Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Roanoke

Region: Texas

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 50.95.50.136
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 42221
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;50.95.50.136.			IN	A

;; AUTHORITY SECTION:
.			520	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2020021103 1800 900 604800 86400

;; Query time: 190 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Feb 12 05:45:49 CST 2020
;; MSG SIZE  rcvd: 116
Host info
Host 136.50.95.50.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 136.50.95.50.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
222.186.175.154 attackspam
Dec 27 13:00:44 root sshd[4615]: Failed password for root from 222.186.175.154 port 16904 ssh2
Dec 27 13:00:47 root sshd[4615]: Failed password for root from 222.186.175.154 port 16904 ssh2
Dec 27 13:00:50 root sshd[4615]: Failed password for root from 222.186.175.154 port 16904 ssh2
Dec 27 13:00:55 root sshd[4615]: Failed password for root from 222.186.175.154 port 16904 ssh2
...
2019-12-27 20:04:20
198.211.124.188 attack
Dec 27 14:42:41 itv-usvr-02 sshd[24193]: Invalid user wedlake from 198.211.124.188 port 42248
Dec 27 14:42:41 itv-usvr-02 sshd[24193]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=198.211.124.188
Dec 27 14:42:41 itv-usvr-02 sshd[24193]: Invalid user wedlake from 198.211.124.188 port 42248
Dec 27 14:42:43 itv-usvr-02 sshd[24193]: Failed password for invalid user wedlake from 198.211.124.188 port 42248 ssh2
Dec 27 14:45:44 itv-usvr-02 sshd[24211]: Invalid user admin from 198.211.124.188 port 47236
2019-12-27 20:12:57
97.87.244.154 attackbotsspam
Dec 27 12:53:42 MK-Soft-Root1 sshd[21483]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=97.87.244.154 
Dec 27 12:53:44 MK-Soft-Root1 sshd[21483]: Failed password for invalid user dasilva from 97.87.244.154 port 46962 ssh2
...
2019-12-27 20:16:41
183.145.208.214 attackbots
FTP/21 MH Probe, BF, Hack -
2019-12-27 20:12:00
185.156.73.66 attackbots
12/27/2019-06:44:47.526033 185.156.73.66 Protocol: 6 ET SCAN NMAP -sS window 1024
2019-12-27 19:57:29
106.222.73.197 attackbots
1577427828 - 12/27/2019 07:23:48 Host: 106.222.73.197/106.222.73.197 Port: 445 TCP Blocked
2019-12-27 19:48:59
111.19.162.80 attackspambots
Dec 27 12:37:16 mail sshd\[24200\]: Invalid user dinsa from 111.19.162.80
Dec 27 12:37:16 mail sshd\[24200\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.19.162.80
Dec 27 12:37:18 mail sshd\[24200\]: Failed password for invalid user dinsa from 111.19.162.80 port 46056 ssh2
...
2019-12-27 20:24:39
112.85.42.174 attackspambots
Dec 27 13:05:08 SilenceServices sshd[15228]: Failed password for root from 112.85.42.174 port 47813 ssh2
Dec 27 13:05:22 SilenceServices sshd[15228]: error: maximum authentication attempts exceeded for root from 112.85.42.174 port 47813 ssh2 [preauth]
Dec 27 13:05:28 SilenceServices sshd[15326]: Failed password for root from 112.85.42.174 port 12029 ssh2
2019-12-27 20:21:20
195.244.209.112 attackspam
Brute forcing RDP port 3389
2019-12-27 20:16:25
59.32.99.250 attackbots
FTP Brute Force
2019-12-27 20:02:21
110.77.170.220 attackspam
Automatic report - Port Scan Attack
2019-12-27 19:43:20
42.114.162.97 attackspam
1577427801 - 12/27/2019 07:23:21 Host: 42.114.162.97/42.114.162.97 Port: 445 TCP Blocked
2019-12-27 20:07:39
1.194.238.187 attackbotsspam
Dec 25 00:44:53 b2b-pharm sshd[13520]: Invalid user userimport from 1.194.238.187 port 46307
Dec 25 00:44:53 b2b-pharm sshd[13520]: error: maximum authentication attempts exceeded for invalid user userimport from 1.194.238.187 port 46307 ssh2 [preauth]
Dec 25 00:44:53 b2b-pharm sshd[13520]: Invalid user userimport from 1.194.238.187 port 46307
Dec 25 00:44:53 b2b-pharm sshd[13520]: error: maximum authentication attempts exceeded for invalid user userimport from 1.194.238.187 port 46307 ssh2 [preauth]
Dec 25 00:44:53 b2b-pharm sshd[13520]: Invalid user userimport from 1.194.238.187 port 46307
Dec 25 00:44:53 b2b-pharm sshd[13520]: error: maximum authentication attempts exceeded for invalid user userimport from 1.194.238.187 port 46307 ssh2 [preauth]


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=1.194.238.187
2019-12-27 20:12:28
14.236.127.207 attackbots
1577427782 - 12/27/2019 07:23:02 Host: 14.236.127.207/14.236.127.207 Port: 445 TCP Blocked
2019-12-27 20:19:45
113.190.140.239 attack
Dec 27 07:23:36 vpn01 sshd[9985]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=113.190.140.239
Dec 27 07:23:38 vpn01 sshd[9985]: Failed password for invalid user admin from 113.190.140.239 port 1970 ssh2
...
2019-12-27 19:55:18

Recently Reported IPs

187.178.168.217 58.22.61.221 89.85.74.140 124.55.239.171
216.232.15.99 46.42.162.49 37.113.176.22 3.80.75.207
103.217.121.5 222.196.237.150 129.93.15.106 67.188.234.245
182.123.22.168 212.237.131.162 81.109.94.32 223.88.58.139
157.25.153.54 116.42.196.251 122.219.12.158 84.80.210.42