Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Seoul

Region: Seoul

Country: South Korea

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 152.70.39.50
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 10246
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;152.70.39.50.			IN	A

;; AUTHORITY SECTION:
.			448	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2021092102 1800 900 604800 86400

;; Query time: 25 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Sep 22 06:34:17 CST 2021
;; MSG SIZE  rcvd: 105
Host info
Host 50.39.70.152.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 50.39.70.152.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
211.220.27.191 attackspam
Sep  9 03:33:29 ArkNodeAT sshd\[22763\]: Invalid user web from 211.220.27.191
Sep  9 03:33:29 ArkNodeAT sshd\[22763\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=211.220.27.191
Sep  9 03:33:30 ArkNodeAT sshd\[22763\]: Failed password for invalid user web from 211.220.27.191 port 34862 ssh2
2019-09-09 10:34:38
195.58.123.109 attackspambots
Sep  8 15:26:22 lcdev sshd\[12590\]: Invalid user oracle from 195.58.123.109
Sep  8 15:26:22 lcdev sshd\[12590\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=host.195.58.123.109.bitcom.se
Sep  8 15:26:23 lcdev sshd\[12590\]: Failed password for invalid user oracle from 195.58.123.109 port 40216 ssh2
Sep  8 15:31:57 lcdev sshd\[13081\]: Invalid user temporal from 195.58.123.109
Sep  8 15:31:57 lcdev sshd\[13081\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=host.195.58.123.109.bitcom.se
2019-09-09 10:24:53
51.38.186.200 attackbots
Sep  8 16:22:11 web1 sshd\[22403\]: Invalid user vnc from 51.38.186.200
Sep  8 16:22:11 web1 sshd\[22403\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.38.186.200
Sep  8 16:22:13 web1 sshd\[22403\]: Failed password for invalid user vnc from 51.38.186.200 port 49896 ssh2
Sep  8 16:27:37 web1 sshd\[22897\]: Invalid user sammy from 51.38.186.200
Sep  8 16:27:38 web1 sshd\[22897\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.38.186.200
2019-09-09 10:41:53
187.162.28.67 attack
Automatic report - Port Scan Attack
2019-09-09 10:11:35
158.69.192.200 attack
2019-08-12T16:02:41.639809wiz-ks3 sshd[31615]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=200.ip-158-69-192.net  user=root
2019-08-12T16:02:43.534643wiz-ks3 sshd[31615]: Failed password for root from 158.69.192.200 port 43628 ssh2
2019-08-12T16:02:45.447541wiz-ks3 sshd[31615]: Failed password for root from 158.69.192.200 port 43628 ssh2
2019-08-12T16:02:41.639809wiz-ks3 sshd[31615]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=200.ip-158-69-192.net  user=root
2019-08-12T16:02:43.534643wiz-ks3 sshd[31615]: Failed password for root from 158.69.192.200 port 43628 ssh2
2019-08-12T16:02:45.447541wiz-ks3 sshd[31615]: Failed password for root from 158.69.192.200 port 43628 ssh2
2019-08-12T16:02:41.639809wiz-ks3 sshd[31615]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=200.ip-158-69-192.net  user=root
2019-08-12T16:02:43.534643wiz-ks3 sshd[31615]: Failed password for root from 158.69.192.
2019-09-09 10:17:10
200.29.32.143 attackspambots
Sep  8 22:05:23 ny01 sshd[3009]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=200.29.32.143
Sep  8 22:05:25 ny01 sshd[3009]: Failed password for invalid user m1necraft from 200.29.32.143 port 41572 ssh2
Sep  8 22:11:41 ny01 sshd[4016]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=200.29.32.143
2019-09-09 10:24:17
103.56.113.69 attack
Sep  9 03:52:16 xxxxxxx0 sshd[19778]: Invalid user steam from 103.56.113.69 port 44585
Sep  9 03:52:16 xxxxxxx0 sshd[19778]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.56.113.69
Sep  9 03:52:19 xxxxxxx0 sshd[19778]: Failed password for invalid user steam from 103.56.113.69 port 44585 ssh2
Sep  9 04:06:16 xxxxxxx0 sshd[14794]: Invalid user minecraft from 103.56.113.69 port 46835
Sep  9 04:06:16 xxxxxxx0 sshd[14794]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.56.113.69

........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=103.56.113.69
2019-09-09 10:35:42
92.222.71.125 attackspambots
Sep  8 16:08:08 web1 sshd\[20999\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=92.222.71.125  user=root
Sep  8 16:08:10 web1 sshd\[20999\]: Failed password for root from 92.222.71.125 port 34430 ssh2
Sep  8 16:13:58 web1 sshd\[21582\]: Invalid user vnc from 92.222.71.125
Sep  8 16:13:58 web1 sshd\[21582\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=92.222.71.125
Sep  8 16:14:00 web1 sshd\[21582\]: Failed password for invalid user vnc from 92.222.71.125 port 39678 ssh2
2019-09-09 10:25:46
111.230.54.226 attackspam
Sep  8 23:40:57 MK-Soft-VM5 sshd\[5883\]: Invalid user 123456 from 111.230.54.226 port 35188
Sep  8 23:40:57 MK-Soft-VM5 sshd\[5883\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.230.54.226
Sep  8 23:40:59 MK-Soft-VM5 sshd\[5883\]: Failed password for invalid user 123456 from 111.230.54.226 port 35188 ssh2
...
2019-09-09 10:13:30
114.32.27.145 attackbotsspam
23/tcp 23/tcp 23/tcp...
[2019-08-16/09-08]12pkt,1pt.(tcp)
2019-09-09 10:19:43
81.177.33.4 attackspam
WordPress wp-login brute force :: 81.177.33.4 0.140 BYPASS [09/Sep/2019:11:31:05  1000] [censored_1] "POST /wp-login.php HTTP/1.1" 200 3972 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
2019-09-09 09:58:36
91.92.207.220 attackspambots
Automatic report - Port Scan Attack
2019-09-09 10:31:08
218.98.40.136 attack
SSH Brute Force, server-1 sshd[27298]: Failed password for root from 218.98.40.136 port 15958 ssh2
2019-09-09 09:44:07
111.230.234.206 attackbotsspam
Sep  9 01:02:23 dedicated sshd[32282]: Invalid user demo from 111.230.234.206 port 35684
2019-09-09 10:33:35
118.122.124.88 attack
Unauthorised access (Sep  8) SRC=118.122.124.88 LEN=40 TOS=0x10 PREC=0x40 TTL=237 ID=56161 TCP DPT=445 WINDOW=1024 SYN
2019-09-09 09:49:37

Recently Reported IPs

210.167.78.53 210.167.78.50 66.231.187.101 165.22.36.156
171.117.195.43 117.136.91.189 183.184.156.253 103.49.247.224
139.59.73.146 51.11.231.236 51.11.231.2 109.38.43.44
184.167.131.48 113.160.112.138 172.70.122.100 24.8.149.244
80.66.76.22 121.30.235.202 223.207.234.44 158.69.162.143