Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 107.150.82.146
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 39209
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;107.150.82.146.			IN	A

;; AUTHORITY SECTION:
.			178	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022022800 1800 900 604800 86400

;; Query time: 61 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Feb 28 14:47:41 CST 2022
;; MSG SIZE  rcvd: 107
Host info
Host 146.82.150.107.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 146.82.150.107.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
195.25.64.107 attack
Port Scan: TCP/445
2019-08-24 12:12:16
143.59.9.18 attack
Port Scan: UDP/80
2019-08-24 11:47:13
184.184.15.169 attackbotsspam
Port Scan: UDP/137
2019-08-24 11:42:47
219.239.21.2 attackspambots
Port Scan: UDP/49153
2019-08-24 12:08:44
80.236.214.169 attackspam
Port Scan: TCP/23
2019-08-24 11:54:52
198.210.119.207 attackspam
Port Scan: TCP/5431
2019-08-24 12:11:43
58.245.128.196 attack
Port Scan: TCP/23
2019-08-24 12:03:13
124.119.52.215 attackspambots
Port Scan: TCP/22
2019-08-24 12:21:05
124.42.14.34 attack
Port Scan: UDP/49153
2019-08-24 12:21:29
178.217.169.141 attackbots
proto=tcp  .  spt=35554  .  dpt=25  .     (listed on Blocklist de  Aug 23)     (145)
2019-08-24 11:33:05
76.169.22.170 attackbotsspam
Port Scan: TCP/5555
2019-08-24 11:55:15
187.190.109.139 attackspam
proto=tcp  .  spt=53920  .  dpt=25  .     (listed on Dark List de Aug 23)     (144)
2019-08-24 11:37:45
94.177.214.200 attackbotsspam
Aug 24 03:15:13 [munged] sshd[10080]: Invalid user user from 94.177.214.200 port 40142
Aug 24 03:15:13 [munged] sshd[10080]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=94.177.214.200
2019-08-24 11:36:34
165.22.130.217 attack
165.22.130.217 - - [24/Aug/2019:03:14:52 +0200] "GET /wp-login.php HTTP/1.1" 200 1122 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
165.22.130.217 - - [24/Aug/2019:03:14:55 +0200] "POST /wp-login.php HTTP/1.1" 200 1503 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
165.22.130.217 - - [24/Aug/2019:03:14:55 +0200] "GET /wp-login.php HTTP/1.1" 200 1122 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
165.22.130.217 - - [24/Aug/2019:03:15:06 +0200] "POST /wp-login.php HTTP/1.1" 200 1489 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
165.22.130.217 - - [24/Aug/2019:03:15:10 +0200] "GET /wp-login.php HTTP/1.1" 200 1122 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
165.22.130.217 - - [24/Aug/2019:03:15:18 +0200] "POST /wp-login.php HTTP/1.1" 200 1491 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
...
2019-08-24 11:30:14
39.65.73.190 attackbotsspam
Port Scan: TCP/8080
2019-08-24 12:05:46

Recently Reported IPs

106.42.173.132 107.150.74.86 107.150.92.33 107.150.97.187
107.150.88.132 107.150.97.95 107.150.98.168 107.150.97.125
107.150.97.40 107.150.9.91 107.150.98.181 107.150.98.243
107.151.108.10 107.151.100.211 107.151.106.22 107.150.99.248
107.151.108.35 107.151.109.32 106.42.173.168 107.151.112.165