Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States of America (the)

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 20.121.157.50
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 11741
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;20.121.157.50.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025021401 1800 900 604800 86400

;; Query time: 42 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Feb 15 03:18:29 CST 2025
;; MSG SIZE  rcvd: 106
Host info
Host 50.157.121.20.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 50.157.121.20.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
92.240.204.148 attack
Chat Spam
2020-03-18 15:27:02
175.142.61.95 attackspam
Port probing on unauthorized port 81
2020-03-18 15:25:53
125.162.106.56 attackspambots
Mar 18 03:51:47 work-partkepr sshd\[29123\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=125.162.106.56  user=root
Mar 18 03:51:50 work-partkepr sshd\[29123\]: Failed password for root from 125.162.106.56 port 51811 ssh2
...
2020-03-18 15:17:59
5.188.62.25 attack
5.188.62.25 - - [18/Mar/2020:07:04:31 +0100] "POST /wp-login.php HTTP/1.1" 200 6824 "-" "Mozilla/5.0 (Windows NT 6.0) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/41.0.2228.0 Safari/537.36"
5.188.62.25 - - [18/Mar/2020:07:04:33 +0100] "POST /wp-login.php HTTP/1.1" 200 7526 "-" "Mozilla/5.0 (Windows NT 6.0) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/41.0.2228.0 Safari/537.36"
5.188.62.25 - - [18/Mar/2020:08:08:50 +0100] "POST /wp-login.php HTTP/1.1" 200 6825 "-" "Mozilla/5.0 (Windows NT 6.0) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/41.0.2228.0 Safari/537.36"
2020-03-18 16:03:05
178.128.123.111 attackspam
web-1 [ssh] SSH Attack
2020-03-18 15:17:35
111.231.69.222 attack
Mar 18 04:27:42 firewall sshd[23816]: Failed password for invalid user frodo from 111.231.69.222 port 35520 ssh2
Mar 18 04:30:20 firewall sshd[24000]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.231.69.222  user=root
Mar 18 04:30:22 firewall sshd[24000]: Failed password for root from 111.231.69.222 port 42086 ssh2
...
2020-03-18 15:51:09
89.248.168.202 attack
03/18/2020-03:29:14.473678 89.248.168.202 Protocol: 6 ET SCAN NMAP -sS window 1024
2020-03-18 15:29:54
173.208.211.202 attackbots
Unauthorized connection attempt detected from IP address 173.208.211.202 to port 3389 [T]
2020-03-18 15:45:33
223.240.70.4 attackbots
Mar 18 06:13:38 ns41 sshd[8104]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=223.240.70.4
2020-03-18 15:31:32
103.233.170.92 attackbots
20/3/18@01:48:25: FAIL: Alarm-Network address from=103.233.170.92
...
2020-03-18 15:33:21
212.95.137.169 attack
detected by Fail2Ban
2020-03-18 15:36:38
122.192.255.228 attackspam
Mar 17 19:53:37 wbs sshd\[4807\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.192.255.228  user=root
Mar 17 19:53:39 wbs sshd\[4807\]: Failed password for root from 122.192.255.228 port 50857 ssh2
Mar 17 19:56:54 wbs sshd\[5114\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.192.255.228  user=root
Mar 17 19:56:56 wbs sshd\[5114\]: Failed password for root from 122.192.255.228 port 59235 ssh2
Mar 17 20:00:17 wbs sshd\[5431\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.192.255.228  user=root
2020-03-18 15:36:09
59.127.172.234 attackbots
k+ssh-bruteforce
2020-03-18 16:05:30
139.155.1.18 attack
$f2bV_matches | Triggered by Fail2Ban at Vostok web server
2020-03-18 15:51:36
107.175.33.240 attackspambots
Mar 18 07:38:29 web8 sshd\[27137\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=107.175.33.240  user=root
Mar 18 07:38:31 web8 sshd\[27137\]: Failed password for root from 107.175.33.240 port 46900 ssh2
Mar 18 07:46:42 web8 sshd\[31315\]: Invalid user jmiller from 107.175.33.240
Mar 18 07:46:42 web8 sshd\[31315\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=107.175.33.240
Mar 18 07:46:44 web8 sshd\[31315\]: Failed password for invalid user jmiller from 107.175.33.240 port 54770 ssh2
2020-03-18 15:47:38

Recently Reported IPs

239.29.73.186 184.149.250.207 202.33.87.163 77.239.116.154
201.243.108.82 59.102.58.18 182.2.125.57 142.250.64.237
168.46.175.117 54.73.13.59 222.14.49.8 220.250.5.75
178.120.184.227 228.57.14.241 36.14.4.9 176.242.166.115
124.26.56.29 12.69.140.67 218.251.246.213 250.112.121.167