Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 158.6.50.142
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 45573
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;158.6.50.142.			IN	A

;; AUTHORITY SECTION:
.			524	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022072202 1800 900 604800 86400

;; Query time: 17 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Jul 23 07:00:16 CST 2022
;; MSG SIZE  rcvd: 105
Host info
Host 142.50.6.158.in-addr.arpa not found: 2(SERVFAIL)
Nslookup info:
server can't find 158.6.50.142.in-addr.arpa: SERVFAIL
Related IP info:
Related comments:
IP Type Details Datetime
195.95.147.98 attackbotsspam
[N10.H2.VM2] Port Scanner Detected Blocked by UFW
2020-08-11 06:59:56
171.100.233.252 attackspambots
Automatic report - Port Scan Attack
2020-08-11 06:45:00
84.38.187.134 attack
Unauthorized connection attempt detected from IP address 84.38.187.134 to port 3391 [T]
2020-08-11 07:15:02
94.25.181.98 attack
Aug 10 22:29:07 mail postfix/smtpd[24635]: warning: unknown[94.25.181.98]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Aug 10 22:29:21 mail postfix/smtpd[24635]: warning: unknown[94.25.181.98]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Aug 10 22:29:39 mail postfix/smtpd[24635]: warning: unknown[94.25.181.98]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
2020-08-11 06:56:40
89.248.160.178 attackspam
SmallBizIT.US 6 packets to tcp(1017,1089,1111,8099,8390,8512)
2020-08-11 07:14:35
112.85.42.238 attackbots
Aug 10 22:32:26 jumpserver sshd[101499]: Failed password for root from 112.85.42.238 port 19305 ssh2
Aug 10 22:32:29 jumpserver sshd[101499]: Failed password for root from 112.85.42.238 port 19305 ssh2
Aug 10 22:32:32 jumpserver sshd[101499]: Failed password for root from 112.85.42.238 port 19305 ssh2
...
2020-08-11 06:48:18
178.128.56.89 attackspam
SSH bruteforce
2020-08-11 06:49:44
189.128.75.76 attackspam
1597091380 - 08/10/2020 22:29:40 Host: 189.128.75.76/189.128.75.76 Port: 445 TCP Blocked
2020-08-11 06:53:39
103.59.53.34 attackspam
Unauthorised access (Aug 10) SRC=103.59.53.34 LEN=40 TOS=0x08 TTL=52 ID=15162 TCP DPT=8080 WINDOW=14095 SYN 
Unauthorised access (Aug 10) SRC=103.59.53.34 LEN=40 TOS=0x08 TTL=49 ID=16493 TCP DPT=8080 WINDOW=24970 SYN
2020-08-11 06:49:29
67.205.162.223 attackbotsspam
ET CINS Active Threat Intelligence Poor Reputation IP group 67 - port: 14751 proto: tcp cat: Misc Attackbytes: 60
2020-08-11 07:16:44
65.32.157.145 attack
ET CINS Active Threat Intelligence Poor Reputation IP group 65 - port: 9530 proto: tcp cat: Misc Attackbytes: 60
2020-08-11 07:17:35
94.102.50.137 attackspam
Unauthorized connection attempt detected from IP address 94.102.50.137 to port 2309 [T]
2020-08-11 07:11:30
51.75.255.250 attackspam
Aug 11 00:21:48 nextcloud sshd\[24580\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.75.255.250  user=root
Aug 11 00:21:51 nextcloud sshd\[24580\]: Failed password for root from 51.75.255.250 port 39968 ssh2
Aug 11 00:25:51 nextcloud sshd\[28801\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.75.255.250  user=root
2020-08-11 07:03:13
94.102.49.114 attackspam
1 Login Attempts
2020-08-11 07:12:00
111.229.19.254 attack
Fail2Ban - SSH Bruteforce Attempt
2020-08-11 06:49:05

Recently Reported IPs

158.60.208.212 158.60.212.236 158.6.237.169 158.60.123.51
158.6.80.102 158.6.79.23 158.60.149.128 158.6.95.240
158.60.189.203 158.62.55.189 158.6.91.227 158.6.26.12
158.62.149.187 158.60.218.240 158.60.13.71 158.59.53.139
158.61.20.24 158.6.59.176 158.6.30.86 158.6.44.163