Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Italy

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 150.145.132.118
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 46728
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;150.145.132.118.		IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025022000 1800 900 604800 86400

;; Query time: 11 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Feb 20 18:02:22 CST 2025
;; MSG SIZE  rcvd: 108
Host info
Host 118.132.145.150.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 118.132.145.150.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
185.168.185.93 attackbotsspam
2020-04-19 21:10:54 server sshd[17538]: Failed password for invalid user root from 185.168.185.93 port 39942 ssh2
2020-04-20 23:56:17
180.101.248.148 attackbots
" "
2020-04-20 23:59:25
221.229.196.134 attackbots
Apr 20 17:00:56 odroid64 sshd\[19853\]: Invalid user cpsrvsid from 221.229.196.134
Apr 20 17:00:56 odroid64 sshd\[19853\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=221.229.196.134
...
2020-04-20 23:42:50
185.207.154.228 attack
Invalid user fg from 185.207.154.228 port 52152
2020-04-20 23:55:52
139.59.66.245 attack
Apr 20 18:08:58 pve1 sshd[7290]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.66.245 
Apr 20 18:09:00 pve1 sshd[7290]: Failed password for invalid user test01 from 139.59.66.245 port 33784 ssh2
...
2020-04-21 00:12:10
212.237.42.86 attackspambots
Apr 20 13:20:38 ws26vmsma01 sshd[81999]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=212.237.42.86
Apr 20 13:20:40 ws26vmsma01 sshd[81999]: Failed password for invalid user liferay from 212.237.42.86 port 55458 ssh2
...
2020-04-20 23:46:17
205.217.246.28 attack
Invalid user admin from 205.217.246.28 port 58349
2020-04-20 23:48:48
180.167.126.126 attackspam
Invalid user dt from 180.167.126.126 port 55260
2020-04-20 23:58:59
197.251.192.159 attackbots
Invalid user admin from 197.251.192.159 port 44790
2020-04-20 23:51:25
14.116.255.229 attackbotsspam
Invalid user nt from 14.116.255.229 port 45782
2020-04-20 23:39:33
161.132.194.132 attackspam
Invalid user tm from 161.132.194.132 port 41236
2020-04-21 00:07:09
45.131.5.25 attackbots
Invalid user IWONTWORK from 45.131.5.25 port 54946
2020-04-20 23:31:35
164.132.197.108 attack
Invalid user vn from 164.132.197.108 port 44442
2020-04-21 00:05:46
138.197.32.150 attack
Apr 20 10:42:32 mail sshd\[62244\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.197.32.150  user=root
...
2020-04-21 00:13:33
212.156.249.174 attack
SSH brute-force attempt
2020-04-20 23:46:47

Recently Reported IPs

127.20.212.74 103.188.22.250 50.129.215.82 255.116.20.14
215.168.27.54 176.204.130.17 115.209.55.81 253.177.163.2
192.109.82.162 220.140.126.203 143.121.34.80 63.112.251.122
157.135.226.197 28.75.254.87 19.84.177.26 78.154.54.139
228.166.112.34 222.66.86.177 81.95.216.222 170.4.247.179