Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: City of Westminster

Region: England

Country: United Kingdom

Internet Service Provider: unknown

Hostname: unknown

Organization: Virgin Media Limited

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:

; <<>> DiG 9.10.3-P4-Ubuntu <<>> 213.105.50.163
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 50889
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;213.105.50.163.			IN	A

;; AUTHORITY SECTION:
.			3206	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019050600 1800 900 604800 86400

;; Query time: 0 msec
;; SERVER: 67.207.67.3#53(67.207.67.3)
;; WHEN: Mon May 06 22:56:14 +08 2019
;; MSG SIZE  rcvd: 118

Host info
163.50.105.213.in-addr.arpa domain name pointer 163.50-105-213.static.virginmediabusiness.co.uk.
Nslookup info:
Server:		67.207.67.3
Address:	67.207.67.3#53

Non-authoritative answer:
163.50.105.213.in-addr.arpa	name = 163.50-105-213.static.virginmediabusiness.co.uk.

Authoritative answers can be found from:

Related IP info:
Related comments:
IP Type Details Datetime
103.193.191.26 attackspambots
1433/tcp
[2020-08-23]1pkt
2020-08-24 07:50:44
177.8.172.141 attackbots
Invalid user wget from 177.8.172.141 port 50613
2020-08-24 08:11:37
49.232.17.14 attackbotsspam
Aug 24 03:32:17 webhost01 sshd[7751]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.232.17.14
Aug 24 03:32:19 webhost01 sshd[7751]: Failed password for invalid user jessica from 49.232.17.14 port 50234 ssh2
...
2020-08-24 08:13:42
218.92.0.173 attack
Scanned 28 times in the last 24 hours on port 22
2020-08-24 08:08:59
85.209.0.38 attackspambots
Aug 23 22:32:31 ns1 sshd[91833]: Failed password for root from 85.209.0.38 port 52576 ssh2
Aug 23 22:32:32 ns1 sshd[91833]: Connection closed by authenticating user root 85.209.0.38 port 52576 [preauth]
Aug 23 22:32:32 ns1 sshd[91834]: Failed password for root from 85.209.0.38 port 52540 ssh2
Aug 23 22:32:32 ns1 sshd[91834]: Failed password for root from 85.209.0.38 port 52540 ssh2
Aug 23 22:32:32 ns1 sshd[91834]: Connection closed by authenticating user root 85.209.0.38 port 52540 [preauth]
...
2020-08-24 08:00:21
139.155.68.58 attack
2020-08-23T16:27:02.795893devel sshd[28478]: Invalid user dsg from 139.155.68.58 port 35826
2020-08-23T16:27:04.035966devel sshd[28478]: Failed password for invalid user dsg from 139.155.68.58 port 35826 ssh2
2020-08-23T16:32:43.032176devel sshd[28912]: Invalid user liuxin from 139.155.68.58 port 34132
2020-08-24 07:49:37
119.29.216.238 attack
2020-08-24T05:14:10.955501hostname sshd[16543]: Invalid user ng from 119.29.216.238 port 39744
2020-08-24T05:14:13.326604hostname sshd[16543]: Failed password for invalid user ng from 119.29.216.238 port 39744 ssh2
2020-08-24T05:21:24.344313hostname sshd[19214]: Invalid user denise from 119.29.216.238 port 41258
...
2020-08-24 08:01:37
51.83.134.233 attackbots
Scanned 3 times in the last 24 hours on port 22
2020-08-24 08:29:12
51.15.118.15 attack
2020-08-23T20:25:51.079952abusebot-6.cloudsearch.cf sshd[11792]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.15.118.15  user=root
2020-08-23T20:25:52.899324abusebot-6.cloudsearch.cf sshd[11792]: Failed password for root from 51.15.118.15 port 34880 ssh2
2020-08-23T20:29:11.006320abusebot-6.cloudsearch.cf sshd[11930]: Invalid user soma from 51.15.118.15 port 43702
