Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Russian Federation

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 45.159.22.50
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 23505
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;45.159.22.50.			IN	A

;; AUTHORITY SECTION:
.			151	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022091600 1800 900 604800 86400

;; Query time: 20 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Sep 16 21:37:27 CST 2022
;; MSG SIZE  rcvd: 105
Host info
Host 50.22.159.45.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 50.22.159.45.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
189.89.210.58 attackspam
failed_logins
2019-08-01 23:25:27
128.199.169.39 attackbots
Automatic report - Banned IP Access
2019-08-01 23:47:15
188.131.134.157 attack
Jan 23 07:24:02 vtv3 sshd\[12340\]: Invalid user convoc from 188.131.134.157 port 52398
Jan 23 07:24:02 vtv3 sshd\[12340\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.131.134.157
Jan 23 07:24:04 vtv3 sshd\[12340\]: Failed password for invalid user convoc from 188.131.134.157 port 52398 ssh2
Jan 23 07:29:02 vtv3 sshd\[13785\]: Invalid user isac from 188.131.134.157 port 54298
Jan 23 07:29:02 vtv3 sshd\[13785\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.131.134.157
Feb 16 17:22:08 vtv3 sshd\[21847\]: Invalid user alfresco from 188.131.134.157 port 54328
Feb 16 17:22:08 vtv3 sshd\[21847\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.131.134.157
Feb 16 17:22:11 vtv3 sshd\[21847\]: Failed password for invalid user alfresco from 188.131.134.157 port 54328 ssh2
Feb 16 17:28:06 vtv3 sshd\[23346\]: Invalid user ubuntu from 188.131.134.157 port 49524
Feb 16 17:28:06
2019-08-01 23:57:57
50.193.147.222 attackspam
Honeypot hit.
2019-08-02 00:14:47
51.38.99.73 attackspambots
Aug  1 19:10:30 SilenceServices sshd[29090]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.38.99.73
Aug  1 19:10:32 SilenceServices sshd[29090]: Failed password for invalid user teamspeak from 51.38.99.73 port 39368 ssh2
Aug  1 19:14:39 SilenceServices sshd[32132]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.38.99.73
2019-08-02 01:24:55
203.230.6.175 attackspambots
Aug  1 13:23:12 MK-Soft-VM6 sshd\[8209\]: Invalid user katrin from 203.230.6.175 port 38376
Aug  1 13:23:12 MK-Soft-VM6 sshd\[8209\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=203.230.6.175
Aug  1 13:23:14 MK-Soft-VM6 sshd\[8209\]: Failed password for invalid user katrin from 203.230.6.175 port 38376 ssh2
...
2019-08-02 01:32:54
54.39.148.234 attack
Automatic report - Banned IP Access
2019-08-01 23:44:34
209.235.67.49 attack
Aug  1 17:28:36 * sshd[25681]: Failed password for git from 209.235.67.49 port 57578 ssh2
Aug  1 17:32:53 * sshd[26204]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=209.235.67.49
2019-08-01 23:59:06
120.220.22.5 attack
Jul 30 10:47:16 shared09 sshd[20139]: Invalid user tino from 120.220.22.5
Jul 30 10:47:16 shared09 sshd[20139]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=120.220.22.5
Jul 30 10:47:18 shared09 sshd[20139]: Failed password for invalid user tino from 120.220.22.5 port 38471 ssh2
Jul 30 10:47:18 shared09 sshd[20139]: Received disconnect from 120.220.22.5 port 38471:11: Bye Bye [preauth]
Jul 30 10:47:18 shared09 sshd[20139]: Disconnected from 120.220.22.5 port 38471 [preauth]


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=120.220.22.5
2019-08-01 23:48:32
199.195.251.84 attackbots
Aug  1 15:25:09 dev0-dcfr-rnet sshd[15766]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=199.195.251.84
Aug  1 15:25:11 dev0-dcfr-rnet sshd[15766]: Failed password for invalid user default from 199.195.251.84 port 39038 ssh2
Aug  1 15:25:15 dev0-dcfr-rnet sshd[15768]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=199.195.251.84
2019-08-01 23:21:41
194.44.230.115 attack
proto=tcp  .  spt=34291  .  dpt=25  .     (listed on Blocklist de  Jul 31)     (491)
2019-08-02 00:53:35
189.51.103.77 attackbotsspam
Aug  1 15:21:09 xeon postfix/smtpd[54884]: warning: unknown[189.51.103.77]: SASL PLAIN authentication failed: authentication failure
2019-08-02 00:47:25
73.34.229.17 attack
2019-08-01T17:06:12.534384abusebot-2.cloudsearch.cf sshd\[19438\]: Invalid user deploy from 73.34.229.17 port 45326
2019-08-02 01:34:14
132.148.105.132 attackbotsspam
132.148.105.132 - - [01/Aug/2019:15:23:04 +0200] "GET /wp-login.php HTTP/1.1" 200 1301 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
132.148.105.132 - - [01/Aug/2019:15:23:05 +0200] "POST /wp-login.php HTTP/1.1" 200 1704 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
132.148.105.132 - - [01/Aug/2019:15:23:05 +0200] "GET /wp-login.php HTTP/1.1" 200 1301 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
132.148.105.132 - - [01/Aug/2019:15:23:06 +0200] "POST /wp-login.php HTTP/1.1" 200 1710 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
132.148.105.132 - - [01/Aug/2019:15:23:06 +0200] "GET /wp-login.php HTTP/1.1" 200 1301 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
132.148.105.132 - - [01/Aug/2019:15:23:07 +0200] "POST /wp-login.php HTTP/1.1" 200 1710 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
.
2019-08-02 01:35:53
68.183.160.63 attackbots
Aug  1 13:08:47 xtremcommunity sshd\[9276\]: Invalid user psanborn from 68.183.160.63 port 39270
Aug  1 13:08:47 xtremcommunity sshd\[9276\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=68.183.160.63
Aug  1 13:08:49 xtremcommunity sshd\[9276\]: Failed password for invalid user psanborn from 68.183.160.63 port 39270 ssh2
Aug  1 13:14:57 xtremcommunity sshd\[9495\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=68.183.160.63  user=mysql
Aug  1 13:14:59 xtremcommunity sshd\[9495\]: Failed password for mysql from 68.183.160.63 port 34362 ssh2
...
2019-08-02 01:28:19

Recently Reported IPs

203.23.106.84 128.90.154.213 128.90.157.254 20.43.60.47
186.5.94.201 211.52.34.17 203.204.11.39 117.55.149.122
138.68.152.130 14.177.7.187 217.160.51.135 221.221.167.251
222.213.43.233 85.104.122.183 140.255.142.232 54.37.98.108
8.219.75.219 121.236.171.247 181.66.37.78 113.23.176.254