Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: China

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 1.14.150.65
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 5248
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;1.14.150.65.			IN	A

;; AUTHORITY SECTION:
.			583	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022030701 1800 900 604800 86400

;; Query time: 20 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Mar 08 13:05:20 CST 2022
;; MSG SIZE  rcvd: 104
Host info
Host 65.150.14.1.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 65.150.14.1.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
41.222.172.57 attackspambots
Attempted connection to port 445.
2020-08-16 06:12:32
144.64.117.42 attack
Attempted connection to port 23.
2020-08-16 06:21:52
189.170.126.108 attack
Unauthorized connection attempt from IP address 189.170.126.108 on Port 445(SMB)
2020-08-16 06:45:33
223.205.184.185 attackspambots
Attempted connection to port 445.
2020-08-16 06:12:58
178.128.226.2 attackbots
2020-08-15T22:10:41.248771shield sshd\[16526\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.128.226.2  user=root
2020-08-15T22:10:43.196810shield sshd\[16526\]: Failed password for root from 178.128.226.2 port 47932 ssh2
2020-08-15T22:14:28.002938shield sshd\[16990\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.128.226.2  user=root
2020-08-15T22:14:29.635039shield sshd\[16990\]: Failed password for root from 178.128.226.2 port 53121 ssh2
2020-08-15T22:18:12.066556shield sshd\[17475\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.128.226.2  user=root
2020-08-16 06:37:57
185.193.26.150 attack
Unauthorized connection attempt from IP address 185.193.26.150 on Port 445(SMB)
2020-08-16 06:42:36
217.131.77.243 attack
Attempted connection to port 445.
2020-08-16 06:13:46
106.112.155.53 attack
Attempted connection to port 23.
2020-08-16 06:30:30
188.0.169.231 attackbots
Attempted connection to port 445.
2020-08-16 06:18:06
139.155.35.47 attack
Aug 15 18:19:04 firewall sshd[19839]: Failed password for root from 139.155.35.47 port 50918 ssh2
Aug 15 18:22:39 firewall sshd[20013]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.155.35.47  user=root
Aug 15 18:22:41 firewall sshd[20013]: Failed password for root from 139.155.35.47 port 45130 ssh2
...
2020-08-16 06:16:38
62.102.148.68 attackspambots
2020-08-15T22:25:44+0000 Failed SSH Authentication/Brute Force Attack. (Server 6)
2020-08-16 06:36:51
176.241.196.181 attackbotsspam
Unauthorized connection attempt from IP address 176.241.196.181 on Port 445(SMB)
2020-08-16 06:45:47
156.207.133.132 attack
[N10.H2.VM2] Port Scanner Detected Blocked by UFW
2020-08-16 06:23:28
106.12.148.170 attack
Fail2Ban Ban Triggered (2)
2020-08-16 06:14:29
187.207.103.69 attack
Attempted connection to port 23.
2020-08-16 06:19:59

Recently Reported IPs

1.13.165.195 1.14.250.234 1.144.111.27 1.145.209.160
1.146.159.237 1.146.250.104 1.146.93.102 1.147.8.4
1.15.13.134 1.15.138.94 1.15.172.196 1.15.182.105
1.15.24.232 1.15.240.251 1.15.245.115 1.15.34.39
1.156.83.47 1.160.106.168 1.160.148.51 1.160.242.116