Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Russian Federation

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 109.111.150.48
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 59567
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;109.111.150.48.			IN	A

;; AUTHORITY SECTION:
.			229	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022022800 1800 900 604800 86400

;; Query time: 72 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Feb 28 17:09:10 CST 2022
;; MSG SIZE  rcvd: 107
Host info
48.150.111.109.in-addr.arpa domain name pointer ppp109-111-150-48.tis-dialog.ru.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
48.150.111.109.in-addr.arpa	name = ppp109-111-150-48.tis-dialog.ru.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
78.171.110.73 attackbots
1590926868 - 05/31/2020 14:07:48 Host: 78.171.110.73/78.171.110.73 Port: 445 TCP Blocked
2020-06-01 02:22:51
129.28.30.54 attackspambots
May 31 18:40:58 h2646465 sshd[29116]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.28.30.54  user=root
May 31 18:41:00 h2646465 sshd[29116]: Failed password for root from 129.28.30.54 port 42518 ssh2
May 31 19:02:29 h2646465 sshd[30983]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.28.30.54  user=root
May 31 19:02:31 h2646465 sshd[30983]: Failed password for root from 129.28.30.54 port 52410 ssh2
May 31 19:05:16 h2646465 sshd[31238]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.28.30.54  user=root
May 31 19:05:18 h2646465 sshd[31238]: Failed password for root from 129.28.30.54 port 56608 ssh2
May 31 19:08:03 h2646465 sshd[31344]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.28.30.54  user=root
May 31 19:08:05 h2646465 sshd[31344]: Failed password for root from 129.28.30.54 port 60790 ssh2
May 31 19:10:46 h2646465 sshd[31621]
2020-06-01 02:17:14
46.219.116.22 attack
May 31 18:41:49 ns382633 sshd\[2581\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=46.219.116.22  user=root
May 31 18:41:51 ns382633 sshd\[2581\]: Failed password for root from 46.219.116.22 port 42900 ssh2
May 31 18:44:45 ns382633 sshd\[2817\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=46.219.116.22  user=root
May 31 18:44:47 ns382633 sshd\[2817\]: Failed password for root from 46.219.116.22 port 38787 ssh2
May 31 18:47:35 ns382633 sshd\[3452\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=46.219.116.22  user=root
2020-06-01 02:19:40
106.12.48.217 attackbots
SSH Brute-Force reported by Fail2Ban
2020-06-01 01:55:35
202.91.241.146 attackbotsspam
May 31 14:03:56 PorscheCustomer sshd[7552]: Failed password for root from 202.91.241.146 port 26980 ssh2
May 31 14:06:13 PorscheCustomer sshd[7605]: Failed password for root from 202.91.241.146 port 55628 ssh2
May 31 14:08:27 PorscheCustomer sshd[7669]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=202.91.241.146
...
2020-06-01 02:02:00
168.196.40.12 attack
May 31 18:28:34 vmd26974 sshd[11814]: Failed password for root from 168.196.40.12 port 54930 ssh2
...
2020-06-01 02:07:34
222.186.15.62 attackbotsspam
May 31 10:59:58 dignus sshd[30263]: Failed password for root from 222.186.15.62 port 34627 ssh2
May 31 11:00:00 dignus sshd[30263]: Failed password for root from 222.186.15.62 port 34627 ssh2
May 31 11:00:02 dignus sshd[30284]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.15.62  user=root
May 31 11:00:04 dignus sshd[30284]: Failed password for root from 222.186.15.62 port 57804 ssh2
May 31 11:00:06 dignus sshd[30284]: Failed password for root from 222.186.15.62 port 57804 ssh2
...
2020-06-01 02:04:11
175.97.135.252 attackspam
...
2020-06-01 02:29:28
1.9.128.13 attack
May 31 14:45:38 abendstille sshd\[5132\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=1.9.128.13  user=root
May 31 14:45:39 abendstille sshd\[5132\]: Failed password for root from 1.9.128.13 port 22124 ssh2
May 31 14:50:06 abendstille sshd\[9659\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=1.9.128.13  user=root
May 31 14:50:08 abendstille sshd\[9659\]: Failed password for root from 1.9.128.13 port 7423 ssh2
May 31 14:54:33 abendstille sshd\[13970\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=1.9.128.13  user=root
...
2020-06-01 02:07:57
184.22.216.28 attack
1590926914 - 05/31/2020 14:08:34 Host: 184.22.216.28/184.22.216.28 Port: 445 TCP Blocked
2020-06-01 01:58:00
220.123.241.30 attack
"Unauthorized connection attempt on SSHD detected"
2020-06-01 02:05:27
88.242.117.128 attackspam
Automatic report - Port Scan Attack
2020-06-01 02:14:09
220.180.153.68 attack
May 31 14:29:56 mail sshd[5750]: Failed password for root from 220.180.153.68 port 53002 ssh2
...
2020-06-01 01:57:37
202.44.192.155 attackbots
May 31 21:50:08 our-server-hostname sshd[4893]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=202.44.192.155  user=r.r
May 31 21:50:10 our-server-hostname sshd[4893]: Failed password for r.r from 202.44.192.155 port 50520 ssh2
May 31 22:01:37 our-server-hostname sshd[7130]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=202.44.192.155  user=r.r
May 31 22:01:38 our-server-hostname sshd[7130]: Failed password for r.r from 202.44.192.155 port 53144 ssh2
May 31 22:05:14 our-server-hostname sshd[7667]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=202.44.192.155  user=r.r
May 31 22:05:16 our-server-hostname sshd[7667]: Failed password for r.r from 202.44.192.155 port 39990 ssh2
May 31 22:08:48 our-server-hostname sshd[8522]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=202.44.192.155  user=r.r
May 31 22:08:50 ........
-------------------------------
2020-06-01 02:13:48
79.137.77.131 attackspam
May 31 14:00:20 vmi345603 sshd[29364]: Failed password for root from 79.137.77.131 port 58578 ssh2
...
2020-06-01 02:03:03

Recently Reported IPs

109.111.150.46 109.111.150.55 109.111.150.64 109.111.150.91
109.111.150.67 109.111.150.95 109.111.150.92 109.111.150.57
109.111.150.96 109.111.151.101 109.111.151.104 109.111.151.121
109.111.151.129 109.111.151.145 109.111.151.134 109.111.151.11
109.111.151.151 109.111.151.152 109.111.151.125 109.111.151.154