Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States of America (the)

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 150.135.112.147
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 22179
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;150.135.112.147.		IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025020301 1800 900 604800 86400

;; Query time: 13 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Feb 04 04:11:26 CST 2025
;; MSG SIZE  rcvd: 108
Host info
147.112.135.150.in-addr.arpa domain name pointer on-campus-112-147.vpn.arizona.edu.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
147.112.135.150.in-addr.arpa	name = on-campus-112-147.vpn.arizona.edu.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
106.12.209.117 attack
$f2bV_matches
2020-04-13 15:56:26
183.167.217.46 attackspam
Unauthorised access (Apr 13) SRC=183.167.217.46 LEN=44 TTL=52 ID=29833 TCP DPT=8080 WINDOW=32921 SYN
2020-04-13 15:32:58
37.49.226.250 attack
firewall-block, port(s): 5038/tcp, 50802/tcp
2020-04-13 15:39:35
94.191.108.176 attackspambots
SSH brute-force attempt
2020-04-13 15:40:14
134.122.81.124 attack
Invalid user jackie from 134.122.81.124 port 37786
2020-04-13 15:21:41
122.51.219.2 attackspambots
Apr 13 09:05:21 v22019038103785759 sshd\[22333\]: Invalid user amarco from 122.51.219.2 port 36598
Apr 13 09:05:21 v22019038103785759 sshd\[22333\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.51.219.2
Apr 13 09:05:23 v22019038103785759 sshd\[22333\]: Failed password for invalid user amarco from 122.51.219.2 port 36598 ssh2
Apr 13 09:09:33 v22019038103785759 sshd\[22607\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.51.219.2  user=root
Apr 13 09:09:35 v22019038103785759 sshd\[22607\]: Failed password for root from 122.51.219.2 port 50780 ssh2
...
2020-04-13 15:57:55
150.109.104.175 attack
2020-04-13T08:10:48.256084  sshd[9380]: Invalid user webadmin from 150.109.104.175 port 38196
2020-04-13T08:10:48.271393  sshd[9380]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=150.109.104.175
2020-04-13T08:10:48.256084  sshd[9380]: Invalid user webadmin from 150.109.104.175 port 38196
2020-04-13T08:10:50.009509  sshd[9380]: Failed password for invalid user webadmin from 150.109.104.175 port 38196 ssh2
...
2020-04-13 15:29:19
182.74.25.246 attackbots
Apr 13 06:40:51 ns382633 sshd\[7732\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.74.25.246  user=root
Apr 13 06:40:54 ns382633 sshd\[7732\]: Failed password for root from 182.74.25.246 port 29786 ssh2
Apr 13 06:49:44 ns382633 sshd\[8967\]: Invalid user chile from 182.74.25.246 port 8213
Apr 13 06:49:44 ns382633 sshd\[8967\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.74.25.246
Apr 13 06:49:45 ns382633 sshd\[8967\]: Failed password for invalid user chile from 182.74.25.246 port 8213 ssh2
2020-04-13 15:55:15
117.81.131.12 attackspam
Apr 13 08:11:47 legacy sshd[32635]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=117.81.131.12
Apr 13 08:11:50 legacy sshd[32635]: Failed password for invalid user ranestad from 117.81.131.12 port 46232 ssh2
Apr 13 08:16:18 legacy sshd[373]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=117.81.131.12
...
2020-04-13 15:24:01
192.144.129.98 attack
Apr 13 05:54:46 163-172-32-151 sshd[26007]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=192.144.129.98  user=root
Apr 13 05:54:48 163-172-32-151 sshd[26007]: Failed password for root from 192.144.129.98 port 49980 ssh2
...
2020-04-13 15:55:58
188.161.202.34 attackbotsspam
VoIP Brute Force - 188.161.202.34 - Auto Report
...
2020-04-13 15:17:36
49.232.130.25 attack
Apr 13 05:48:19 server sshd[10058]: Failed password for invalid user share from 49.232.130.25 port 59158 ssh2
Apr 13 05:52:00 server sshd[10709]: Failed password for root from 49.232.130.25 port 44548 ssh2
Apr 13 05:55:38 server sshd[11426]: Failed password for invalid user qhsupport from 49.232.130.25 port 58174 ssh2
2020-04-13 15:18:13
3.84.115.189 attackbots
5x Failed Password
2020-04-13 15:41:09
90.154.102.15 attackspam
Trolling for resource vulnerabilities
2020-04-13 15:29:59
68.183.147.58 attackbots
$f2bV_matches
2020-04-13 15:46:57

Recently Reported IPs

122.8.141.37 72.90.209.145 59.183.13.95 30.135.4.94
145.137.24.231 151.84.1.129 208.147.10.4 150.147.105.112
5.103.135.31 94.187.117.37 14.205.183.159 80.16.115.106
37.203.137.209 119.150.104.119 24.0.96.122 38.224.19.159
192.177.150.143 35.195.183.187 60.202.119.100 147.127.59.7