Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: China

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 116.13.74.150
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 59042
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;116.13.74.150.			IN	A

;; AUTHORITY SECTION:
.			586	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2020033102 1800 900 604800 86400

;; Query time: 54 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Apr 01 19:18:20 CST 2020
;; MSG SIZE  rcvd: 117
Host info
Host 150.74.13.116.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 150.74.13.116.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
184.167.140.242 attackspam
MultiHost/MultiPort Probe, Scan, Hack -
2020-02-17 06:12:58
86.35.37.186 attackbots
Feb 16 16:50:01 plex sshd[1607]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=86.35.37.186  user=root
Feb 16 16:50:03 plex sshd[1607]: Failed password for root from 86.35.37.186 port 40568 ssh2
2020-02-17 05:58:50
95.33.77.192 attackspam
Feb 16 21:57:39 sso sshd[17623]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=95.33.77.192
Feb 16 21:57:41 sso sshd[17623]: Failed password for invalid user ethan from 95.33.77.192 port 46169 ssh2
...
2020-02-17 06:01:19
159.203.17.176 attack
IP blocked
2020-02-17 06:09:23
114.33.81.237 attackspambots
Unauthorised access (Feb 16) SRC=114.33.81.237 LEN=40 TTL=44 ID=38706 TCP DPT=23 WINDOW=59742 SYN
2020-02-17 06:07:07
184.174.170.78 attack
MultiHost/MultiPort Probe, Scan, Hack -
2020-02-17 06:11:50
1.171.90.167 attack
20/2/16@08:41:39: FAIL: Alarm-Network address from=1.171.90.167
20/2/16@08:41:39: FAIL: Alarm-Network address from=1.171.90.167
...
2020-02-17 06:29:15
136.228.161.66 attackbots
Feb 16 21:07:37 XXXXXX sshd[19155]: Invalid user backup from 136.228.161.66 port 43950
2020-02-17 06:20:59
175.136.49.5 attack
GET /wp-login.php HTTP/1.1
2020-02-17 06:20:08
124.156.167.50 attackspambots
TCP port 1522: Scan and connection
2020-02-17 06:04:06
106.54.242.120 attack
Feb 16 23:27:53 mout sshd[18528]: Invalid user letha from 106.54.242.120 port 46108
2020-02-17 06:32:09
184.183.181.180 attackspambots
MultiHost/MultiPort Probe, Scan, Hack -
2020-02-17 06:00:21
103.73.189.211 attack
Automatic report - XMLRPC Attack
2020-02-17 06:08:30
198.12.64.118 attackbotsspam
Automatic report - XMLRPC Attack
2020-02-17 05:58:35
122.51.71.197 attackbots
Feb 16 21:36:07 mout sshd[9811]: Invalid user nexus from 122.51.71.197 port 48464
2020-02-17 06:08:51

Recently Reported IPs

181.211.110.20 207.170.103.39 61.156.239.235 3.67.74.46
67.172.239.183 221.168.80.31 207.226.23.24 64.211.20.67
186.53.66.179 138.3.235.186 41.197.20.53 220.220.99.180
23.158.101.64 214.243.61.9 137.27.118.17 106.145.146.200
152.91.199.234 139.30.212.43 175.232.249.173 61.229.193.90