Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Brazil

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 150.161.136.13
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 4438
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;150.161.136.13.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025021800 1800 900 604800 86400

;; Query time: 14 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Feb 18 20:01:56 CST 2025
;; MSG SIZE  rcvd: 107
Host info
Host 13.136.161.150.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 13.136.161.150.in-addr.arpa: NXDOMAIN

Related IP info:
Related comments:
IP Type Details Datetime
192.144.142.72 attack
Dec 15 12:07:02 h2177944 sshd\[18679\]: Invalid user kristianse from 192.144.142.72 port 42879
Dec 15 12:07:02 h2177944 sshd\[18679\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=192.144.142.72
Dec 15 12:07:04 h2177944 sshd\[18679\]: Failed password for invalid user kristianse from 192.144.142.72 port 42879 ssh2
Dec 15 12:14:12 h2177944 sshd\[18927\]: Invalid user shianhan from 192.144.142.72 port 41490
...
2019-12-15 19:57:14
106.13.75.97 attackbotsspam
Dec 15 02:42:43 linuxvps sshd\[31558\]: Invalid user date from 106.13.75.97
Dec 15 02:42:43 linuxvps sshd\[31558\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.75.97
Dec 15 02:42:45 linuxvps sshd\[31558\]: Failed password for invalid user date from 106.13.75.97 port 45276 ssh2
Dec 15 02:49:54 linuxvps sshd\[36433\]: Invalid user 123123 from 106.13.75.97
Dec 15 02:49:54 linuxvps sshd\[36433\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.75.97
2019-12-15 20:02:40
171.25.193.78 attackspambots
Automatic report - Banned IP Access
2019-12-15 20:12:21
106.12.208.211 attack
Dec 15 07:25:15 MK-Soft-Root1 sshd[29794]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.208.211 
Dec 15 07:25:18 MK-Soft-Root1 sshd[29794]: Failed password for invalid user guest from 106.12.208.211 port 38538 ssh2
...
2019-12-15 20:13:40
41.184.42.202 attackbotsspam
Fail2Ban Ban Triggered
2019-12-15 20:01:19
106.12.48.216 attack
Dec 15 02:04:55 wbs sshd\[17315\]: Invalid user prebe from 106.12.48.216
Dec 15 02:04:55 wbs sshd\[17315\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.48.216
Dec 15 02:04:57 wbs sshd\[17315\]: Failed password for invalid user prebe from 106.12.48.216 port 48130 ssh2
Dec 15 02:13:47 wbs sshd\[18275\]: Invalid user oberkirch from 106.12.48.216
Dec 15 02:13:47 wbs sshd\[18275\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.48.216
2019-12-15 20:26:26
139.59.17.209 attackbotsspam
Automatic report - XMLRPC Attack
2019-12-15 19:53:31
122.51.59.149 attackspambots
Dec 15 12:03:51 sshgateway sshd\[24595\]: Invalid user wu from 122.51.59.149
Dec 15 12:03:51 sshgateway sshd\[24595\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.51.59.149
Dec 15 12:03:53 sshgateway sshd\[24595\]: Failed password for invalid user wu from 122.51.59.149 port 39438 ssh2
2019-12-15 20:04:51
72.252.139.211 attack
Honeypot attack, port: 23, PTR: PTR record not found
2019-12-15 20:12:56
187.141.122.148 attack
15.12.2019 12:20:58 SSH access blocked by firewall
2019-12-15 20:21:18
95.215.161.155 attackbotsspam
Unauthorized connection attempt detected from IP address 95.215.161.155 to port 8080
2019-12-15 20:08:03
42.200.66.164 attack
Dec 15 11:28:10 meumeu sshd[24198]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=42.200.66.164 
Dec 15 11:28:12 meumeu sshd[24198]: Failed password for invalid user guest from 42.200.66.164 port 56090 ssh2
Dec 15 11:34:16 meumeu sshd[25091]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=42.200.66.164 
...
2019-12-15 20:24:47
180.76.141.221 attackspambots
Dec 15 07:25:34 vps647732 sshd[9504]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.76.141.221
Dec 15 07:25:36 vps647732 sshd[9504]: Failed password for invalid user test from 180.76.141.221 port 35067 ssh2
...
2019-12-15 19:52:42
118.24.121.240 attackspambots
Dec 15 08:53:52 hcbbdb sshd\[19881\]: Invalid user giddiana from 118.24.121.240
Dec 15 08:53:52 hcbbdb sshd\[19881\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.24.121.240
Dec 15 08:53:54 hcbbdb sshd\[19881\]: Failed password for invalid user giddiana from 118.24.121.240 port 12372 ssh2
Dec 15 08:58:16 hcbbdb sshd\[20393\]: Invalid user genin from 118.24.121.240
Dec 15 08:58:16 hcbbdb sshd\[20393\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.24.121.240
2019-12-15 20:19:15
149.56.131.73 attackbots
Dec 15 12:57:43 gw1 sshd[7403]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=149.56.131.73
Dec 15 12:57:45 gw1 sshd[7403]: Failed password for invalid user roseth from 149.56.131.73 port 41100 ssh2
...
2019-12-15 20:14:43

Recently Reported IPs

120.0.39.65 42.168.90.254 213.171.252.16 61.132.188.102
65.139.94.15 218.172.236.15 251.148.52.126 20.109.114.34
206.16.209.109 210.153.156.225 23.170.156.115 225.182.189.58
47.225.11.231 154.65.188.153 58.93.99.155 96.89.93.139
223.57.174.146 147.136.219.162 25.128.119.211 129.193.172.74