Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Australia

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 1.150.42.194
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 50399
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;1.150.42.194.			IN	A

;; AUTHORITY SECTION:
.			186	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022092501 1800 900 604800 86400

;; Query time: 65 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Sep 26 04:55:45 CST 2022
;; MSG SIZE  rcvd: 105
Host info
Host 194.42.150.1.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 194.42.150.1.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
103.226.185.24 attack
$f2bV_matches | Triggered by Fail2Ban at Vostok web server
2020-02-18 08:24:18
99.137.159.161 attack
Brute forcing email accounts
2020-02-18 08:38:54
68.183.237.224 attackbotsspam
2019-09-08T00:21:14.158916-07:00 suse-nuc sshd[19113]: Invalid user user1 from 68.183.237.224 port 52974
...
2020-02-18 08:52:21
181.48.120.219 attackbots
Feb 18 00:12:45 server sshd[2222257]: Failed password for invalid user ftpuser from 181.48.120.219 port 46118 ssh2
Feb 18 00:16:14 server sshd[2234601]: Failed password for invalid user teamspeak from 181.48.120.219 port 20616 ssh2
Feb 18 00:19:50 server sshd[2247286]: Failed password for invalid user www from 181.48.120.219 port 41907 ssh2
2020-02-18 08:40:14
77.158.136.18 attack
SSH / Telnet Brute Force Attempts on Honeypot
2020-02-18 08:31:41
121.241.244.92 attackspambots
Feb 18 01:06:56 localhost sshd\[3177\]: Invalid user yi from 121.241.244.92 port 34681
Feb 18 01:06:56 localhost sshd\[3177\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.241.244.92
Feb 18 01:06:58 localhost sshd\[3177\]: Failed password for invalid user yi from 121.241.244.92 port 34681 ssh2
2020-02-18 08:43:36
222.186.175.212 attackspambots
SSH-BruteForce
2020-02-18 08:26:34
37.119.109.137 attackspam
MultiHost/MultiPort Probe, Scan, Hack -
2020-02-18 08:42:55
85.95.153.59 attackbotsspam
SMB Server BruteForce Attack
2020-02-18 08:28:20
77.141.165.154 attackbotsspam
2020-01-11T19:58:30.772985suse-nuc sshd[29337]: Invalid user ubuntu from 77.141.165.154 port 59646
...
2020-02-18 08:33:55
77.205.142.85 attack
2020-01-16T04:32:48.661804suse-nuc sshd[19365]: Invalid user randy from 77.205.142.85 port 36396
...
2020-02-18 08:24:33
77.117.145.133 attackspam
2020-01-29T13:49:21.308066suse-nuc sshd[23317]: Invalid user lucas from 77.117.145.133 port 54836
...
2020-02-18 08:37:36
77.159.249.91 attack
Ssh brute force
2020-02-18 08:31:21
159.65.7.153 attackbots
02/17/2020-23:09:50.171339 159.65.7.153 Protocol: 6 ET POLICY Cleartext WordPress Login
2020-02-18 08:23:57
139.59.43.104 attackbotsspam
Port probing on unauthorized port 5907
2020-02-18 08:34:32

Recently Reported IPs

1.150.155.253 1.152.113.91 1.156.84.142 1.151.82.155
1.152.106.7 1.151.220.32 1.156.102.76 1.156.236.183
1.153.32.5 1.151.83.52 1.151.222.3 1.151.31.68
1.156.139.244 1.155.250.247 1.154.52.252 1.150.185.142
1.152.212.236 1.150.132.114 1.155.136.190 1.153.204.104