Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Bengaluru

Region: Karnataka

Country: India

Internet Service Provider: Reliance

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 157.50.112.195
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 15892
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;157.50.112.195.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025020600 1800 900 604800 86400

;; Query time: 36 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Feb 06 14:56:53 CST 2025
;; MSG SIZE  rcvd: 107
Host info
b'Host 195.112.50.157.in-addr.arpa not found: 2(SERVFAIL)
'
Nslookup info:
server can't find 157.50.112.195.in-addr.arpa: SERVFAIL
Related IP info:
Related comments:
IP Type Details Datetime
94.124.96.133 attackbots
Unauthorized connection attempt detected from IP address 94.124.96.133 to port 8000
2020-05-31 21:07:11
197.214.112.126 attack
Unauthorized connection attempt detected from IP address 197.214.112.126 to port 23
2020-05-31 21:28:31
45.170.174.31 attack
Unauthorized connection attempt detected from IP address 45.170.174.31 to port 2323
2020-05-31 21:18:47
74.92.248.110 attackbots
Unauthorized connection attempt detected from IP address 74.92.248.110 to port 23
2020-05-31 21:12:12
79.187.172.218 attackspam
Unauthorized connection attempt detected from IP address 79.187.172.218 to port 80
2020-05-31 21:10:30
185.175.79.166 attackspam
Unauthorized connection attempt detected from IP address 185.175.79.166 to port 23
2020-05-31 20:55:36
71.115.235.78 attackbots
Unauthorized connection attempt detected from IP address 71.115.235.78 to port 23
2020-05-31 21:13:51
24.105.172.26 attack
Unauthorized connection attempt detected from IP address 24.105.172.26 to port 445
2020-05-31 21:22:44
45.136.108.67 attackspambots
Unauthorized connection attempt detected from IP address 45.136.108.67 to port 3686
2020-05-31 21:19:38
222.186.190.14 attackbots
May 31 15:24:16 PorscheCustomer sshd[8646]: Failed password for root from 222.186.190.14 port 42644 ssh2
May 31 15:24:25 PorscheCustomer sshd[8650]: Failed password for root from 222.186.190.14 port 37422 ssh2
...
2020-05-31 21:26:35
62.171.165.85 attackspam
"Unauthorized connection attempt on SSHD detected"
2020-05-31 21:15:11
39.65.207.150 attack
Unauthorized connection attempt detected from IP address 39.65.207.150 to port 23
2020-05-31 21:21:23
223.71.167.164 attackspam
scans 10 times in preceeding hours on the ports (in chronological order) 9306 9999 14000 8161 1911 8088 49151 2002 10005 1200 resulting in total of 10 scans from 223.64.0.0/11 block.
2020-05-31 21:25:41
69.254.107.46 attackspambots
Unauthorized connection attempt detected from IP address 69.254.107.46 to port 2323
2020-05-31 21:14:12
59.148.18.13 attackspam
Unauthorized connection attempt detected from IP address 59.148.18.13 to port 445
2020-05-31 21:15:51

Recently Reported IPs

20.179.148.111 122.85.240.89 166.103.251.42 191.18.80.93
222.202.5.47 134.64.141.181 210.173.83.46 142.121.49.28
67.212.65.46 44.51.183.146 148.251.154.50 85.192.229.158
228.106.19.33 138.11.16.116 68.106.132.2 86.222.152.53
252.70.91.223 8.208.141.75 45.139.178.33 107.155.46.208