Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Japan

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 194.91.50.40
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 58872
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;194.91.50.40.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025021900 1800 900 604800 86400

;; Query time: 8 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Feb 19 17:42:16 CST 2025
;; MSG SIZE  rcvd: 105
Host info
Host 40.50.91.194.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 40.50.91.194.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
213.128.67.212 attackbots
Oct 11 14:35:28 game-panel sshd[25997]: Failed password for root from 213.128.67.212 port 56204 ssh2
Oct 11 14:40:15 game-panel sshd[26223]: Failed password for root from 213.128.67.212 port 40144 ssh2
2019-10-11 23:08:06
59.148.43.97 attackbotsspam
Oct 11 14:57:03 MK-Soft-Root1 sshd[22967]: Failed password for root from 59.148.43.97 port 43086 ssh2
Oct 11 14:57:06 MK-Soft-Root1 sshd[22967]: Failed password for root from 59.148.43.97 port 43086 ssh2
...
2019-10-11 22:52:06
37.114.158.127 attackspambots
Invalid user admin from 37.114.158.127 port 49105
2019-10-11 22:39:12
37.114.144.72 attackbots
Invalid user admin from 37.114.144.72 port 44972
2019-10-11 22:39:28
212.145.231.149 attackspam
$f2bV_matches
2019-10-11 22:48:46
45.67.14.152 attack
Invalid user test from 45.67.14.152 port 40178
2019-10-11 22:37:35
61.28.227.133 attackspam
Oct 11 15:04:44 eventyay sshd[9621]: Failed password for root from 61.28.227.133 port 42870 ssh2
Oct 11 15:09:27 eventyay sshd[9647]: Failed password for root from 61.28.227.133 port 53640 ssh2
...
2019-10-11 22:42:15
212.159.47.250 attack
Invalid user test from 212.159.47.250 port 48242
2019-10-11 22:52:27
122.152.219.227 attackbotsspam
Oct 11 16:42:29 meumeu sshd[27538]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.152.219.227 
Oct 11 16:42:31 meumeu sshd[27538]: Failed password for invalid user milan from 122.152.219.227 port 47160 ssh2
Oct 11 16:42:51 meumeu sshd[27591]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.152.219.227 
...
2019-10-11 23:05:57
194.61.26.34 attackbots
Invalid user SYSTEST from 194.61.26.34 port 17376
2019-10-11 22:25:47
222.186.31.136 attackbots
Oct 11 10:58:56 TORMINT sshd\[17475\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.31.136  user=root
Oct 11 10:58:58 TORMINT sshd\[17475\]: Failed password for root from 222.186.31.136 port 11206 ssh2
Oct 11 10:59:00 TORMINT sshd\[17475\]: Failed password for root from 222.186.31.136 port 11206 ssh2
...
2019-10-11 23:04:08
185.187.69.216 attackbots
Invalid user admin from 185.187.69.216 port 48589
2019-10-11 22:27:56
167.99.75.174 attack
Invalid user castis from 167.99.75.174 port 52132
2019-10-11 22:28:34
211.107.161.236 attack
firewall-block, port(s): 22/tcp
2019-10-11 22:21:46
66.214.40.126 attack
Invalid user pi from 66.214.40.126 port 46240
2019-10-11 22:33:54

Recently Reported IPs

19.201.32.255 127.59.173.60 198.230.204.228 191.249.183.148
224.14.176.43 236.144.42.45 161.187.169.164 32.183.18.222
186.17.241.179 221.84.184.45 203.8.233.213 219.53.229.23
176.127.193.226 119.145.170.44 109.213.25.35 92.121.250.126
136.113.26.18 190.102.16.130 174.243.76.190 227.29.111.237