Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: China

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 120.248.150.213
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 36412
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;120.248.150.213.		IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025062701 1800 900 604800 86400

;; Query time: 35 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Jun 28 09:51:18 CST 2025
;; MSG SIZE  rcvd: 108
Host info
Host 213.150.248.120.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 213.150.248.120.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
197.248.81.214 attackspam
May 19 11:47:44 ns3042688 courier-imapd: LOGIN FAILED, method=PLAIN, ip=\[::ffff:197.248.81.214\]
...
2020-05-20 01:36:35
222.186.175.148 attackspambots
2020-05-19T19:59:12.073032  sshd[20565]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.175.148  user=root
2020-05-19T19:59:13.951456  sshd[20565]: Failed password for root from 222.186.175.148 port 48434 ssh2
2020-05-19T19:59:18.127946  sshd[20565]: Failed password for root from 222.186.175.148 port 48434 ssh2
2020-05-19T19:59:12.073032  sshd[20565]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.175.148  user=root
2020-05-19T19:59:13.951456  sshd[20565]: Failed password for root from 222.186.175.148 port 48434 ssh2
2020-05-19T19:59:18.127946  sshd[20565]: Failed password for root from 222.186.175.148 port 48434 ssh2
...
2020-05-20 02:04:48
142.93.165.102 attackbots
Lines containing failures of 142.93.165.102
May 18 03:04:04 own sshd[23338]: Invalid user uph from 142.93.165.102 port 35594
May 18 03:04:04 own sshd[23338]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.165.102
May 18 03:04:06 own sshd[23338]: Failed password for invalid user uph from 142.93.165.102 port 35594 ssh2
May 18 03:04:06 own sshd[23338]: Received disconnect from 142.93.165.102 port 35594:11: Bye Bye [preauth]
May 18 03:04:06 own sshd[23338]: Disconnected from invalid user uph 142.93.165.102 port 35594 [preauth]


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=142.93.165.102
2020-05-20 01:42:31
116.203.210.254 attackbots
xmlrpc attack
2020-05-20 01:52:14
50.234.173.102 attackspambots
$f2bV_matches
2020-05-20 02:06:03
138.197.21.218 attack
$f2bV_matches
2020-05-20 01:50:37
200.80.157.59 attackbotsspam
port scan and connect, tcp 8080 (http-proxy)
2020-05-20 01:34:04
197.188.221.99 attackspam
SMTP
2020-05-20 01:39:43
173.161.100.141 attackspam
May 18 06:35:39 www0 postfix/smtpd[20173]: warning: hostname mail.stratphilanthropy.com does not resolve to address 173.161.100.141: Name or service not known
May 18 06:35:39 www0 postfix/smtpd[20173]: connect from unknown[173.161.100.141]
May 18 06:35:40 www0 postfix/smtpd[20173]: SSL_accept error from unknown[173.161.100.141]: -1
May 18 06:35:40 www0 postfix/smtpd[20173]: lost connection after STARTTLS from unknown[173.161.100.141]
May 18 06:35:40 www0 postfix/smtpd[20173]: disconnect from unknown[173.161.100.141]
May 18 06:35:40 www0 postfix/smtpd[20173]: warning: hostname mail.stratphilanthropy.com does not resolve to address 173.161.100.141: Name or service not known
May 18 06:35:40 www0 postfix/smtpd[20173]: connect from unknown[173.161.100.141]
May x@x
May 18 06:35:40 www0 postfix/smtpd[20173]: disconnect from unknown[173.161.100.141]
May 18 06:36:45 www0 postfix/smtpd[20173]: warning: hostname mail.stratphilanthropy.com does not resolve to address 173.161.100.14........
-------------------------------
2020-05-20 01:48:48
106.54.98.89 attackspam
May 19 03:40:47 server1 sshd\[10254\]: Invalid user gvw from 106.54.98.89
May 19 03:40:47 server1 sshd\[10254\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.54.98.89 
May 19 03:40:49 server1 sshd\[10254\]: Failed password for invalid user gvw from 106.54.98.89 port 39122 ssh2
May 19 03:46:08 server1 sshd\[12882\]: Invalid user qum from 106.54.98.89
May 19 03:46:08 server1 sshd\[12882\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.54.98.89 
...
2020-05-20 01:52:58
27.71.122.212 attackspam
1589881566 - 05/19/2020 11:46:06 Host: 27.71.122.212/27.71.122.212 Port: 445 TCP Blocked
2020-05-20 01:54:18
183.88.229.254 attackspambots
Someone with this IP is attempting to hack my game account.
2020-05-20 01:59:10
222.186.180.142 attack
2020-05-19T19:40:49.905005sd-86998 sshd[40640]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.180.142  user=root
2020-05-19T19:40:52.024615sd-86998 sshd[40640]: Failed password for root from 222.186.180.142 port 41743 ssh2
2020-05-19T19:40:54.547233sd-86998 sshd[40640]: Failed password for root from 222.186.180.142 port 41743 ssh2
2020-05-19T19:40:49.905005sd-86998 sshd[40640]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.180.142  user=root
2020-05-19T19:40:52.024615sd-86998 sshd[40640]: Failed password for root from 222.186.180.142 port 41743 ssh2
2020-05-19T19:40:54.547233sd-86998 sshd[40640]: Failed password for root from 222.186.180.142 port 41743 ssh2
2020-05-19T19:40:49.905005sd-86998 sshd[40640]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.180.142  user=root
2020-05-19T19:40:52.024615sd-86998 sshd[40640]: Failed password for roo
...
2020-05-20 01:41:12
112.5.86.45 attackbots
Portscan or hack attempt detected by psad/fwsnort
2020-05-20 01:55:53
173.231.101.153 attack
May 18 16:06:26 www sshd[21991]: Did not receive identification string from 173.231.101.153
May 18 16:22:18 www sshd[28319]: Address 173.231.101.153 maps to congebec.com, but this does not map back to the address - POSSIBLE BREAK-IN ATTEMPT!
May 18 16:22:18 www sshd[28319]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=173.231.101.153  user=r.r
May 18 16:22:20 www sshd[28319]: Failed password for r.r from 173.231.101.153 port 55003 ssh2
May 18 16:22:21 www sshd[28341]: Address 173.231.101.153 maps to congebec.com, but this does not map back to the address - POSSIBLE BREAK-IN ATTEMPT!
May 18 16:22:21 www sshd[28341]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=173.231.101.153  user=r.r
May 18 16:22:23 www sshd[28341]: Failed password for r.r from 173.231.101.153 port 55400 ssh2
May 18 16:22:24 www sshd[28353]: Address 173.231.101.153 maps to congebec.com, but this does not map back to t........
-------------------------------
2020-05-20 01:36:47

Recently Reported IPs

53.7.231.93 36.138.0.193 26.90.175.129 15.220.139.135
122.92.124.131 113.177.224.46 35.197.216.168 131.30.91.78
100.134.95.75 60.172.133.227 63.121.94.214 57.102.85.25
53.23.236.105 91.6.248.198 28.51.207.242 21.166.112.85
34.122.151.203 78.203.52.46 20.165.249.156 169.219.25.104