Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States of America (the)

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 150.149.243.134
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 46127
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;150.149.243.134.		IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025012201 1800 900 604800 86400

;; Query time: 37 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Jan 23 06:51:49 CST 2025
;; MSG SIZE  rcvd: 108
Host info
Host 134.243.149.150.in-addr.arpa not found: 2(SERVFAIL)
Nslookup info:
server can't find 150.149.243.134.in-addr.arpa: SERVFAIL
Related IP info:
Related comments:
IP Type Details Datetime
118.70.180.42 attack
@LucianNitescu Personal Honeypot Network <<<>>> Donate at paypal.me/LNitescu <<<>>> 2019-06-30 00:10:00,227 INFO [amun_request_handler] PortScan Detected on Port: 445 (118.70.180.42)
2019-06-30 10:32:58
186.216.154.189 attackbotsspam
Jun 29 14:48:55 web1 postfix/smtpd[29349]: warning: unknown[186.216.154.189]: SASL PLAIN authentication failed: authentication failure
...
2019-06-30 10:58:40
41.39.43.32 attackspam
@LucianNitescu Personal Honeypot Network <<<>>> Donate at paypal.me/LNitescu <<<>>> 2019-06-29 18:19:52,666 INFO [shellcode_manager] (41.39.43.32) no match, writing hexdump (6fedc213f6fe6009abe68fd93a9b3572 :1851776) - MS17010 (EternalBlue)
2019-06-30 10:51:04
218.92.0.171 attackspambots
2019-06-16T14:18:27.108719wiz-ks3 sshd[12789]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.171  user=root
2019-06-16T14:18:29.507246wiz-ks3 sshd[12789]: Failed password for root from 218.92.0.171 port 15017 ssh2
2019-06-16T14:18:32.487528wiz-ks3 sshd[12789]: Failed password for root from 218.92.0.171 port 15017 ssh2
2019-06-16T14:18:27.108719wiz-ks3 sshd[12789]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.171  user=root
2019-06-16T14:18:29.507246wiz-ks3 sshd[12789]: Failed password for root from 218.92.0.171 port 15017 ssh2
2019-06-16T14:18:32.487528wiz-ks3 sshd[12789]: Failed password for root from 218.92.0.171 port 15017 ssh2
2019-06-16T14:18:27.108719wiz-ks3 sshd[12789]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.171  user=root
2019-06-16T14:18:29.507246wiz-ks3 sshd[12789]: Failed password for root from 218.92.0.171 port 15017 ssh2
2019-06-16T14:18:
2019-06-30 10:39:44
118.96.187.5 attackbotsspam
SSH-BruteForce
2019-06-30 11:03:24
105.186.121.45 attackspambots
@LucianNitescu Personal Honeypot Network <<<>>> Donate at paypal.me/LNitescu <<<>>> 2019-06-29 18:00:48,166 INFO [shellcode_manager] (105.186.121.45) no match, writing hexdump (06cb1cdc794ded1faa9f8ed0bf4f6df0 :10711) - SMB (Unknown)
2019-06-30 10:57:02
206.81.8.171 attack
$f2bV_matches
2019-06-30 10:31:19
122.160.41.85 attackspambots
@LucianNitescu Personal Honeypot Network <<<>>> Donate at paypal.me/LNitescu <<<>>> 2019-06-29 17:17:03,430 INFO [amun_request_handler] PortScan Detected on Port: 445 (122.160.41.85)
2019-06-30 10:52:09
46.209.45.58 attackspam
2019-06-29T18:48:12.879067abusebot-8.cloudsearch.cf sshd\[31867\]: Invalid user gerald from 46.209.45.58 port 44324
2019-06-30 11:13:09
115.84.99.249 attack
Automatic report - Web App Attack
2019-06-30 10:56:39
201.216.193.65 attack
Jun 30 04:11:07 nginx sshd[28742]: Invalid user scaner from 201.216.193.65
Jun 30 04:11:07 nginx sshd[28742]: Received disconnect from 201.216.193.65 port 57606:11: Normal Shutdown, Thank you for playing [preauth]
2019-06-30 10:42:55
190.153.249.99 attackbots
Jun 29 18:49:37 MK-Soft-VM5 sshd\[22502\]: Invalid user kristy from 190.153.249.99 port 34164
Jun 29 18:49:37 MK-Soft-VM5 sshd\[22502\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=190.153.249.99
Jun 29 18:49:39 MK-Soft-VM5 sshd\[22502\]: Failed password for invalid user kristy from 190.153.249.99 port 34164 ssh2
...
2019-06-30 10:34:48
106.52.106.61 attackbotsspam
Jun 30 00:56:20 vtv3 sshd\[7792\]: Invalid user eurobos from 106.52.106.61 port 33152
Jun 30 00:56:20 vtv3 sshd\[7792\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.52.106.61
Jun 30 00:56:23 vtv3 sshd\[7792\]: Failed password for invalid user eurobos from 106.52.106.61 port 33152 ssh2
Jun 30 00:59:59 vtv3 sshd\[9278\]: Invalid user amaina from 106.52.106.61 port 43462
Jun 30 00:59:59 vtv3 sshd\[9278\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.52.106.61
Jun 30 01:11:37 vtv3 sshd\[15328\]: Invalid user bi from 106.52.106.61 port 49466
Jun 30 01:11:37 vtv3 sshd\[15328\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.52.106.61
Jun 30 01:11:38 vtv3 sshd\[15328\]: Failed password for invalid user bi from 106.52.106.61 port 49466 ssh2
Jun 30 01:13:23 vtv3 sshd\[16065\]: Invalid user mcserv from 106.52.106.61 port 38228
Jun 30 01:13:23 vtv3 sshd\[16065\]: pam_unix\(
2019-06-30 10:47:16
193.106.26.133 attack
@LucianNitescu Personal Honeypot Network <<<>>> Donate at paypal.me/LNitescu <<<>>> 2019-06-29 18:20:56,866 INFO [shellcode_manager] (193.106.26.133) no match, writing hexdump (62fac287814c195fd321eaba9c13180c :6283) - SMB (Unknown)
2019-06-30 10:45:33
61.157.78.139 attack
ssh failed login
2019-06-30 10:41:13

Recently Reported IPs

137.143.63.75 206.9.53.218 136.45.71.154 212.19.230.96
185.223.94.166 97.68.146.205 66.110.220.173 78.200.117.158
244.126.40.185 39.31.161.4 39.136.221.139 49.103.37.119
66.64.125.247 124.235.65.173 244.54.202.168 18.57.188.49
140.57.72.127 45.215.49.159 95.74.249.237 199.144.12.74