Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States of America (the)

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 168.141.50.135
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 62426
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;168.141.50.135.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025021400 1800 900 604800 86400

;; Query time: 36 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 14 23:16:09 CST 2025
;; MSG SIZE  rcvd: 107
Host info
Host 135.50.141.168.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 135.50.141.168.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
51.254.123.131 attackbots
Sep  9 07:54:26 eventyay sshd[22474]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.254.123.131
Sep  9 07:54:28 eventyay sshd[22474]: Failed password for invalid user test123! from 51.254.123.131 port 55752 ssh2
Sep  9 07:59:49 eventyay sshd[22612]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.254.123.131
...
2019-09-09 19:21:12
199.192.25.200 attackspambots
WordPress login Brute force / Web App Attack on client site.
2019-09-09 19:06:36
41.68.13.190 attack
Unauthorized connection attempt from IP address 41.68.13.190 on Port 445(SMB)
2019-09-09 19:05:03
125.161.139.58 attackspam
Unauthorized connection attempt from IP address 125.161.139.58 on Port 445(SMB)
2019-09-09 18:57:15
5.135.198.62 attackspambots
Sep  9 10:55:58 web8 sshd\[23768\]: Invalid user gituser from 5.135.198.62
Sep  9 10:55:58 web8 sshd\[23768\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=5.135.198.62
Sep  9 10:56:00 web8 sshd\[23768\]: Failed password for invalid user gituser from 5.135.198.62 port 35779 ssh2
Sep  9 11:02:06 web8 sshd\[26690\]: Invalid user support from 5.135.198.62
Sep  9 11:02:06 web8 sshd\[26690\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=5.135.198.62
2019-09-09 19:10:31
91.244.77.67 attack
Automatic report - Port Scan Attack
2019-09-09 19:07:02
92.63.194.26 attackspam
Sep  9 12:16:49 MK-Soft-Root2 sshd\[28592\]: Invalid user admin from 92.63.194.26 port 56372
Sep  9 12:16:49 MK-Soft-Root2 sshd\[28592\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=92.63.194.26
Sep  9 12:16:52 MK-Soft-Root2 sshd\[28592\]: Failed password for invalid user admin from 92.63.194.26 port 56372 ssh2
...
2019-09-09 18:28:03
5.1.88.50 attack
Sep  9 01:06:07 auw2 sshd\[22671\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=5.1.88.50  user=root
Sep  9 01:06:09 auw2 sshd\[22671\]: Failed password for root from 5.1.88.50 port 55452 ssh2
Sep  9 01:14:08 auw2 sshd\[23537\]: Invalid user ts3server from 5.1.88.50
Sep  9 01:14:08 auw2 sshd\[23537\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=5.1.88.50
Sep  9 01:14:10 auw2 sshd\[23537\]: Failed password for invalid user ts3server from 5.1.88.50 port 57652 ssh2
2019-09-09 19:26:29
36.79.115.7 attack
Unauthorized connection attempt from IP address 36.79.115.7 on Port 445(SMB)
2019-09-09 18:59:32
141.98.9.67 attackspambots
Sep  9 13:15:51 relay postfix/smtpd\[32260\]: warning: unknown\[141.98.9.67\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Sep  9 13:16:15 relay postfix/smtpd\[32308\]: warning: unknown\[141.98.9.67\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Sep  9 13:16:34 relay postfix/smtpd\[11731\]: warning: unknown\[141.98.9.67\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Sep  9 13:16:57 relay postfix/smtpd\[30848\]: warning: unknown\[141.98.9.67\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Sep  9 13:17:16 relay postfix/smtpd\[11732\]: warning: unknown\[141.98.9.67\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
...
2019-09-09 19:32:58
54.36.148.149 attackbots
Automatic report - Banned IP Access
2019-09-09 18:24:06
36.66.55.7 attackspam
Unauthorized connection attempt from IP address 36.66.55.7 on Port 445(SMB)
2019-09-09 19:25:39
219.159.239.77 attack
Sep  9 11:10:22 game-panel sshd[24431]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=219.159.239.77
Sep  9 11:10:24 game-panel sshd[24431]: Failed password for invalid user ftp_test from 219.159.239.77 port 48938 ssh2
Sep  9 11:15:26 game-panel sshd[24602]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=219.159.239.77
2019-09-09 19:17:00
96.54.228.119 attackbots
Sep  9 11:50:39 SilenceServices sshd[30869]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=96.54.228.119
Sep  9 11:50:41 SilenceServices sshd[30869]: Failed password for invalid user chris from 96.54.228.119 port 43229 ssh2
Sep  9 11:57:27 SilenceServices sshd[946]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=96.54.228.119
2019-09-09 18:23:27
113.247.74.254 attackspambots
Sep  9 00:17:28 kapalua sshd\[31137\]: Invalid user password from 113.247.74.254
Sep  9 00:17:28 kapalua sshd\[31137\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=113.247.74.254
Sep  9 00:17:30 kapalua sshd\[31137\]: Failed password for invalid user password from 113.247.74.254 port 28760 ssh2
Sep  9 00:23:23 kapalua sshd\[31781\]: Invalid user demo123 from 113.247.74.254
Sep  9 00:23:23 kapalua sshd\[31781\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=113.247.74.254
2019-09-09 18:57:47

Recently Reported IPs

51.127.85.93 97.63.15.119 231.130.60.42 56.213.152.127
252.207.214.81 14.96.195.94 254.254.241.125 31.51.230.65
194.252.211.232 236.129.172.250 62.177.194.149 47.115.231.140
210.235.34.26 188.240.126.60 107.57.202.109 54.233.53.87
196.92.90.238 143.150.27.59 187.16.206.136 224.63.141.148