Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: London

Region: England

Country: United Kingdom

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
% This is the RIPE Database query service.
% The objects are in RPSL format.
%
% The RIPE Database is subject to Terms and Conditions.
% See https://docs.db.ripe.net/terms-conditions.html

% Note: this output has been filtered.
%       To receive output for a database update, use the "-B" flag.

% Information related to '194.50.235.128 - 194.50.235.159'

% Abuse contact for '194.50.235.128 - 194.50.235.159' is 'abuse@infrawat.ch'

inetnum:        194.50.235.128 - 194.50.235.159
netname:        INFRAWATCH
remarks:        -----------------------------------------------------
remarks:        Real time internet intelligence data
remarks:        infrawat.ch
remarks:        -----------------------------------------------------
country:        GB
geoloc:         51.494840911758295 -0.018682268947961784
org:            ORG-IL948-RIPE
admin-c:        LD7399-RIPE
tech-c:         LD7399-RIPE
status:         ASSIGNED PA
created:        2026-04-26T03:20:17Z
last-modified:  2026-04-26T03:20:17Z
source:         RIPE
mnt-by:         HYDRA-MNT

organisation:   ORG-IL948-RIPE
org-name:       Infrawatch Limited
org-type:       OTHER
address:        128 City Road
address:        London
address:        EC1V 2NX
country:        GB
abuse-c:        ACRO64026-RIPE
mnt-ref:        HYDRA-MNT
created:        2026-03-26T04:32:13Z
last-modified:  2026-04-27T01:46:41Z
source:         RIPE # Filtered
mnt-by:         HYDRA-MNT

person:         Lloyd Davies
address:        128 City Road
address:        London
address:        EC1V 2NX
address:        United Kingdom
phone:          +448000803330
nic-hdl:        LD7399-RIPE
created:        2026-03-26T04:34:31Z
last-modified:  2026-04-27T01:47:59Z
source:         RIPE # Filtered
mnt-by:         HYDRA-MNT

% Information related to '194.50.234.0/23AS25369'

route:          194.50.234.0/23
origin:         AS25369
mnt-by:         HYDRA-MNT
created:        2022-09-23T15:39:09Z
last-modified:  2022-09-23T15:39:09Z
source:         RIPE

% This query was served by the RIPE Database Query Service version 1.122.1 (ABERDEEN)
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 194.50.235.150
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 31552
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;194.50.235.150.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2026052300 1800 900 604800 86400

;; Query time: 7 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat May 23 17:31:05 CST 2026
;; MSG SIZE  rcvd: 107
Host info
150.235.50.194.in-addr.arpa domain name pointer 194-50-235-150.infrawat.ch.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
150.235.50.194.in-addr.arpa	name = 194-50-235-150.infrawat.ch.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
119.45.26.117 attack
Oct  6 09:36:44 vpn01 sshd[22897]: Failed password for root from 119.45.26.117 port 39268 ssh2
...
2020-10-06 18:19:19
198.45.212.244 attack
ssh 22
2020-10-06 18:50:50
105.29.155.182 normal
Need to get some school work done of grade 1.2
2020-10-06 18:14:23
140.143.19.237 attackspambots
Oct  6 11:33:59 router sshd[20439]: Failed password for root from 140.143.19.237 port 52966 ssh2
Oct  6 11:37:41 router sshd[20460]: Failed password for root from 140.143.19.237 port 35880 ssh2
...
2020-10-06 18:35:29
180.76.161.203 attack
Cowrie Honeypot: 3 unauthorised SSH/Telnet login attempts between 2020-10-05T21:20:24Z and 2020-10-05T21:28:43Z
2020-10-06 18:17:57
122.51.192.105 attack
(sshd) Failed SSH login from 122.51.192.105 (CN/China/-): 5 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: Oct  6 06:24:42 optimus sshd[20014]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.51.192.105  user=root
Oct  6 06:24:43 optimus sshd[20014]: Failed password for root from 122.51.192.105 port 53810 ssh2
Oct  6 06:28:08 optimus sshd[20939]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.51.192.105  user=root
Oct  6 06:28:11 optimus sshd[20939]: Failed password for root from 122.51.192.105 port 48728 ssh2
Oct  6 06:31:40 optimus sshd[22042]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.51.192.105  user=root
2020-10-06 18:46:03
37.34.183.228 attackbots
445/tcp 445/tcp
[2020-10-05]2pkt
2020-10-06 18:42:10
23.94.204.232 attack
23.94.204.232 (US/United States/yithay.org), 12 distributed sshd attacks on account [root] in the last 3600 secs
2020-10-06 18:50:11
82.64.46.144 attackbotsspam
5x Failed Password
2020-10-06 18:21:18
103.82.15.160 attackspambots
Icarus honeypot on github
2020-10-06 18:52:10
94.179.140.150 attack
23/tcp
[2020-10-05]1pkt
2020-10-06 18:24:56
42.235.90.55 attackspambots
23/tcp
[2020-10-05]1pkt
2020-10-06 18:42:56
85.204.200.50 attackbots
445/tcp
[2020-10-05]1pkt
2020-10-06 18:20:55
119.96.86.193 attackspambots
Telnet/23 MH Probe, Scan, BF, Hack -
2020-10-06 18:28:53
85.235.53.153 attackbots
Port scan on 1 port(s): 445
2020-10-06 18:33:30

Recently Reported IPs

69.5.169.39 103.173.7.219 2606:4700:10::6816:4391 39.100.77.72
31.14.254.86 195.206.182.211 188.240.59.33 2606:4700:10::6814:4823
49.86.41.75 14.207.194.172 81.19.219.233 5.226.140.74
5.226.140.109 35.93.87.168 2606:4700:10::6814:5485 2606:4700:10::6814:4472
2606:4700:10::6814:5337 2606:4700:10::ac43:2335 20.169.106.62 183.206.96.146