Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 50.5.240.135
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 46082
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;50.5.240.135.			IN	A

;; AUTHORITY SECTION:
.			165	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022062901 1800 900 604800 86400

;; Query time: 18 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Jun 30 00:56:34 CST 2022
;; MSG SIZE  rcvd: 105
Host info
135.240.5.50.in-addr.arpa domain name pointer dsl-50-5-240-135.fuse.net.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
135.240.5.50.in-addr.arpa	name = dsl-50-5-240-135.fuse.net.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
51.79.35.114 attackbots
[H1.VM7] Blocked by UFW
2020-09-28 04:05:36
141.105.105.101 attackbotsspam
Sep 26 22:39:49 localhost sshd\[31872\]: Invalid user admin from 141.105.105.101
Sep 26 22:39:49 localhost sshd\[31872\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=141.105.105.101
Sep 26 22:39:51 localhost sshd\[31872\]: Failed password for invalid user admin from 141.105.105.101 port 35100 ssh2
Sep 26 22:39:54 localhost sshd\[31874\]: Invalid user admin from 141.105.105.101
Sep 26 22:39:55 localhost sshd\[31874\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=141.105.105.101
...
2020-09-28 04:26:48
129.204.33.4 attackbotsspam
Sep 27 21:13:31 haigwepa sshd[14876]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.204.33.4 
Sep 27 21:13:32 haigwepa sshd[14876]: Failed password for invalid user hb from 129.204.33.4 port 46886 ssh2
...
2020-09-28 04:34:42
164.68.105.165 attack
Found on Block CINS-badguys  / proto=6  .  srcport=41861  .  dstport=5038  .     (2483)
2020-09-28 04:30:37
52.188.5.139 attack
Flask-IPban - exploit URL requested:/xmlrpc.php
2020-09-28 04:26:18
192.241.234.66 attack
TCP port : 5222
2020-09-28 04:10:15
69.175.97.171 attackbots
Port Scan/VNC login attempt
...
2020-09-28 04:15:33
106.52.64.125 attack
Sep 27 17:41:37 sso sshd[31742]: Failed password for root from 106.52.64.125 port 53308 ssh2
...
2020-09-28 03:57:04
125.19.16.194 attackbotsspam
1433/tcp 445/tcp...
[2020-08-02/09-26]18pkt,2pt.(tcp)
2020-09-28 04:22:22
52.130.73.105 attack
2375/tcp 2375/tcp
[2020-07-31/09-26]2pkt
2020-09-28 04:27:14
134.209.150.94 attack
 TCP (SYN) 134.209.150.94:54706 -> port 8872, len 44
2020-09-28 04:09:00
192.241.234.43 attackspambots
[N3.H3.VM3] Port Scanner Detected Blocked by UFW
2020-09-28 04:06:04
113.174.63.46 attackspambots
firewall-block, port(s): 445/tcp
2020-09-28 04:14:42
52.175.226.167 attack
Invalid user 230 from 52.175.226.167 port 3143
2020-09-28 04:23:17
37.212.179.242 attack
Attempted Brute Force (dovecot)
2020-09-28 04:11:07

Recently Reported IPs

168.227.200.161 95.105.118.79 137.226.23.64 137.226.177.1
144.22.199.99 45.163.65.5 46.161.27.204 137.226.158.116
137.226.133.98 38.44.72.204 137.226.218.190 50.106.180.171
154.47.107.31 137.226.203.63 137.226.59.0 137.226.176.211
38.125.204.208 83.43.3.69 201.182.232.133 137.226.206.173