Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Slovenia

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 164.8.157.50
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 10761
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;164.8.157.50.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025012901 1800 900 604800 86400

;; Query time: 11 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Jan 30 06:28:53 CST 2025
;; MSG SIZE  rcvd: 105
Host info
Host 50.157.8.164.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 50.157.8.164.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
172.93.205.162 attackspam
Automatic report - XMLRPC Attack
2019-10-03 15:30:54
51.75.52.127 attackspam
10/02/2019-23:56:11.691819 51.75.52.127 Protocol: 6 ET CINS Active Threat Intelligence Poor Reputation IP group 52
2019-10-03 16:00:56
59.1.116.20 attack
Invalid user upload from 59.1.116.20 port 53166
2019-10-03 15:58:30
139.59.29.153 attackbotsspam
2019-08-16 23:06:36,346 fail2ban.actions        [762]: NOTICE  [sshd] Ban 139.59.29.153
2019-08-17 02:14:56,687 fail2ban.actions        [762]: NOTICE  [sshd] Ban 139.59.29.153
2019-08-17 05:23:06,609 fail2ban.actions        [762]: NOTICE  [sshd] Ban 139.59.29.153
...
2019-10-03 16:08:37
117.50.49.57 attackspam
Oct  2 19:17:25 eddieflores sshd\[18422\]: Invalid user suejoe from 117.50.49.57
Oct  2 19:17:25 eddieflores sshd\[18422\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=117.50.49.57
Oct  2 19:17:27 eddieflores sshd\[18422\]: Failed password for invalid user suejoe from 117.50.49.57 port 53456 ssh2
Oct  2 19:20:17 eddieflores sshd\[18658\]: Invalid user musikbot from 117.50.49.57
Oct  2 19:20:17 eddieflores sshd\[18658\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=117.50.49.57
2019-10-03 16:03:04
182.61.15.70 attackbotsspam
Invalid user jg from 182.61.15.70 port 43530
2019-10-03 15:37:09
206.189.148.39 attackspam
Oct  3 07:43:48 hcbbdb sshd\[32186\]: Invalid user admin from 206.189.148.39
Oct  3 07:43:48 hcbbdb sshd\[32186\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=206.189.148.39
Oct  3 07:43:50 hcbbdb sshd\[32186\]: Failed password for invalid user admin from 206.189.148.39 port 42530 ssh2
Oct  3 07:48:20 hcbbdb sshd\[32706\]: Invalid user qc from 206.189.148.39
Oct  3 07:48:20 hcbbdb sshd\[32706\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=206.189.148.39
2019-10-03 15:53:52
83.144.105.158 attackspam
Oct  3 10:01:42 MK-Soft-VM3 sshd[7875]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=83.144.105.158 
Oct  3 10:01:44 MK-Soft-VM3 sshd[7875]: Failed password for invalid user support123 from 83.144.105.158 port 40428 ssh2
...
2019-10-03 16:09:56
139.59.247.114 attack
Oct  3 09:05:31 host sshd\[16308\]: Invalid user gb from 139.59.247.114 port 34900
Oct  3 09:05:31 host sshd\[16308\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.247.114
...
2019-10-03 16:11:58
159.203.197.28 attackspam
non-SMTP command from unknown[159.203.197.28]: GET / HTTP/1.1
2019-10-03 15:36:38
118.42.125.170 attackbotsspam
Oct  3 09:15:41 MK-Soft-VM5 sshd[12747]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.42.125.170 
Oct  3 09:15:43 MK-Soft-VM5 sshd[12747]: Failed password for invalid user grupo1 from 118.42.125.170 port 42978 ssh2
...
2019-10-03 16:10:48
79.137.75.5 attackspam
Oct  3 10:01:50 dedicated sshd[17151]: Invalid user lwen from 79.137.75.5 port 48368
2019-10-03 16:03:37
165.227.97.108 attackbotsspam
Invalid user qhsupport from 165.227.97.108 port 43664
2019-10-03 16:07:32
191.241.145.111 attackspambots
Oct x@x
Oct x@x
Oct x@x
Oct x@x
Oct x@x
Oct x@x
Oct x@x
Oct x@x
Oct x@x
Oct x@x
Oct x@x
Oct x@x
Oct x@x
Oct x@x
Oct x@x
Oct x@x
Oct x@x
Oct x@x
Oct x@x
Oct x@x
Oct x@x
Oct x@x
Oct x@x
Oct x@x
Oct x@x
Oct x@x
Oct x@x
Oct x@x
Oct x@x
Oct x@x
Oct x@x
Oct x@x
Oct x@x
Oct x@x
Oct x@x
Oct x@x
Oct x@x
Oct x@x
Oct x@x
Oct x@x
Oct x@x
Oct x@x
Oct x@x
Oct x@x
Oct x@x
Oct x@x
Oct x@x
Oct x@x
Oct x@x
Oct x@x
Oct x@x
Oct x@x
Oct x@x
Oct x@x
Oct x@x
Oct x@x
Oct x@x
Oct x@x
Oct x@x
Oct x@x
Oct x@x
Oct x@x
Oct x@x
Oct x@x
Oct x@x
Oct x@x
Oct x@x
Oct x@x
Oct x@x
Oct x@x
Oct x@x
Oct x@x
Oct x@x
Oct  1 13:25:23 our-server-hostname postfix/smtpd[31168]: connect from unknown[191.241.145.111]
Oct x@x
Oct x@x
Oct x@x
Oct x@x
Oct x@x
Oct x@x
Oct x@x
Oct x@x
Oct x@x
Oct x@x
Oct x@x
Oct x@x
Oct x@x


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=191.241.145.111
2019-10-03 15:40:37
41.164.195.204 attackbotsspam
Oct  3 07:40:44 pkdns2 sshd\[22203\]: Invalid user yun from 41.164.195.204Oct  3 07:40:47 pkdns2 sshd\[22203\]: Failed password for invalid user yun from 41.164.195.204 port 45656 ssh2Oct  3 07:45:31 pkdns2 sshd\[22413\]: Invalid user test1 from 41.164.195.204Oct  3 07:45:34 pkdns2 sshd\[22413\]: Failed password for invalid user test1 from 41.164.195.204 port 57898 ssh2Oct  3 07:50:31 pkdns2 sshd\[22641\]: Invalid user bloomberg from 41.164.195.204Oct  3 07:50:33 pkdns2 sshd\[22641\]: Failed password for invalid user bloomberg from 41.164.195.204 port 41970 ssh2
...
2019-10-03 16:14:37

Recently Reported IPs

225.146.149.108 143.125.109.232 239.77.247.225 214.235.70.43
7.253.131.150 173.241.128.91 50.225.50.172 228.235.202.200
39.101.196.215 152.171.15.58 155.78.116.17 235.59.1.3
38.237.117.49 52.59.128.180 58.241.45.94 45.22.86.166
53.249.133.103 250.160.138.45 14.195.218.196 224.213.150.200