Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
IP Type Details Datetime
107.150.119.191 attack
Apr  7 07:55:09 webhost01 sshd[8504]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=107.150.119.191
Apr  7 07:55:11 webhost01 sshd[8504]: Failed password for invalid user deploy from 107.150.119.191 port 33280 ssh2
...
2020-04-07 08:57:19
107.150.119.191 attackspam
SSH login attempts brute force.
2020-04-06 19:57:16
107.150.119.81 attackbots
Feb 11 23:57:05 legacy sshd[9141]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=107.150.119.81
Feb 11 23:57:07 legacy sshd[9141]: Failed password for invalid user 123456 from 107.150.119.81 port 40382 ssh2
Feb 12 00:00:07 legacy sshd[9360]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=107.150.119.81
...
2020-02-12 07:01:53
107.150.119.81 attackbotsspam
Unauthorized connection attempt detected from IP address 107.150.119.81 to port 2220 [J]
2020-02-02 18:09:39
107.150.119.174 attackbots
Unauthorized connection attempt detected from IP address 107.150.119.174 to port 2220 [J]
2020-01-14 01:40:53
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 107.150.119.149
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 15812
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;107.150.119.149.		IN	A

;; AUTHORITY SECTION:
.			442	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022040201 1800 900 604800 86400

;; Query time: 19 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Apr 03 05:52:37 CST 2022
;; MSG SIZE  rcvd: 108
Host info
Host 149.119.150.107.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 149.119.150.107.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
91.250.6.108 attack
spam
2020-01-24 16:29:59
195.162.81.91 attack
Absender hat Spam-Falle ausgel?st
2020-01-24 16:50:48
106.0.62.26 attack
spam
2020-01-24 16:21:03
200.146.236.217 attack
spam
2020-01-24 16:48:07
212.126.108.172 attackspam
spam
2020-01-24 16:43:06
212.109.39.180 attack
spam
2020-01-24 16:43:22
188.235.148.209 attack
spam
2020-01-24 16:53:47
123.200.26.202 attack
spam
2020-01-24 16:18:40
200.85.170.250 attackspambots
spam
2020-01-24 16:48:54
78.83.242.229 attackbotsspam
email spam
2020-01-24 16:35:19
96.87.188.193 attackbots
spam
2020-01-24 16:25:24
103.82.43.174 attackspambots
spam
2020-01-24 16:23:08
210.245.51.15 attackbots
spam
2020-01-24 16:44:33
46.172.69.163 attackspam
spam
2020-01-24 16:38:46
91.247.250.215 attack
email spam
2020-01-24 16:30:26

Recently Reported IPs

107.150.119.115 107.150.121.138 107.150.121.153 107.150.121.185
107.150.124.98 107.150.125.8 107.150.164.164 107.150.164.234
107.150.169.3 107.150.171.213 107.150.187.169 107.150.187.42
107.150.31.90 107.150.34.210 107.150.5.110 107.150.77.242
107.150.86.177 107.150.89.123 107.150.89.199 107.150.89.230