Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Belgium

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 57.145.55.50
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 40571
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;57.145.55.50.			IN	A

;; AUTHORITY SECTION:
.			182	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022011002 1800 900 604800 86400

;; Query time: 72 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Jan 11 12:37:47 CST 2022
;; MSG SIZE  rcvd: 105
Host info
Host 50.55.145.57.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 50.55.145.57.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
123.50.7.134 attackbotsspam
fail2ban
2020-03-28 07:51:44
162.243.130.23 attack
20/3/27@17:16:29: FAIL: Alarm-Intrusion address from=162.243.130.23
...
2020-03-28 07:30:28
221.6.22.203 attackbotsspam
Mar 27 18:56:54 lanister sshd[27186]: Invalid user dwf from 221.6.22.203
Mar 27 18:56:54 lanister sshd[27186]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=221.6.22.203
Mar 27 18:56:54 lanister sshd[27186]: Invalid user dwf from 221.6.22.203
Mar 27 18:56:56 lanister sshd[27186]: Failed password for invalid user dwf from 221.6.22.203 port 40002 ssh2
2020-03-28 07:44:33
39.82.194.72 attackspam
2020-03-27T17:40:04.798978srv.ecualinux.com sshd[17149]: Invalid user pi from 39.82.194.72 port 37468
2020-03-27T17:40:05.060846srv.ecualinux.com sshd[17149]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=39.82.194.72
2020-03-27T17:40:05.637235srv.ecualinux.com sshd[17152]: Invalid user pi from 39.82.194.72 port 37462
2020-03-27T17:40:05.900702srv.ecualinux.com sshd[17152]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=39.82.194.72
2020-03-27T17:40:07.156891srv.ecualinux.com sshd[17149]: Failed password for invalid user pi from 39.82.194.72 port 37468 ssh2

........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=39.82.194.72
2020-03-28 07:48:06
106.12.57.165 attackbotsspam
(sshd) Failed SSH login from 106.12.57.165 (CN/China/-): 5 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: Mar 28 01:20:20 srv sshd[25079]: Invalid user wmu from 106.12.57.165 port 42446
Mar 28 01:20:22 srv sshd[25079]: Failed password for invalid user wmu from 106.12.57.165 port 42446 ssh2
Mar 28 01:30:44 srv sshd[25649]: Invalid user cgr from 106.12.57.165 port 60762
Mar 28 01:30:46 srv sshd[25649]: Failed password for invalid user cgr from 106.12.57.165 port 60762 ssh2
Mar 28 01:34:37 srv sshd[25809]: Invalid user apz from 106.12.57.165 port 33254
2020-03-28 07:42:21
123.206.101.196 attackspambots
Mar 27 21:11:31 124388 sshd[30837]: Invalid user jwd from 123.206.101.196 port 59984
Mar 27 21:11:31 124388 sshd[30837]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=123.206.101.196
Mar 27 21:11:31 124388 sshd[30837]: Invalid user jwd from 123.206.101.196 port 59984
Mar 27 21:11:34 124388 sshd[30837]: Failed password for invalid user jwd from 123.206.101.196 port 59984 ssh2
Mar 27 21:16:18 124388 sshd[31017]: Invalid user asn from 123.206.101.196 port 32996
2020-03-28 07:41:19
159.65.77.254 attackbots
Invalid user ssladmin from 159.65.77.254 port 50068
2020-03-28 07:50:19
177.92.90.110 attackbotsspam
Invalid user tqo from 177.92.90.110 port 3445
2020-03-28 07:51:29
183.88.243.113 attackspam
(imapd) Failed IMAP login from 183.88.243.113 (TH/Thailand/mx-ll-183.88.243-113.dynamic.3bb.co.th): 1 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_TRIGGER; Logs: Mar 28 01:46:45 ir1 dovecot[566034]: imap-login: Disconnected (auth failed, 1 attempts in 6 secs): user=, method=PLAIN, rip=183.88.243.113, lip=5.63.12.44, session=
2020-03-28 07:14:28
188.168.27.71 attack
proto=tcp  .  spt=33663  .  dpt=25  .     Found on   Blocklist de       (709)
2020-03-28 07:35:36
94.232.136.126 attack
Fail2Ban Ban Triggered (2)
2020-03-28 07:28:02
147.135.233.199 attackspambots
Invalid user demo from 147.135.233.199 port 50234
2020-03-28 07:46:07
222.73.215.81 attackspambots
Mar 27 22:46:38 ns381471 sshd[23266]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.73.215.81
Mar 27 22:46:40 ns381471 sshd[23266]: Failed password for invalid user nak from 222.73.215.81 port 48200 ssh2
2020-03-28 07:39:41
106.12.212.5 attackbotsspam
Invalid user narcissa from 106.12.212.5 port 57320
2020-03-28 07:34:51
121.66.252.158 attack
Mar 28 00:00:03 legacy sshd[3082]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.66.252.158
Mar 28 00:00:04 legacy sshd[3082]: Failed password for invalid user psl from 121.66.252.158 port 51516 ssh2
Mar 28 00:05:17 legacy sshd[3141]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.66.252.158
...
2020-03-28 07:15:28

Recently Reported IPs

25.213.26.189 203.14.61.247 109.71.206.4 221.105.119.49
178.194.78.145 204.152.242.198 120.80.45.58 82.12.235.13
141.64.248.78 158.158.48.115 103.242.248.149 219.130.138.64
158.206.124.135 181.115.143.233 53.155.198.188 80.101.34.37
28.230.104.181 60.219.249.121 176.72.213.34 48.201.144.188