 localhost sshd\[128987\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.165.255.8
...
2019-07-29 12:26:26
36.72.218.155 attackspambots
SSH Bruteforce
2019-07-29 11:46:44
206.189.206.155 attack
$f2bV_matches
2019-07-29 11:39:06
189.6.191.14 attack
Automatic report - Port Scan Attack
2019-07-29 11:22:46
37.187.90.37 attackbotsspam
Jul 29 04:36:33 SilenceServices sshd[26836]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=37.187.90.37
Jul 29 04:36:34 SilenceServices sshd[26836]: Failed password for invalid user lovelly from 37.187.90.37 port 52850 ssh2
Jul 29 04:40:51 SilenceServices sshd[29349]: Failed password for root from 37.187.90.37 port 50171 ssh2
2019-07-29 11:19:05
54.38.242.80 attackspam
Jul 29 03:38:31 minden010 sshd[23518]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=54.38.242.80
Jul 29 03:38:33 minden010 sshd[23518]: Failed password for invalid user ykv from 54.38.242.80 port 49134 ssh2
Jul 29 03:42:34 minden010 sshd[25080]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=54.38.242.80
...
2019-07-29 11:46:07
50.207.12.103 attackspam
Jul 29 04:43:15 h2177944 sshd\[9394\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=50.207.12.103  user=root
Jul 29 04:43:16 h2177944 sshd\[9394\]: Failed password for root from 50.207.12.103 port 38798 ssh2
Jul 29 04:47:45 h2177944 sshd\[9473\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=50.207.12.103  user=root
Jul 29 04:47:47 h2177944 sshd\[9473\]: Failed password for root from 50.207.12.103 port 34184 ssh2
...
2019-07-29 12:31:08
92.63.194.26 attackbots
Jul 29 05:30:56 debian64 sshd\[11732\]: Invalid user admin from 92.63.194.26 port 52530
Jul 29 05:30:56 debian64 sshd\[11732\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=92.63.194.26
Jul 29 05:30:57 debian64 sshd\[11732\]: Failed password for invalid user admin from 92.63.194.26 port 52530 ssh2
...
2019-07-29 11:40:13
73.239.74.11 attackbotsspam
Jul 29 01:11:23 localhost sshd\[9875\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=73.239.74.11  user=root
Jul 29 01:11:25 localhost sshd\[9875\]: Failed password for root from 73.239.74.11 port 42162 ssh2
Jul 29 01:16:01 localhost sshd\[10116\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=73.239.74.11  user=root
Jul 29 01:16:02 localhost sshd\[10116\]: Failed password for root from 73.239.74.11 port 35844 ssh2
Jul 29 01:20:30 localhost sshd\[10290\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=73.239.74.11  user=root
...
2019-07-29 11:53:50

Recently Reported IPs

144.110.83.23 116.164.1.171 248.174.22.7 213.215.239.113
114.215.173.133 157.3.116.55 89.198.214.247 76.24.157.170
192.227.9.204 227.120.243.92 145.215.43.194 22.145.87.123
91.156.182.228 151.92.164.135 9.131.100.193 13.253.16.253
41.204.63.13 250.60.175.139 94.140.179.8 246.80.171.7