Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Japan

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 113.150.112.159
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 59585
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;113.150.112.159.		IN	A

;; AUTHORITY SECTION:
.			28	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2024092601 1800 900 604800 86400

;; Query time: 13 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Sep 27 03:52:18 CST 2024
;; MSG SIZE  rcvd: 108
Host info
159.112.150.113.in-addr.arpa domain name pointer KD113150112159.ppp-bb.dion.ne.jp.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
159.112.150.113.in-addr.arpa	name = KD113150112159.ppp-bb.dion.ne.jp.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
216.250.114.112 attack
Time:     Wed Apr  1 11:25:38 2020 -0300
IP:       216.250.114.112 (US/United States/-)
Failures: 30 (smtpauth)
Interval: 3600 seconds
Blocked:  Permanent Block
2020-04-02 02:59:13
124.131.111.3 attack
Telnet/23 MH Probe, Scan, BF, Hack -
2020-04-02 03:00:09
92.45.81.179 attack
Unauthorized connection attempt from IP address 92.45.81.179 on Port 445(SMB)
2020-04-02 02:31:04
114.67.109.108 attackspambots
404 NOT FOUND
2020-04-02 02:56:26
164.132.73.220 attackspam
SIP/5060 Probe, BF, Hack -
2020-04-02 02:51:26
104.237.241.20 attackbotsspam
20/4/1@08:30:11: FAIL: Alarm-Intrusion address from=104.237.241.20
...
2020-04-02 02:54:06
31.23.127.244 attack
Unauthorized connection attempt from IP address 31.23.127.244 on Port 445(SMB)
2020-04-02 03:06:58
46.190.55.33 attack
400 BAD REQUEST
2020-04-02 02:32:44
101.36.150.59 attackbotsspam
SSH brute-force: detected 7 distinct usernames within a 24-hour window.
2020-04-02 02:35:15
95.9.53.87 attack
Unauthorized connection attempt from IP address 95.9.53.87 on Port 445(SMB)
2020-04-02 02:58:18
45.220.84.13 attack
PHP DIESCAN Information Disclosure Vulnerability
2020-04-02 02:33:09
110.17.2.117 attackspambots
Time:     Wed Apr  1 07:07:16 2020 -0300
IP:       110.17.2.117 (CN/China/-)
Failures: 15 (ftpd)
Interval: 3600 seconds
Blocked:  Permanent Block
2020-04-02 02:57:44
176.194.29.155 attack
Attempt to attack host OS, exploiting network vulnerabilities, on 01-04-2020 13:30:20.
2020-04-02 02:43:21
219.144.68.15 attack
Automatic report - SSH Brute-Force Attack
2020-04-02 02:35:57
202.5.18.84 attack
2020-03-31 18:21:27 server sshd[22284]: Failed password for invalid user root from 202.5.18.84 port 40138 ssh2
2020-04-02 02:26:23

Recently Reported IPs

113.148.172.186 113.150.33.130 113.151.220.226 113.148.2.249
113.149.63.118 113.150.180.101 113.151.163.183 113.146.3.199
113.151.204.69 113.150.222.238 113.151.176.244 113.15.152.170
113.148.209.234 113.150.177.190 113.151.195.201 113.151.127.89
113.151.144.78 113.15.191.107 113.148.26.102 113.149.184.248