Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 150.149.137.30
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 40322
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;150.149.137.30.			IN	A

;; AUTHORITY SECTION:
.			178	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019121900 1800 900 604800 86400

;; Query time: 61 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Dec 19 20:29:41 CST 2019
;; MSG SIZE  rcvd: 118
Host info
Host 30.137.149.150.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 30.137.149.150.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
182.72.99.196 attack
3x Failed Password
2020-05-11 16:03:48
122.14.195.58 attackbots
$f2bV_matches
2020-05-11 15:23:11
162.243.136.203 attackspambots
" "
2020-05-11 15:46:20
139.220.192.57 attack
[portscan] tcp/22 [SSH]
*(RWIN=65535)(05110729)
2020-05-11 16:02:02
167.172.145.142 attack
SSH login attempts.
2020-05-11 15:39:41
92.222.79.157 attack
2020-05-11T06:28:21.841637shield sshd\[27628\]: Invalid user apache from 92.222.79.157 port 40348
2020-05-11T06:28:21.845484shield sshd\[27628\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.ip-92-222-79.eu
2020-05-11T06:28:23.840563shield sshd\[27628\]: Failed password for invalid user apache from 92.222.79.157 port 40348 ssh2
2020-05-11T06:32:14.731938shield sshd\[28876\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.ip-92-222-79.eu  user=root
2020-05-11T06:32:17.057902shield sshd\[28876\]: Failed password for root from 92.222.79.157 port 48764 ssh2
2020-05-11 15:26:51
95.163.255.131 attackbots
port scan and connect, tcp 80 (http)
2020-05-11 15:31:19
203.151.146.216 attack
SSH/22 MH Probe, BF, Hack -
2020-05-11 15:50:32
95.163.255.140 attackbots
port scan and connect, tcp 443 (https)
2020-05-11 15:44:53
188.165.162.99 attackspam
SSH login attempts.
2020-05-11 16:01:39
125.124.147.191 attackspambots
May 11 09:21:31 meumeu sshd[16966]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=125.124.147.191 
May 11 09:21:34 meumeu sshd[16966]: Failed password for invalid user lighttpd from 125.124.147.191 port 39844 ssh2
May 11 09:26:36 meumeu sshd[17753]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=125.124.147.191 
...
2020-05-11 16:02:16
144.91.67.1 attackbotsspam
k+ssh-bruteforce
2020-05-11 15:32:37
34.92.209.215 attackbotsspam
May 11 16:18:41 localhost sshd[1037881]: Invalid user catering from 34.92.209.215 port 47760
...
2020-05-11 15:39:09
119.28.132.211 attackspambots
Invalid user admin from 119.28.132.211 port 46166
2020-05-11 15:52:41
68.73.49.153 attackspambots
$f2bV_matches
2020-05-11 15:45:35

Recently Reported IPs

192.200.200.143 189.28.186.26 178.176.61.193 170.247.112.108
160.238.163.29 4.205.182.1 25.37.158.22 139.28.223.152
248.2.154.204 122.154.193.6 222.137.9.239 87.80.238.88
117.206.83.238 39.59.83.63 190.15.203.155 177.125.204.11
176.197.100.134 170.249.191.114 170.51.140.132 116.193.172.237