Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Italy

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 150.145.1.4
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 56669
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;150.145.1.4.			IN	A

;; AUTHORITY SECTION:
.			598	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2023051300 1800 900 604800 86400

;; Query time: 64 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat May 13 16:20:04 CST 2023
;; MSG SIZE  rcvd: 104
Host info
4.1.145.150.in-addr.arpa domain name pointer server.ge.ieiit.cnr.it.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
4.1.145.150.in-addr.arpa	name = server.ge.ieiit.cnr.it.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
206.189.90.215 attack
206.189.90.215 - - [23/Jan/2020:07:47:42 +0000] "POST /wp-login.php HTTP/1.1" 200 6409 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
206.189.90.215 - - [23/Jan/2020:07:47:43 +0000] "POST /xmlrpc.php HTTP/1.1" 200 403 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
...
2020-01-23 23:13:56
222.186.173.142 attack
Jan 23 11:45:54 vps46666688 sshd[30676]: Failed password for root from 222.186.173.142 port 36096 ssh2
Jan 23 11:46:06 vps46666688 sshd[30676]: error: maximum authentication attempts exceeded for root from 222.186.173.142 port 36096 ssh2 [preauth]
...
2020-01-23 22:46:31
109.123.118.67 attack
HTTP 503 XSS Attempt
2020-01-23 23:09:58
5.8.10.202 attackspambots
Jan 23 08:49:04 IngegnereFirenze sshd[19622]: Did not receive identification string from 5.8.10.202 port 48358
...
2020-01-23 22:49:51
192.41.73.93 attackspam
HTTP 503 XSS Attempt
2020-01-23 23:01:14
50.63.166.50 attack
xmlrpc attack
2020-01-23 23:17:34
178.128.126.250 attackspambots
Jan 21 23:40:22 rudra sshd[472057]: Invalid user tomek from 178.128.126.250
Jan 21 23:40:22 rudra sshd[472057]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.128.126.250 
Jan 21 23:40:24 rudra sshd[472057]: Failed password for invalid user tomek from 178.128.126.250 port 44190 ssh2
Jan 21 23:40:25 rudra sshd[472057]: Received disconnect from 178.128.126.250: 11: Bye Bye [preauth]
Jan 21 23:58:27 rudra sshd[475372]: Invalid user postgres from 178.128.126.250
Jan 21 23:58:27 rudra sshd[475372]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.128.126.250 
Jan 21 23:58:29 rudra sshd[475372]: Failed password for invalid user postgres from 178.128.126.250 port 33856 ssh2
Jan 21 23:58:29 rudra sshd[475372]: Received disconnect from 178.128.126.250: 11: Bye Bye [preauth]
Jan 22 00:01:24 rudra sshd[482299]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rh........
-------------------------------
2020-01-23 23:04:58
122.160.31.101 attackbots
2020-01-23T15:48:24.9218181240 sshd\[2499\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.160.31.101  user=root
2020-01-23T15:48:27.0114771240 sshd\[2499\]: Failed password for root from 122.160.31.101 port 54968 ssh2
2020-01-23T15:53:37.5945521240 sshd\[2741\]: Invalid user kyle from 122.160.31.101 port 52696
2020-01-23T15:53:37.5973471240 sshd\[2741\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.160.31.101
...
2020-01-23 23:12:29
62.234.156.221 attackspambots
Unauthorized connection attempt detected from IP address 62.234.156.221 to port 2220 [J]
2020-01-23 23:17:08
51.15.95.127 attackspam
Unauthorized connection attempt detected from IP address 51.15.95.127 to port 2220 [J]
2020-01-23 22:45:17
40.143.228.6 attackspam
Jan 23 17:18:58 www1 sshd\[53764\]: Failed password for root from 40.143.228.6 port 23430 ssh2Jan 23 17:20:27 www1 sshd\[54062\]: Invalid user mcserver from 40.143.228.6Jan 23 17:20:29 www1 sshd\[54062\]: Failed password for invalid user mcserver from 40.143.228.6 port 9842 ssh2Jan 23 17:21:59 www1 sshd\[54145\]: Failed password for root from 40.143.228.6 port 33656 ssh2Jan 23 17:23:30 www1 sshd\[54219\]: Invalid user hoge from 40.143.228.6Jan 23 17:23:32 www1 sshd\[54219\]: Failed password for invalid user hoge from 40.143.228.6 port 51487 ssh2
...
2020-01-23 23:25:00
93.174.93.114 attackspambots
Unauthorized connection attempt detected from IP address 93.174.93.114 to port 3790 [J]
2020-01-23 22:49:35
52.204.212.178 attackspambots
Unauthorized connection attempt detected from IP address 52.204.212.178 to port 2220 [J]
2020-01-23 23:00:46
23.252.58.109 attackspam
Unauthorized connection attempt detected from IP address 23.252.58.109 to port 2220 [J]
2020-01-23 22:54:45
109.200.90.162 attack
Unauthorized connection attempt detected from IP address 109.200.90.162 to port 2220 [J]
2020-01-23 23:02:32

Recently Reported IPs

159.226.128.116 205.211.145.152 210.240.244.63 140.116.238.30
195.199.250.146 120.101.7.133 140.116.132.253 197.231.179.110
165.112.4.230 203.101.241.94 203.158.179.200 140.116.180.96
160.36.103.47 140.134.131.122 140.116.203.60 131.215.220.163
92.195.118.229 140.116.245.189 140.110.201.102 140.116.90.57