2020-08-23T20:29:11.012767abusebot-6.cloudsearch.cf sshd[11930]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.15.118.15
2020-08-23T20:29:11.006320abusebot-6.cloudsearch.cf sshd[11930]: Invalid user soma from 51.15.118.15 port 43702
2020-08-23T20:29:13.288507abusebot-6.cloudsearch.cf sshd[11930]: Failed password for invalid user soma from 51.15.118.15 port 43702 ssh2
2020-08-23T20:32:34.844146abusebot-6.cloudsearch.cf sshd[12028]: Invalid user mary from 51.15.118.15 port 52538
...
2020-08-24 07:58:04
70.169.55.123 attack
23/tcp
[2020-08-23]1pkt
2020-08-24 08:02:09
223.31.196.3 attackspam
Aug 24 00:50:46 inter-technics sshd[9863]: Invalid user cw from 223.31.196.3 port 59434
Aug 24 00:50:46 inter-technics sshd[9863]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=223.31.196.3
Aug 24 00:50:46 inter-technics sshd[9863]: Invalid user cw from 223.31.196.3 port 59434
Aug 24 00:50:47 inter-technics sshd[9863]: Failed password for invalid user cw from 223.31.196.3 port 59434 ssh2
Aug 24 00:55:38 inter-technics sshd[10170]: Invalid user lingxi from 223.31.196.3 port 36970
...
2020-08-24 08:28:01
190.248.150.138 attackbots
Aug 24 02:09:55 abendstille sshd\[16943\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=190.248.150.138  user=root
Aug 24 02:09:57 abendstille sshd\[16943\]: Failed password for root from 190.248.150.138 port 42230 ssh2
Aug 24 02:15:22 abendstille sshd\[22118\]: Invalid user ftp from 190.248.150.138
Aug 24 02:15:22 abendstille sshd\[22118\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=190.248.150.138
Aug 24 02:15:24 abendstille sshd\[22118\]: Failed password for invalid user ftp from 190.248.150.138 port 50292 ssh2
...
2020-08-24 08:21:38
193.112.27.122 attackspam
Aug 23 22:32:18 serwer sshd\[10229\]: Invalid user taiga from 193.112.27.122 port 36186
Aug 23 22:32:19 serwer sshd\[10229\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=193.112.27.122
Aug 23 22:32:20 serwer sshd\[10229\]: Failed password for invalid user taiga from 193.112.27.122 port 36186 ssh2
...
2020-08-24 08:10:21
134.209.164.184 attack
Aug 24 01:06:16 cosmoit sshd[24476]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.209.164.184
2020-08-24 08:19:14
222.186.180.41 attack
2020-08-24T00:19:47.422709abusebot-8.cloudsearch.cf sshd[29713]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.180.41  user=root
2020-08-24T00:19:49.139813abusebot-8.cloudsearch.cf sshd[29713]: Failed password for root from 222.186.180.41 port 11426 ssh2
2020-08-24T00:19:52.837908abusebot-8.cloudsearch.cf sshd[29713]: Failed password for root from 222.186.180.41 port 11426 ssh2
2020-08-24T00:19:47.422709abusebot-8.cloudsearch.cf sshd[29713]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.180.41  user=root
2020-08-24T00:19:49.139813abusebot-8.cloudsearch.cf sshd[29713]: Failed password for root from 222.186.180.41 port 11426 ssh2
2020-08-24T00:19:52.837908abusebot-8.cloudsearch.cf sshd[29713]: Failed password for root from 222.186.180.41 port 11426 ssh2
2020-08-24T00:19:47.422709abusebot-8.cloudsearch.cf sshd[29713]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ss
...
2020-08-24 08:23:06

Recently Reported IPs

98.248.157.83 170.216.42.189 185.212.129.147 217.19.239.65
65.2.109.205 110.36.223.234 177.120.48.217 45.169.216.3
124.109.32.106 109.253.208.237 109.71.35.41 2.39.120.232
91.152.228.178 185.138.200.161 155.209.46.231 136.243.73.142
114.83.85.50 148.81.214.20 109.248.190.37 177.19.97.31