Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Indonesia

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 150.107.244.5
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 27798
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;150.107.244.5.			IN	A

;; AUTHORITY SECTION:
.			600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022020700 1800 900 604800 86400

;; Query time: 17 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Feb 07 13:38:08 CST 2022
;; MSG SIZE  rcvd: 106
Host info
Host 5.244.107.150.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 5.244.107.150.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
62.210.25.243 attackspam
62.210.25.243 - - [06/Aug/2020:19:29:23 +0200] "POST /wp-login.php HTTP/1.1" 200 3434 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
...
2020-08-07 04:02:41
5.32.175.72 attackspambots
GET /wp-login.php HTTP/1.1
2020-08-07 04:03:58
51.75.202.218 attack
Aug  6 15:15:35 vps639187 sshd\[3206\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.75.202.218  user=root
Aug  6 15:15:37 vps639187 sshd\[3206\]: Failed password for root from 51.75.202.218 port 34220 ssh2
Aug  6 15:19:52 vps639187 sshd\[3296\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.75.202.218  user=root
...
2020-08-07 03:41:42
54.93.216.238 attackspam
GET /.git/HEAD HTTP/1.1
2020-08-07 04:03:14
192.42.116.28 attack
GET /wp-config.php_ HTTP/1.1
2020-08-07 03:52:48
95.94.4.93 attackspambots
Attempts against non-existent wp-login
2020-08-07 03:54:59
192.241.239.43 attackbotsspam
Auto Detect Rule!
proto TCP (SYN), 192.241.239.43:36903->gjan.info:8080, len 40
2020-08-07 03:44:12
181.114.208.31 attackspam
Brute force attempt
2020-08-07 03:38:31
217.138.219.135 attackspam
GET /license.txt HTTP/1.1
2020-08-07 04:04:50
47.251.38.185 attackbotsspam
/html/gdpr/en.inc.php
2020-08-07 03:49:11
34.76.63.237 attackspambots
Tried to find non-existing directory/file on the server
2020-08-07 04:08:17
185.220.100.254 attackspam
CF RAY ID: 5beb0d174dfed447 IP Class: tor URI: /?author=1
2020-08-07 03:54:42
49.176.242.163 attackspambots
Icarus honeypot on github
2020-08-07 03:37:38
60.53.247.169 attackbotsspam
1596735181 - 08/06/2020 19:33:01 Host: 60.53.247.169/60.53.247.169 Port: 23 TCP Blocked
...
2020-08-07 03:38:52
138.68.233.77 attackbotsspam
wavoo.club 138.68.233.77 digitalocean.com
From: EZ Battery Reconditioning™ 
Subject: Bringing Dead Batteries Back To Life Is Simple!
Reply-To: reply_to@seliccon.xyz
2020-08-07 04:05:53

Recently Reported IPs

101.200.209.238 178.186.208.157 178.252.135.4 54.215.117.254
110.44.124.220 171.234.80.40 138.219.108.108 142.93.214.155
45.83.64.106 196.191.116.184 62.16.53.48 186.33.83.248
120.85.119.154 125.117.221.153 222.174.167.82 61.136.233.67
103.82.79.125 172.121.142.110 124.121.84.222 124.131.42.34