Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: China

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 117.139.132.150
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 5676
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;117.139.132.150.		IN	A

;; AUTHORITY SECTION:
.			179	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022030800 1800 900 604800 86400

;; Query time: 63 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Mar 08 14:44:11 CST 2022
;; MSG SIZE  rcvd: 108
Host info
Host 150.132.139.117.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 150.132.139.117.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
49.235.108.92 attackspambots
Nov 15 07:57:54 mout sshd[29713]: Invalid user bondioli from 49.235.108.92 port 32834
2019-11-15 15:24:01
51.77.220.183 attackbots
Nov 15 08:07:36 SilenceServices sshd[25946]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.77.220.183
Nov 15 08:07:38 SilenceServices sshd[25946]: Failed password for invalid user passwd from 51.77.220.183 port 50522 ssh2
Nov 15 08:10:54 SilenceServices sshd[27055]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.77.220.183
2019-11-15 15:22:59
159.203.193.244 attack
Honeypot hit.
2019-11-15 15:14:59
134.175.154.22 attackbotsspam
Nov 14 21:18:30 hanapaa sshd\[5100\]: Invalid user dreifuss from 134.175.154.22
Nov 14 21:18:30 hanapaa sshd\[5100\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.175.154.22
Nov 14 21:18:32 hanapaa sshd\[5100\]: Failed password for invalid user dreifuss from 134.175.154.22 port 45334 ssh2
Nov 14 21:23:22 hanapaa sshd\[5465\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.175.154.22  user=root
Nov 14 21:23:24 hanapaa sshd\[5465\]: Failed password for root from 134.175.154.22 port 54334 ssh2
2019-11-15 15:35:50
125.211.197.252 attack
2019-11-15T06:21:27.455497hub.schaetter.us sshd\[14314\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=125.211.197.252  user=mysql
2019-11-15T06:21:29.301770hub.schaetter.us sshd\[14314\]: Failed password for mysql from 125.211.197.252 port 38854 ssh2
2019-11-15T06:26:03.213890hub.schaetter.us sshd\[14365\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=125.211.197.252  user=root
2019-11-15T06:26:04.949914hub.schaetter.us sshd\[14365\]: Failed password for root from 125.211.197.252 port 56268 ssh2
2019-11-15T06:30:51.535721hub.schaetter.us sshd\[14392\]: Invalid user cretin from 125.211.197.252 port 45457
...
2019-11-15 15:17:59
185.211.245.198 attackbotsspam
Nov 15 08:37:38 srv01 postfix/smtpd\[30690\]: warning: unknown\[185.211.245.198\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Nov 15 08:37:45 srv01 postfix/smtpd\[30690\]: warning: unknown\[185.211.245.198\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Nov 15 08:39:22 srv01 postfix/smtpd\[30690\]: warning: unknown\[185.211.245.198\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Nov 15 08:39:29 srv01 postfix/smtpd\[30845\]: warning: unknown\[185.211.245.198\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Nov 15 08:45:36 srv01 postfix/smtpd\[29264\]: warning: unknown\[185.211.245.198\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
...
2019-11-15 15:48:33
128.199.55.13 attackbotsspam
Nov 14 20:58:20 web1 sshd\[27745\]: Invalid user lisa from 128.199.55.13
Nov 14 20:58:20 web1 sshd\[27745\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.199.55.13
Nov 14 20:58:22 web1 sshd\[27745\]: Failed password for invalid user lisa from 128.199.55.13 port 48679 ssh2
Nov 14 21:02:26 web1 sshd\[28067\]: Invalid user navy from 128.199.55.13
Nov 14 21:02:26 web1 sshd\[28067\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.199.55.13
2019-11-15 15:17:39
202.171.77.14 attack
(imapd) Failed IMAP login from 202.171.77.14 (NC/New Caledonia/202-171-77-14.h14.canl.nc): 1 in the last 3600 secs
2019-11-15 15:38:18
159.65.152.201 attack
Nov 15 08:32:43 MK-Soft-Root1 sshd[625]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.65.152.201 
Nov 15 08:32:45 MK-Soft-Root1 sshd[625]: Failed password for invalid user mysql from 159.65.152.201 port 57414 ssh2
...
2019-11-15 15:35:29
103.244.150.40 attackspam
3389BruteforceFW23
2019-11-15 15:43:19
5.254.147.70 attackspambots
Time:     Fri Nov 15 03:26:49 2019 -0300
IP:       5.254.147.70 (SE/Sweden/vpnsvc.com)
Failures: 5 (cpanel)
Interval: 3600 seconds
Blocked:  Permanent Block
2019-11-15 15:27:16
140.246.229.195 attackspambots
Nov 15 08:07:57 markkoudstaal sshd[8715]: Failed password for root from 140.246.229.195 port 55648 ssh2
Nov 15 08:12:16 markkoudstaal sshd[9140]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=140.246.229.195
Nov 15 08:12:19 markkoudstaal sshd[9140]: Failed password for invalid user polano from 140.246.229.195 port 34410 ssh2
2019-11-15 15:16:36
106.13.39.233 attackspambots
Nov 15 07:29:40 pornomens sshd\[21145\]: Invalid user oz from 106.13.39.233 port 41858
Nov 15 07:29:40 pornomens sshd\[21145\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.39.233
Nov 15 07:29:42 pornomens sshd\[21145\]: Failed password for invalid user oz from 106.13.39.233 port 41858 ssh2
...
2019-11-15 15:37:20
35.230.91.250 attackbotsspam
Automatic report - XMLRPC Attack
2019-11-15 15:26:44
36.255.61.26 attackspam
Nov 15 06:29:47 h2177944 sshd\[7815\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=36.255.61.26
Nov 15 06:29:49 h2177944 sshd\[7815\]: Failed password for invalid user test from 36.255.61.26 port 39924 ssh2
Nov 15 07:30:35 h2177944 sshd\[10769\]: Invalid user admin from 36.255.61.26 port 45240
Nov 15 07:30:35 h2177944 sshd\[10769\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=36.255.61.26
...
2019-11-15 15:26:10

Recently Reported IPs

117.136.80.194 108.167.158.80 117.136.89.117 117.136.7.2
117.136.7.111 117.136.88.189 117.136.79.192 117.136.92.32
117.136.59.101 117.136.72.62 117.139.164.221 117.139.133.245
117.139.220.221 117.139.214.64 117.139.248.167 117.139.35.181
117.139.59.185 117.139.249.218 117.139.250.190 117.139.221.234