Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Sweden

Internet Service Provider: SWEDEN

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 140.150.98.194
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 56816
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;140.150.98.194.			IN	A

;; AUTHORITY SECTION:
.			525	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2020091502 1800 900 604800 86400

;; Query time: 17 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Sep 16 08:03:15 CST 2020
;; MSG SIZE  rcvd: 118
Host info
Host 194.98.150.140.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 194.98.150.140.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
209.17.96.162 attack
port scan and connect, tcp 22 (ssh)
2019-08-01 19:53:26
177.184.240.173 attackbots
failed_logins
2019-08-01 19:17:26
197.25.188.182 attack
Automatic report - Port Scan Attack
2019-08-01 19:32:58
159.65.226.214 attackbotsspam
" "
2019-08-01 19:24:43
192.99.55.200 attackbotsspam
Aug  1 10:57:02 Ubuntu-1404-trusty-64-minimal sshd\[3774\]: Invalid user mario from 192.99.55.200
Aug  1 10:57:02 Ubuntu-1404-trusty-64-minimal sshd\[3774\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=192.99.55.200
Aug  1 10:57:03 Ubuntu-1404-trusty-64-minimal sshd\[3774\]: Failed password for invalid user mario from 192.99.55.200 port 47664 ssh2
Aug  1 11:06:12 Ubuntu-1404-trusty-64-minimal sshd\[9396\]: Invalid user kmysclub from 192.99.55.200
Aug  1 11:06:12 Ubuntu-1404-trusty-64-minimal sshd\[9396\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=192.99.55.200
2019-08-01 19:33:14
209.17.96.234 attackbots
3389BruteforceFW21
2019-08-01 19:52:56
128.199.54.252 attack
Unauthorized SSH login attempts
2019-08-01 19:27:12
138.219.228.96 attackspam
Invalid user martyn from 138.219.228.96 port 53144
2019-08-01 19:23:07
201.46.57.252 attackspam
failed_logins
2019-08-01 19:48:19
40.71.30.72 attackspam
Aug  1 11:36:14 webhost01 sshd[14442]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=40.71.30.72
Aug  1 11:36:17 webhost01 sshd[14442]: Failed password for invalid user vhost from 40.71.30.72 port 52908 ssh2
...
2019-08-01 19:42:48
167.99.81.101 attackspam
SSH/22 MH Probe, BF, Hack -
2019-08-01 19:24:12
162.243.144.193 attack
01.08.2019 03:21:38 SMTPs access blocked by firewall
2019-08-01 19:31:48
145.131.25.241 attackbotsspam
Wordpress Admin Login attack
2019-08-01 19:19:40
191.53.222.196 attackbotsspam
Jul 31 22:21:33 mailman postfix/smtpd[12412]: warning: unknown[191.53.222.196]: SASL PLAIN authentication failed: authentication failure
2019-08-01 19:35:21
94.23.145.124 attackbotsspam
Aug  1 05:45:30 vps200512 sshd\[13264\]: Invalid user admin from 94.23.145.124
Aug  1 05:45:31 vps200512 sshd\[13264\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=94.23.145.124
Aug  1 05:45:34 vps200512 sshd\[13264\]: Failed password for invalid user admin from 94.23.145.124 port 55478 ssh2
Aug  1 05:45:52 vps200512 sshd\[13273\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=94.23.145.124  user=root
Aug  1 05:45:54 vps200512 sshd\[13273\]: Failed password for root from 94.23.145.124 port 30716 ssh2
2019-08-01 19:55:25

Recently Reported IPs

162.83.23.223 42.57.151.217 83.74.215.195 107.173.114.121
210.164.205.244 185.68.71.183 200.255.124.231 80.9.85.197
66.152.130.26 173.212.65.137 5.189.109.169 210.191.46.157
3.24.219.122 95.219.201.243 96.246.213.138 109.31.131.82
178.113.104.98 108.121.140.99 115.128.27.172 203.106.113.171