Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Canada

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 50.64.146.118
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 16073
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;50.64.146.118.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025012800 1800 900 604800 86400

;; Query time: 10 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Jan 28 21:58:30 CST 2025
;; MSG SIZE  rcvd: 106
Host info
Host 118.146.64.50.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 118.146.64.50.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
213.139.144.10 attack
Aug  1 06:04:38 tux-35-217 sshd\[11169\]: Invalid user 123456 from 213.139.144.10 port 55440
Aug  1 06:04:38 tux-35-217 sshd\[11169\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=213.139.144.10
Aug  1 06:04:40 tux-35-217 sshd\[11169\]: Failed password for invalid user 123456 from 213.139.144.10 port 55440 ssh2
Aug  1 06:10:51 tux-35-217 sshd\[11251\]: Invalid user ismana2121 from 213.139.144.10 port 64249
Aug  1 06:10:51 tux-35-217 sshd\[11251\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=213.139.144.10
...
2019-08-01 14:04:17
122.114.199.5 attackspam
$f2bV_matches
2019-08-01 14:45:00
49.81.38.45 attackspam
SpamReport
2019-08-01 14:39:37
81.22.45.25 attack
Port Scan: TCP/33894
2019-08-01 14:47:02
115.75.152.202 attackspambots
Unauthorized connection attempt from IP address 115.75.152.202 on Port 445(SMB)
2019-08-01 14:20:24
219.129.32.1 attackbotsspam
Jul 29 02:08:00 nandi sshd[2154]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=219.129.32.1  user=r.r
Jul 29 02:08:03 nandi sshd[2154]: Failed password for r.r from 219.129.32.1 port 57856 ssh2
Jul 29 02:08:03 nandi sshd[2154]: Received disconnect from 219.129.32.1: 11: Bye Bye [preauth]
Jul 29 02:27:46 nandi sshd[10179]: Connection closed by 219.129.32.1 [preauth]
Jul 29 02:31:12 nandi sshd[12081]: Connection closed by 219.129.32.1 [preauth]
Jul 29 02:34:40 nandi sshd[13503]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=219.129.32.1  user=r.r
Jul 29 02:34:42 nandi sshd[13503]: Failed password for r.r from 219.129.32.1 port 35392 ssh2
Jul 29 02:34:43 nandi sshd[13503]: Received disconnect from 219.129.32.1: 11: Bye Bye [preauth]
Jul 29 02:36:18 nandi sshd[14559]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=219.129.32.1  user=r.r
Jul 29 02:36:........
-------------------------------
2019-08-01 14:29:51
49.88.112.54 attack
Aug  1 03:30:24 MK-Soft-VM4 sshd\[12297\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.88.112.54  user=root
Aug  1 03:30:26 MK-Soft-VM4 sshd\[12297\]: Failed password for root from 49.88.112.54 port 47196 ssh2
Aug  1 03:30:29 MK-Soft-VM4 sshd\[12297\]: Failed password for root from 49.88.112.54 port 47196 ssh2
...
2019-08-01 14:39:03
114.112.81.180 attackspam
SSH Brute-Force attacks
2019-08-01 14:45:26
112.85.42.177 attack
v+ssh-bruteforce
2019-08-01 14:45:55
149.202.170.60 attackbots
Aug  1 07:16:57 * sshd[13726]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=149.202.170.60
Aug  1 07:17:00 * sshd[13726]: Failed password for invalid user apc from 149.202.170.60 port 45940 ssh2
2019-08-01 14:18:47
199.249.230.108 attackbotsspam
Automatic report - Banned IP Access
2019-08-01 14:07:32
106.13.98.202 attack
SSH authentication failure x 6 reported by Fail2Ban
...
2019-08-01 14:36:01
205.178.40.3 attackspam
Aug  1 10:26:08 itv-usvr-01 sshd[1078]: Invalid user ferdinand from 205.178.40.3
Aug  1 10:26:08 itv-usvr-01 sshd[1078]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=205.178.40.3
Aug  1 10:26:08 itv-usvr-01 sshd[1078]: Invalid user ferdinand from 205.178.40.3
Aug  1 10:26:10 itv-usvr-01 sshd[1078]: Failed password for invalid user ferdinand from 205.178.40.3 port 59873 ssh2
Aug  1 10:31:27 itv-usvr-01 sshd[1268]: Invalid user calistrato from 205.178.40.3
2019-08-01 14:11:38
223.71.139.97 attackspambots
Aug  1 08:08:24 vps647732 sshd[16574]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=223.71.139.97
Aug  1 08:08:26 vps647732 sshd[16574]: Failed password for invalid user Muklesr0x!221845 from 223.71.139.97 port 60972 ssh2
...
2019-08-01 14:28:57
193.124.129.56 attack
19/7/31@23:31:03: FAIL: Alarm-Intrusion address from=193.124.129.56
...
2019-08-01 14:25:23

Recently Reported IPs

131.103.121.28 190.80.221.186 142.208.114.200 147.190.251.75
4.52.62.20 22.67.120.40 108.164.209.164 163.42.179.63
46.119.74.208 232.24.74.192 42.229.85.64 199.8.146.81
210.80.97.227 65.239.53.147 129.214.133.240 149.200.238.64
109.4.83.233 44.255.206.217 78.48.34.190 72.100.226.233