Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Shafter

Region: California

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 50.91.237.139
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 31300
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;50.91.237.139.			IN	A

;; AUTHORITY SECTION:
.			448	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2020102201 1800 900 604800 86400

;; Query time: 56 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Oct 23 00:38:31 CST 2020
;; MSG SIZE  rcvd: 117
Host info
139.237.91.50.in-addr.arpa domain name pointer 050-091-237-139.res.spectrum.com.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
139.237.91.50.in-addr.arpa	name = 050-091-237-139.res.spectrum.com.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
194.135.15.6 attack
Dovecot Invalid User Login Attempt.
2020-09-10 14:38:55
111.229.79.169 attackspambots
Sep 10 08:10:24 eventyay sshd[18686]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.229.79.169
Sep 10 08:10:26 eventyay sshd[18686]: Failed password for invalid user gitadmin from 111.229.79.169 port 56184 ssh2
Sep 10 08:15:21 eventyay sshd[18779]: Failed password for root from 111.229.79.169 port 51870 ssh2
...
2020-09-10 14:35:01
180.97.182.226 attackbots
2020-09-09T23:07:59.788770+02:00  sshd[7205]: Failed password for invalid user admin from 180.97.182.226 port 58312 ssh2
2020-09-10 14:49:21
114.246.34.138 attackbotsspam
Unauthorised access (Sep  9) SRC=114.246.34.138 LEN=52 TTL=106 ID=18485 DF TCP DPT=1433 WINDOW=8192 SYN
2020-09-10 14:45:09
220.66.155.2 attack
Dovecot Invalid User Login Attempt.
2020-09-10 14:21:41
51.77.146.156 attackspam
$f2bV_matches
2020-09-10 14:44:24
103.253.145.125 attackbotsspam
Lines containing failures of 103.253.145.125
Sep  9 04:04:00 shared03 sshd[9680]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.253.145.125  user=r.r
Sep  9 04:04:02 shared03 sshd[9680]: Failed password for r.r from 103.253.145.125 port 40216 ssh2
Sep  9 04:04:03 shared03 sshd[9680]: Received disconnect from 103.253.145.125 port 40216:11: Bye Bye [preauth]
Sep  9 04:04:03 shared03 sshd[9680]: Disconnected from authenticating user r.r 103.253.145.125 port 40216 [preauth]
Sep  9 04:09:38 shared03 sshd[11451]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.253.145.125  user=r.r
Sep  9 04:09:41 shared03 sshd[11451]: Failed password for r.r from 103.253.145.125 port 52672 ssh2
Sep  9 04:09:41 shared03 sshd[11451]: Received disconnect from 103.253.145.125 port 52672:11: Bye Bye [preauth]
Sep  9 04:09:41 shared03 sshd[11451]: Disconnected from authenticating user r.r 103.253.145.125 port ........
------------------------------
2020-09-10 14:52:45
54.39.138.246 attack
*Port Scan* detected from 54.39.138.246 (CA/Canada/Alberta/St. Albert/ip246.ip-54-39-138.net). 4 hits in the last 105 seconds
2020-09-10 14:36:07
58.71.220.66 attackbots
Sep  9 18:31:01 sachi sshd\[14335\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=58.71.220.66  user=root
Sep  9 18:31:03 sachi sshd\[14335\]: Failed password for root from 58.71.220.66 port 1261 ssh2
Sep  9 18:33:22 sachi sshd\[14534\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=58.71.220.66  user=root
Sep  9 18:33:25 sachi sshd\[14534\]: Failed password for root from 58.71.220.66 port 62724 ssh2
Sep  9 18:35:42 sachi sshd\[14705\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=58.71.220.66  user=root
2020-09-10 14:42:34
198.46.233.148 attackspambots
Sep 10 08:25:06 root sshd[19830]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=198.46.233.148 
Sep 10 08:25:08 root sshd[19830]: Failed password for invalid user duke from 198.46.233.148 port 48948 ssh2
...
2020-09-10 14:36:39
162.142.125.52 attackbots
\[Thu Sep 10 08:18:01 2020\] \[error\] \[client 162.142.125.52\] client denied by server configuration: /var/www/html/default/
\[Thu Sep 10 08:18:01 2020\] \[error\] \[client 162.142.125.52\] client denied by server configuration: /var/www/html/default/.noindex.html
\[Thu Sep 10 08:18:01 2020\] \[error\] \[client 162.142.125.52\] client denied by server configuration: /var/www/html/default/
...
2020-09-10 14:29:18
112.85.42.200 attack
2020-09-10T08:58:14.115570afi-git.jinr.ru sshd[28549]: Failed password for root from 112.85.42.200 port 44368 ssh2
2020-09-10T08:58:17.205699afi-git.jinr.ru sshd[28549]: Failed password for root from 112.85.42.200 port 44368 ssh2
2020-09-10T08:58:21.312448afi-git.jinr.ru sshd[28549]: Failed password for root from 112.85.42.200 port 44368 ssh2
2020-09-10T08:58:21.312602afi-git.jinr.ru sshd[28549]: error: maximum authentication attempts exceeded for root from 112.85.42.200 port 44368 ssh2 [preauth]
2020-09-10T08:58:21.312616afi-git.jinr.ru sshd[28549]: Disconnecting: Too many authentication failures [preauth]
...
2020-09-10 14:20:53
140.143.9.175 attack
...
2020-09-10 14:14:30
134.175.55.10 attack
(sshd) Failed SSH login from 134.175.55.10 (CN/China/-): 5 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: Sep  9 16:05:40 server5 sshd[30350]: Invalid user zennia from 134.175.55.10
Sep  9 16:05:40 server5 sshd[30350]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.175.55.10 
Sep  9 16:05:42 server5 sshd[30350]: Failed password for invalid user zennia from 134.175.55.10 port 57266 ssh2
Sep  9 16:16:19 server5 sshd[3436]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.175.55.10  user=root
Sep  9 16:16:21 server5 sshd[3436]: Failed password for root from 134.175.55.10 port 36822 ssh2
2020-09-10 14:26:31
77.37.162.17 attack
Sep 10 04:01:14 * sshd[26271]: Failed password for root from 77.37.162.17 port 37610 ssh2
Sep 10 04:04:55 * sshd[26611]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=77.37.162.17
2020-09-10 14:48:23

Recently Reported IPs

54.151.99.6 75.101.230.127 178.159.126.11 46.249.16.247
129.213.32.3 88.87.72.14 120.188.32.50 31.0.39.190
103.152.21.188 24.242.249.196 189.223.35.239 80.156.90.180
188.186.78.30 94.62.224.72 161.230.64.129 87.229.77.136
72.191.115.228 187.209.33.53 46.148.186.139 178.35.119.15