Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Singapore

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 8.130.20.50
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 42100
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;8.130.20.50.			IN	A

;; AUTHORITY SECTION:
.			431	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022062500 1800 900 604800 86400

;; Query time: 22 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Jun 25 23:03:40 CST 2022
;; MSG SIZE  rcvd: 104
Host info
Host 50.20.130.8.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 50.20.130.8.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
220.72.41.77 attack
Sep 10 18:56:40 mail sshd[11665]: Failed password for root from 220.72.41.77 port 56112 ssh2
2020-09-11 14:39:04
91.240.143.251 attackspam
Listed on    rbldns-ru also zen-spamhaus and abuseat-org   / proto=6  .  srcport=50283  .  dstport=23  .     (789)
2020-09-11 14:26:03
212.70.149.20 attackbots
Sep 11 08:28:30 galaxy event: galaxy/lswi: smtp: olympus@uni-potsdam.de [212.70.149.20] authentication failure using internet password
Sep 11 08:28:54 galaxy event: galaxy/lswi: smtp: olli@uni-potsdam.de [212.70.149.20] authentication failure using internet password
Sep 11 08:29:19 galaxy event: galaxy/lswi: smtp: olive@uni-potsdam.de [212.70.149.20] authentication failure using internet password
Sep 11 08:29:44 galaxy event: galaxy/lswi: smtp: ofx@uni-potsdam.de [212.70.149.20] authentication failure using internet password
Sep 11 08:30:08 galaxy event: galaxy/lswi: smtp: official@uni-potsdam.de [212.70.149.20] authentication failure using internet password
...
2020-09-11 14:36:35
112.119.190.70 attackbotsspam
Sep 10 19:06:57 debian64 sshd[28057]: Failed password for root from 112.119.190.70 port 48813 ssh2
...
2020-09-11 14:29:15
90.226.212.130 attack
Invalid user admin from 90.226.212.130 port 44440
2020-09-11 14:38:44
47.107.45.148 attackspam
2020-09-10T16:56:00.777314www1-sb.mstrade.org sshd[27054]: Failed password for invalid user postgresql from 47.107.45.148 port 51276 ssh2
2020-09-10T16:56:42.007467www1-sb.mstrade.org sshd[27093]: Invalid user print from 47.107.45.148 port 55480
2020-09-10T16:56:42.012194www1-sb.mstrade.org sshd[27093]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=47.107.45.148
2020-09-10T16:56:42.007467www1-sb.mstrade.org sshd[27093]: Invalid user print from 47.107.45.148 port 55480
2020-09-10T16:56:43.943267www1-sb.mstrade.org sshd[27093]: Failed password for invalid user print from 47.107.45.148 port 55480 ssh2
...
2020-09-11 14:33:36
36.235.71.115 attack
Listed on    dnsbl-sorbs plus abuseat-org and zen-spamhaus   / proto=6  .  srcport=59676  .  dstport=23  .     (785)
2020-09-11 14:50:55
221.163.8.108 attackspambots
Sep 11 07:43:22 root sshd[10911]: Failed password for root from 221.163.8.108 port 48664 ssh2
...
2020-09-11 14:39:53
144.217.70.190 attackbotsspam
144.217.70.190 - - [11/Sep/2020:08:13:38 +0200] "POST /wp-login.php HTTP/1.0" 200 4794 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
...
2020-09-11 14:51:57
173.25.180.7 attackspambots
Sep 10 18:56:35 mail sshd[11615]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=173.25.180.7
2020-09-11 14:42:20
41.193.122.237 attackspam
IP attempted unauthorised action
2020-09-11 14:30:15
27.6.204.181 attackbotsspam
8080/tcp
[2020-09-10]1pkt
2020-09-11 14:49:42
139.162.16.60 attackbots
" "
2020-09-11 14:55:18
141.98.10.214 attack
Sep 10 20:28:51 hanapaa sshd\[3077\]: Invalid user admin from 141.98.10.214
Sep 10 20:28:51 hanapaa sshd\[3077\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=141.98.10.214
Sep 10 20:28:53 hanapaa sshd\[3077\]: Failed password for invalid user admin from 141.98.10.214 port 43551 ssh2
Sep 10 20:29:12 hanapaa sshd\[3137\]: Invalid user admin from 141.98.10.214
Sep 10 20:29:12 hanapaa sshd\[3137\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=141.98.10.214
2020-09-11 14:55:57
58.61.145.26 attack
(smtpauth) Failed SMTP AUTH login from 58.61.145.26 (CN/China/-): 1 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_TRIGGER; Logs: 2020-09-11 11:11:38 login authenticator failed for (mail.kbmed.ir) [58.61.145.26]: 535 Incorrect authentication data (set_id=nologin)
2020-09-11 14:55:36

Recently Reported IPs

121.140.208.242 172.94.125.197 98.159.123.95 169.229.95.171
80.11.164.40 173.30.148.82 189.150.155.131 137.226.40.85
143.255.140.125 92.53.70.73 20.89.244.226 119.126.158.107
50.59.99.98 41.215.223.234 141.94.203.217 131.108.201.48
190.109.236.108 80.142.87.210 81.149.28.143 171.14.4.176