Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Barcelona

Region: Catalonia

Country: Spain

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 2.140.50.109
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 59791
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;2.140.50.109.			IN	A

;; AUTHORITY SECTION:
.			315	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022021301 1800 900 604800 86400

;; Query time: 84 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Feb 14 08:05:31 CST 2022
;; MSG SIZE  rcvd: 105
Host info
109.50.140.2.in-addr.arpa domain name pointer 109.red-2-140-50.dynamicip.rima-tde.net.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
109.50.140.2.in-addr.arpa	name = 109.red-2-140-50.dynamicip.rima-tde.net.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
187.120.136.194 attackspam
failed_logins
2019-08-19 04:56:58
37.187.51.172 attack
2019-08-18T20:02:48.101700abusebot-6.cloudsearch.cf sshd\[24435\]: Invalid user download from 37.187.51.172 port 34844
2019-08-19 05:05:39
51.158.107.51 attack
MultiHost/MultiPort Probe, Scan, Hack -
2019-08-19 05:09:12
150.223.21.177 attack
Aug 18 18:19:49 cvbmail sshd\[24976\]: Invalid user vali from 150.223.21.177
Aug 18 18:19:49 cvbmail sshd\[24976\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=150.223.21.177
Aug 18 18:19:52 cvbmail sshd\[24976\]: Failed password for invalid user vali from 150.223.21.177 port 33069 ssh2
2019-08-19 05:10:58
51.89.19.147 attackspambots
v+ssh-bruteforce
2019-08-19 05:16:39
95.57.34.131 attackspam
Automatic report - Port Scan Attack
2019-08-19 05:10:17
184.66.248.150 attack
Aug 18 22:23:14 srv206 sshd[21104]: Invalid user fieu from 184.66.248.150
Aug 18 22:23:14 srv206 sshd[21104]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=s010600f28b41237d.gv.shawcable.net
Aug 18 22:23:14 srv206 sshd[21104]: Invalid user fieu from 184.66.248.150
Aug 18 22:23:16 srv206 sshd[21104]: Failed password for invalid user fieu from 184.66.248.150 port 58108 ssh2
...
2019-08-19 04:59:23
49.69.244.242 attack
2019-08-18T14:57:13.097221stark.klein-stark.info sshd\[830\]: Invalid user admin from 49.69.244.242 port 35019
2019-08-18T14:57:13.104450stark.klein-stark.info sshd\[830\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.69.244.242
2019-08-18T14:57:15.045608stark.klein-stark.info sshd\[830\]: Failed password for invalid user admin from 49.69.244.242 port 35019 ssh2
...
2019-08-19 05:11:55
128.199.59.42 attackbotsspam
'Fail2Ban'
2019-08-19 05:19:49
117.82.206.209 attackspam
ylmf-pc
2019-08-19 05:21:38
202.169.46.82 attackbots
Aug 18 11:08:48 TORMINT sshd\[5090\]: Invalid user vid from 202.169.46.82
Aug 18 11:08:48 TORMINT sshd\[5090\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=202.169.46.82
Aug 18 11:08:50 TORMINT sshd\[5090\]: Failed password for invalid user vid from 202.169.46.82 port 42236 ssh2
...
2019-08-19 05:15:30
124.243.198.187 attackspambots
Aug 18 20:51:32 MK-Soft-VM6 sshd\[1754\]: Invalid user ftpuser from 124.243.198.187 port 45350
Aug 18 20:51:32 MK-Soft-VM6 sshd\[1754\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=124.243.198.187
Aug 18 20:51:34 MK-Soft-VM6 sshd\[1754\]: Failed password for invalid user ftpuser from 124.243.198.187 port 45350 ssh2
...
2019-08-19 04:55:10
59.72.112.21 attackbots
Aug 18 16:52:02 microserver sshd[60323]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=59.72.112.21  user=root
Aug 18 16:52:04 microserver sshd[60323]: Failed password for root from 59.72.112.21 port 41915 ssh2
Aug 18 16:57:04 microserver sshd[60957]: Invalid user amazon from 59.72.112.21 port 32938
Aug 18 16:57:04 microserver sshd[60957]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=59.72.112.21
Aug 18 16:57:06 microserver sshd[60957]: Failed password for invalid user amazon from 59.72.112.21 port 32938 ssh2
Aug 18 17:11:43 microserver sshd[62874]: Invalid user avila from 59.72.112.21 port 34246
Aug 18 17:11:43 microserver sshd[62874]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=59.72.112.21
Aug 18 17:11:44 microserver sshd[62874]: Failed password for invalid user avila from 59.72.112.21 port 34246 ssh2
Aug 18 17:16:37 microserver sshd[63498]: Invalid user passwd from 59.72.112.21
2019-08-19 05:21:08
117.83.178.208 attackbotsspam
Automatic report - Banned IP Access
2019-08-19 05:25:11
49.236.219.105 attackbotsspam
Aug 18 06:57:11 mail postfix/postscreen[9313]: PREGREET 23 after 0.76 from [49.236.219.105]:59765: EHLO logudorotours.it

...
2019-08-19 04:54:12

Recently Reported IPs

2.138.224.240 2.143.2.243 2.147.123.114 2.147.103.0
2.147.165.210 2.142.19.37 2.143.168.230 2.147.23.42
2.154.131.109 2.152.102.158 2.176.142.85 2.177.213.83
2.177.87.246 2.177.128.165 2.177.246.111 2.176.233.54
2.179.134.161 2.179.138.214 2.179.142.223 2.179.144.67