Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States of America (the)

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 50.145.4.54
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 13168
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;50.145.4.54.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025012501 1800 900 604800 86400

;; Query time: 14 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Jan 26 05:12:58 CST 2025
;; MSG SIZE  rcvd: 104
Host info
54.4.145.50.in-addr.arpa domain name pointer ussf54.upstreamsecurity.net.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
54.4.145.50.in-addr.arpa	name = ussf54.upstreamsecurity.net.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
103.15.106.120 attackbots
Jun 24 21:43:40 xb3 sshd[17313]: Failed password for invalid user ssingh from 103.15.106.120 port 49844 ssh2
Jun 24 21:43:41 xb3 sshd[17313]: Received disconnect from 103.15.106.120: 11: Bye Bye [preauth]
Jun 24 21:46:50 xb3 sshd[13748]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.15.106.120  user=r.r
Jun 24 21:46:52 xb3 sshd[13748]: Failed password for r.r from 103.15.106.120 port 28910 ssh2
Jun 24 21:46:52 xb3 sshd[13748]: Received disconnect from 103.15.106.120: 11: Bye Bye [preauth]
Jun 24 21:48:38 xb3 sshd[18541]: Failed password for invalid user jake from 103.15.106.120 port 46624 ssh2
Jun 24 21:48:38 xb3 sshd[18541]: Received disconnect from 103.15.106.120: 11: Bye Bye [preauth]


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=103.15.106.120
2019-06-27 01:55:59
193.9.245.143 attack
RDP Brute-Force (Grieskirchen RZ1)
2019-06-27 02:14:21
121.182.166.81 attackbotsspam
Jun 26 15:36:42 meumeu sshd[9749]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.182.166.81 
Jun 26 15:36:44 meumeu sshd[9749]: Failed password for invalid user tomcat from 121.182.166.81 port 41067 ssh2
Jun 26 15:38:42 meumeu sshd[9945]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.182.166.81 
...
2019-06-27 01:47:37
168.194.152.107 attack
SMTP-sasl brute force
...
2019-06-27 02:13:33
94.191.60.199 attackspam
Jun 26 17:06:27 server sshd[45207]: Failed password for invalid user kslewin from 94.191.60.199 port 41326 ssh2
Jun 26 17:11:08 server sshd[46280]: Failed password for invalid user tracker from 94.191.60.199 port 49642 ssh2
Jun 26 17:13:34 server sshd[46913]: Failed password for invalid user admin from 94.191.60.199 port 38068 ssh2
2019-06-27 02:28:40
190.177.120.230 attackspambots
23/tcp
[2019-06-26]1pkt
2019-06-27 02:09:15
151.239.76.170 attackspambots
Telnetd brute force attack detected by fail2ban
2019-06-27 01:49:35
62.12.69.144 attackbots
5555/tcp
[2019-06-26]1pkt
2019-06-27 02:15:20
51.75.52.127 attack
Port scan: Attack repeated for 24 hours
2019-06-27 01:52:52
2.153.184.166 attackbotsspam
Jun 26 18:15:05 web24hdcode sshd[122077]: Invalid user git5 from 2.153.184.166 port 48058
Jun 26 18:15:05 web24hdcode sshd[122077]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=2.153.184.166
Jun 26 18:15:05 web24hdcode sshd[122077]: Invalid user git5 from 2.153.184.166 port 48058
Jun 26 18:15:07 web24hdcode sshd[122077]: Failed password for invalid user git5 from 2.153.184.166 port 48058 ssh2
Jun 26 18:17:06 web24hdcode sshd[122083]: Invalid user tomcat from 2.153.184.166 port 36792
Jun 26 18:17:06 web24hdcode sshd[122083]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=2.153.184.166
Jun 26 18:17:06 web24hdcode sshd[122083]: Invalid user tomcat from 2.153.184.166 port 36792
Jun 26 18:17:07 web24hdcode sshd[122083]: Failed password for invalid user tomcat from 2.153.184.166 port 36792 ssh2
Jun 26 18:19:01 web24hdcode sshd[122087]: Invalid user logger from 2.153.184.166 port 53762
...
2019-06-27 02:09:56
127.0.0.1 attackbotsspam
Test Connectivity
2019-06-27 02:22:02
171.252.35.16 attackspambots
445/tcp
[2019-06-26]1pkt
2019-06-27 02:30:26
49.83.214.115 attack
22/tcp
[2019-06-26]1pkt
2019-06-27 02:07:52
94.182.140.43 attack
TCP src-port=48850   dst-port=25    dnsbl-sorbs abuseat-org spamcop         (899)
2019-06-27 01:46:23
51.218.251.114 attackbotsspam
445/tcp
[2019-06-26]1pkt
2019-06-27 02:27:43

Recently Reported IPs

237.159.79.233 52.30.188.35 169.253.218.46 134.115.6.252
184.184.197.242 37.184.255.117 228.67.50.114 36.237.216.159
201.183.216.153 230.42.246.247 142.16.78.215 167.13.70.81
7.147.115.0 28.73.207.142 39.30.232.43 74.222.3.238
201.174.143.170 151.224.171.145 4.15.221.52 184.16.34.37