Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Japan

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 150.14.216.42
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 27865
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;150.14.216.42.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025020301 1800 900 604800 86400

;; Query time: 57 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Feb 04 03:01:56 CST 2025
;; MSG SIZE  rcvd: 106
Host info
Host 42.216.14.150.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 42.216.14.150.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
209.198.80.8 attackspam
Oct  7 17:04:40 ns381471 sshd[15735]: Failed password for root from 209.198.80.8 port 47614 ssh2
2020-10-08 02:30:35
180.76.141.248 attack
Oct  7 13:30:53 shivevps sshd[5693]: Failed password for root from 180.76.141.248 port 35614 ssh2
Oct  7 13:33:50 shivevps sshd[5786]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.76.141.248  user=root
Oct  7 13:33:52 shivevps sshd[5786]: Failed password for root from 180.76.141.248 port 39278 ssh2
...
2020-10-08 02:19:10
109.232.109.58 attackspambots
$f2bV_matches
2020-10-08 02:38:34
102.165.30.29 attack
Port Scan/VNC login attempt
...
2020-10-08 02:04:22
45.144.177.104 attackspambots
SCAN: Host Sweep CloudCIX Reconnaissance Scan Detected, PTR: 45-144-177-104.hostinghubonline.com.
2020-10-08 02:30:13
84.17.47.106 attackbotsspam
(From no-replyWrink@google.com) Hi there 
 
If you want to get ahead of your competition, have a higher Domain Authority score. Its just simple as that. 
With our service you get Domain Authority above 50 points in just 30 days. 
 
This service is guaranteed 
 
For more information, check our service here 
https://www.monkeydigital.co/Get-Guaranteed-Domain-Authority-50/ 
 
N E W : 
DA60 is now available here 
https://www.monkeydigital.co/product/moz-da60-seo-plan/ 
 
 
thank you 
Mike Derrick
 
Monkey Digital 
support@monkeydigital.co
2020-10-08 02:04:38
112.85.42.112 attackspambots
Oct  7 18:18:54 ip-172-31-42-142 sshd\[1762\]: Failed password for root from 112.85.42.112 port 56528 ssh2\
Oct  7 18:18:57 ip-172-31-42-142 sshd\[1762\]: Failed password for root from 112.85.42.112 port 56528 ssh2\
Oct  7 18:19:12 ip-172-31-42-142 sshd\[1767\]: Failed password for root from 112.85.42.112 port 53818 ssh2\
Oct  7 18:19:22 ip-172-31-42-142 sshd\[1767\]: Failed password for root from 112.85.42.112 port 53818 ssh2\
Oct  7 18:19:24 ip-172-31-42-142 sshd\[1767\]: Failed password for root from 112.85.42.112 port 53818 ssh2\
2020-10-08 02:27:57
78.17.124.28 attack
SCAN: Host Sweep CloudCIX Reconnaissance Scan Detected, PTR: sky-78-17-124-28.bas512.cwt.btireland.net.
2020-10-08 02:22:50
75.119.215.210 attack
WordPress wp-login brute force :: 75.119.215.210 0.072 - [06/Oct/2020:23:06:40  0000] [censored_1] "POST /wp-login.php HTTP/1.1" 200 2383 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0" "HTTP/1.1"
2020-10-08 02:12:27
103.145.13.230 attackbots
- Port=5060
2020-10-08 02:38:52
82.164.156.84 attackbotsspam
 TCP (SYN) 82.164.156.84:49565 -> port 22327, len 44
2020-10-08 02:13:10
36.69.118.17 attackbotsspam
SCAN: Host Sweep CloudCIX Reconnaissance Scan Detected, PTR: PTR record not found
2020-10-08 02:05:20
187.95.14.166 attackspambots
xmlrpc attack
2020-10-08 02:18:00
194.5.206.145 attack
(sshd) Failed SSH login from 194.5.206.145 (DE/Germany/-): 5 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: Oct  7 13:30:54 optimus sshd[14464]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=194.5.206.145  user=root
Oct  7 13:30:56 optimus sshd[14464]: Failed password for root from 194.5.206.145 port 53704 ssh2
Oct  7 13:46:24 optimus sshd[18409]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=194.5.206.145  user=root
Oct  7 13:46:26 optimus sshd[18409]: Failed password for root from 194.5.206.145 port 36152 ssh2
Oct  7 14:05:27 optimus sshd[25650]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=194.5.206.145  user=root
2020-10-08 02:35:18
187.162.61.184 attackbotsspam
Oct  7 18:59:32 dev0-dcde-rnet sshd[9354]: Failed password for root from 187.162.61.184 port 53555 ssh2
Oct  7 19:03:25 dev0-dcde-rnet sshd[9570]: Failed password for root from 187.162.61.184 port 56485 ssh2
2020-10-08 02:20:18

Recently Reported IPs

116.5.155.185 24.182.170.52 103.150.195.147 74.243.114.215
15.105.9.117 241.140.69.150 176.158.223.135 109.187.100.221
33.200.184.237 59.134.39.24 38.17.224.204 30.71.211.71
80.212.1.200 137.204.242.18 175.61.40.94 67.124.140.139
7.59.229.218 24.134.46.69 13.187.109.151 224.202.117.3