Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States of America (the)

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 164.50.181.146
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 58232
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;164.50.181.146.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025022800 1800 900 604800 86400

;; Query time: 8 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 28 17:11:33 CST 2025
;; MSG SIZE  rcvd: 107
Host info
b'Host 146.181.50.164.in-addr.arpa not found: 2(SERVFAIL)
'
Nslookup info:
server can't find 164.50.181.146.in-addr.arpa: SERVFAIL
Related IP info:
Related comments:
IP Type Details Datetime
134.209.155.213 attack
134.209.155.213 - - [13/Jul/2020:07:02:43 +0200] "POST /xmlrpc.php HTTP/1.1" 403 14999 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
134.209.155.213 - - [13/Jul/2020:07:27:00 +0200] "POST /xmlrpc.php HTTP/1.1" 403 21861 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
...
2020-07-13 19:58:30
159.203.70.169 attackspam
159.203.70.169 - - [13/Jul/2020:11:56:03 +0200] "GET /wp-login.php HTTP/1.1" 200 6060 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
159.203.70.169 - - [13/Jul/2020:11:56:04 +0200] "POST /wp-login.php HTTP/1.1" 200 6311 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
159.203.70.169 - - [13/Jul/2020:11:56:07 +0200] "POST /xmlrpc.php HTTP/1.1" 200 427 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
2020-07-13 19:50:26
51.15.118.15 attackbotsspam
2020-07-13T11:50:43.000665afi-git.jinr.ru sshd[9445]: Invalid user xm from 51.15.118.15 port 60836
2020-07-13T11:50:43.003902afi-git.jinr.ru sshd[9445]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.15.118.15
2020-07-13T11:50:43.000665afi-git.jinr.ru sshd[9445]: Invalid user xm from 51.15.118.15 port 60836
2020-07-13T11:50:44.885749afi-git.jinr.ru sshd[9445]: Failed password for invalid user xm from 51.15.118.15 port 60836 ssh2
2020-07-13T11:53:43.677299afi-git.jinr.ru sshd[10606]: Invalid user lost from 51.15.118.15 port 56290
...
2020-07-13 19:37:49
123.125.225.50 attackspam
Jul 13 05:47:44 nas sshd[21678]: Failed password for root from 123.125.225.50 port 53679 ssh2
Jul 13 05:47:50 nas sshd[21680]: Failed password for root from 123.125.225.50 port 53819 ssh2
...
2020-07-13 19:26:07
34.93.0.165 attackbots
Jul 13 07:32:04 buvik sshd[3130]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=34.93.0.165
Jul 13 07:32:05 buvik sshd[3130]: Failed password for invalid user sftp from 34.93.0.165 port 33380 ssh2
Jul 13 07:36:00 buvik sshd[3933]: Invalid user vncuser from 34.93.0.165
...
2020-07-13 19:44:31
61.177.172.159 attackspam
2020-07-13T07:37:15.440367na-vps210223 sshd[21399]: Failed password for root from 61.177.172.159 port 12114 ssh2
2020-07-13T07:37:18.699498na-vps210223 sshd[21399]: Failed password for root from 61.177.172.159 port 12114 ssh2
2020-07-13T07:37:22.039005na-vps210223 sshd[21399]: Failed password for root from 61.177.172.159 port 12114 ssh2
2020-07-13T07:37:22.039942na-vps210223 sshd[21399]: error: maximum authentication attempts exceeded for root from 61.177.172.159 port 12114 ssh2 [preauth]
2020-07-13T07:37:22.039968na-vps210223 sshd[21399]: Disconnecting: Too many authentication failures [preauth]
...
2020-07-13 19:50:54
85.249.2.10 attackbotsspam
Jul 13 08:06:18 PorscheCustomer sshd[20373]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=85.249.2.10
Jul 13 08:06:21 PorscheCustomer sshd[20373]: Failed password for invalid user zxf from 85.249.2.10 port 54802 ssh2
Jul 13 08:09:42 PorscheCustomer sshd[20422]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=85.249.2.10
...
2020-07-13 19:39:19
186.90.29.153 attack
20/7/12@23:47:26: FAIL: Alarm-Intrusion address from=186.90.29.153
20/7/12@23:47:26: FAIL: Alarm-Intrusion address from=186.90.29.153
...
2020-07-13 19:53:17
103.74.111.29 attack
1594612066 - 07/13/2020 05:47:46 Host: 103.74.111.29/103.74.111.29 Port: 445 TCP Blocked
2020-07-13 19:39:45
106.54.109.98 attack
2020-07-13T13:06:56.071708vps751288.ovh.net sshd\[18552\]: Invalid user java from 106.54.109.98 port 51660
2020-07-13T13:06:56.081507vps751288.ovh.net sshd\[18552\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.54.109.98
2020-07-13T13:06:57.972751vps751288.ovh.net sshd\[18552\]: Failed password for invalid user java from 106.54.109.98 port 51660 ssh2
2020-07-13T13:09:46.746823vps751288.ovh.net sshd\[18562\]: Invalid user admin from 106.54.109.98 port 47332
2020-07-13T13:09:46.755222vps751288.ovh.net sshd\[18562\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.54.109.98
2020-07-13 19:19:39
112.85.42.238 attack
Jul 13 11:52:31 plex-server sshd[354683]: Failed password for root from 112.85.42.238 port 55283 ssh2
Jul 13 11:52:36 plex-server sshd[354683]: Failed password for root from 112.85.42.238 port 55283 ssh2
Jul 13 11:52:38 plex-server sshd[354683]: Failed password for root from 112.85.42.238 port 55283 ssh2
Jul 13 11:53:46 plex-server sshd[354945]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.85.42.238  user=root
Jul 13 11:53:47 plex-server sshd[354945]: Failed password for root from 112.85.42.238 port 31972 ssh2
...
2020-07-13 19:58:56
197.248.141.242 attackspam
SSH Brute-Force reported by Fail2Ban
2020-07-13 19:34:45
58.11.5.128 attackbots
58.11.5.128 - - [13/Jul/2020:04:47:18 +0100] "POST /xmlrpc.php HTTP/1.1" 200 239 "-" "Mozilla/5.0 (Windows NT 6.1; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/59.0.3071.109 Safari/537.36"
58.11.5.128 - - [13/Jul/2020:04:47:21 +0100] "POST /xmlrpc.php HTTP/1.1" 200 239 "-" "Mozilla/5.0 (Windows NT 6.1; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/59.0.3071.109 Safari/537.36"
58.11.5.128 - - [13/Jul/2020:04:47:25 +0100] "POST /xmlrpc.php HTTP/1.1" 200 239 "-" "Mozilla/5.0 (Windows NT 6.1; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/59.0.3071.109 Safari/537.36"
...
2020-07-13 19:54:39
216.218.206.118 attackbots
Port scan denied
2020-07-13 19:38:20
188.27.242.57 attackspambots
Honeypot attack, port: 81, PTR: 188-27-242-57.oradea.rdsnet.ro.
2020-07-13 19:25:36

Recently Reported IPs

246.171.112.41 97.210.46.235 59.59.55.251 148.31.253.23
182.196.135.97 241.11.105.105 76.17.166.202 196.133.145.117
177.204.2.94 254.90.79.114 17.75.146.90 163.6.210.41
86.212.31.63 20.226.120.104 221.113.138.80 161.93.105.195
90.254.61.51 90.73.29.33 165.35.55.247 118.81.182.220