Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Canada

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 50.100.135.45
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 15103
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;50.100.135.45.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025010602 1800 900 604800 86400

;; Query time: 15 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Jan 07 12:10:36 CST 2025
;; MSG SIZE  rcvd: 106
Host info
45.135.100.50.in-addr.arpa domain name pointer bras-base-mtrlpq0505w-grc-22-50-100-135-45.dsl.bell.ca.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
45.135.100.50.in-addr.arpa	name = bras-base-mtrlpq0505w-grc-22-50-100-135-45.dsl.bell.ca.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
188.0.139.226 attackspambots
Unauthorized connection attempt detected from IP address 188.0.139.226 to port 445
2019-12-26 01:41:45
106.12.86.193 attackspam
SSH/22 MH Probe, BF, Hack -
2019-12-26 01:45:01
119.28.191.184 attackspambots
Dec 25 18:09:39 vps691689 sshd[17901]: Failed password for root from 119.28.191.184 port 37366 ssh2
Dec 25 18:12:41 vps691689 sshd[17981]: Failed password for root from 119.28.191.184 port 34028 ssh2
...
2019-12-26 01:28:53
200.83.81.18 attack
Automatic report - Port Scan Attack
2019-12-26 01:32:11
218.92.0.184 attackspambots
Dec 25 18:27:51 51-15-180-239 sshd[29913]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.184  user=root
Dec 25 18:27:52 51-15-180-239 sshd[29913]: Failed password for root from 218.92.0.184 port 22772 ssh2
...
2019-12-26 01:32:46
122.175.63.155 attack
Port 22 Scan, PTR: None
2019-12-26 01:44:37
61.71.20.151 attackspambots
Unauthorized connection attempt from IP address 61.71.20.151 on Port 445(SMB)
2019-12-26 01:52:09
158.69.194.115 attackbots
SSH bruteforce (Triggered fail2ban)
2019-12-26 01:46:44
180.76.150.241 attackspam
Dec 25 15:56:34 server sshd\[32196\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.76.150.241  user=root
Dec 25 15:56:35 server sshd\[32196\]: Failed password for root from 180.76.150.241 port 53784 ssh2
Dec 25 17:53:20 server sshd\[23410\]: Invalid user ziyou from 180.76.150.241
Dec 25 17:53:20 server sshd\[23410\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.76.150.241 
Dec 25 17:53:22 server sshd\[23410\]: Failed password for invalid user ziyou from 180.76.150.241 port 49994 ssh2
...
2019-12-26 01:42:07
106.12.137.226 attack
Dec 25 19:53:32 server sshd\[17267\]: Invalid user home from 106.12.137.226
Dec 25 19:53:32 server sshd\[17267\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.137.226 
Dec 25 19:53:34 server sshd\[17267\]: Failed password for invalid user home from 106.12.137.226 port 42118 ssh2
Dec 25 20:11:33 server sshd\[21268\]: Invalid user admin from 106.12.137.226
Dec 25 20:11:33 server sshd\[21268\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.137.226 
...
2019-12-26 01:55:21
104.42.59.206 attackspam
Dec 25 11:19:23 askasleikir sshd[368394]: Failed password for invalid user server from 104.42.59.206 port 36202 ssh2
Dec 25 11:34:16 askasleikir sshd[368861]: Failed password for invalid user webmaster from 104.42.59.206 port 47062 ssh2
Dec 25 11:39:06 askasleikir sshd[369007]: Failed password for invalid user web from 104.42.59.206 port 59314 ssh2
2019-12-26 02:04:05
106.12.77.212 attack
Dec 25 18:37:29 tuxlinux sshd[29004]: Invalid user squid from 106.12.77.212 port 58328
Dec 25 18:37:29 tuxlinux sshd[29004]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.77.212 
Dec 25 18:37:29 tuxlinux sshd[29004]: Invalid user squid from 106.12.77.212 port 58328
Dec 25 18:37:29 tuxlinux sshd[29004]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.77.212 
...
2019-12-26 01:45:26
37.193.246.112 attackspam
Dec 25 15:53:22 debian-2gb-nbg1-2 kernel: \[938335.899945\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=37.193.246.112 DST=195.201.40.59 LEN=52 TOS=0x00 PREC=0x20 TTL=116 ID=31080 DF PROTO=TCP SPT=63448 DPT=1433 WINDOW=8192 RES=0x00 SYN URGP=0
2019-12-26 01:42:26
188.36.125.210 attackbotsspam
Dec 24 13:28:10 www sshd\[12607\]: Invalid user fresier from 188.36.125.210 port 55916
...
2019-12-26 02:04:21
104.248.46.238 attackbotsspam
SSH/22 MH Probe, BF, Hack -
2019-12-26 02:07:01

Recently Reported IPs

116.255.190.126 103.190.158.189 210.85.121.129 50.22.47.24
67.0.199.108 166.131.183.214 19.141.68.192 23.76.148.193
51.22.227.154 197.1.41.120 245.223.165.204 254.120.174.83
89.33.213.206 57.100.113.121 135.117.226.113 195.97.131.47
103.158.82.88 31.52.15.20 253.9.49.14 133.196.236.232