Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: None

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 150.197.21.98
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 26328
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;150.197.21.98.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025021901 1800 900 604800 86400

;; Query time: 37 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Feb 20 02:19:55 CST 2025
;; MSG SIZE  rcvd: 106
Host info
Host 98.21.197.150.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 98.21.197.150.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
131.196.218.1 attackspambots
445/tcp
[2019-11-01]1pkt
2019-11-01 15:39:14
119.42.94.130 attackspambots
445/tcp
[2019-11-01]1pkt
2019-11-01 15:42:31
106.54.245.86 attack
Oct 31 08:24:18 xb0 sshd[12945]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.54.245.86  user=r.r
Oct 31 08:24:20 xb0 sshd[12945]: Failed password for r.r from 106.54.245.86 port 13374 ssh2
Oct 31 08:24:21 xb0 sshd[12945]: Received disconnect from 106.54.245.86: 11: Bye Bye [preauth]
Oct 31 08:42:44 xb0 sshd[15649]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.54.245.86  user=mysql
Oct 31 08:42:47 xb0 sshd[15649]: Failed password for mysql from 106.54.245.86 port 12492 ssh2
Oct 31 08:42:47 xb0 sshd[15649]: Received disconnect from 106.54.245.86: 11: Bye Bye [preauth]
Oct 31 08:47:42 xb0 sshd[15439]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.54.245.86  user=r.r
Oct 31 08:47:44 xb0 sshd[15439]: Failed password for r.r from 106.54.245.86 port 51850 ssh2
Oct 31 08:47:45 xb0 sshd[15439]: Received disconnect from 106.54.245.86: 11: By........
-------------------------------
2019-11-01 15:24:58
163.172.34.218 attackspam
Oct 31 20:57:35 giraffe sshd[27351]: Did not receive identification string from 163.172.34.218
Oct 31 20:57:37 giraffe sshd[27352]: Connection closed by 163.172.34.218 port 61334 [preauth]
Oct 31 20:57:38 giraffe sshd[27354]: Invalid user admin from 163.172.34.218
Oct 31 20:57:38 giraffe sshd[27354]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=163.172.34.218
Oct 31 20:57:40 giraffe sshd[27354]: Failed password for invalid user admin from 163.172.34.218 port 61486 ssh2
Oct 31 20:57:41 giraffe sshd[27354]: Connection closed by 163.172.34.218 port 61486 [preauth]
Oct 31 20:57:42 giraffe sshd[27358]: Invalid user admin from 163.172.34.218
Oct 31 20:57:43 giraffe sshd[27358]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=163.172.34.218
Oct 31 20:57:45 giraffe sshd[27358]: Failed password for invalid user admin from 163.172.34.218 port 61849 ssh2
Oct 31 20:57:45 giraffe sshd[27358]: Connecti........
-------------------------------
2019-11-01 15:52:00
145.255.2.107 attackspambots
Chat Spam
2019-11-01 15:46:23
122.116.189.132 attack
" "
2019-11-01 15:56:00
188.170.13.225 attackspam
SSH brutforce
2019-11-01 15:21:32
111.231.121.62 attackspam
2019-11-01T07:24:11.094879abusebot-8.cloudsearch.cf sshd\[1866\]: Invalid user admin from 111.231.121.62 port 55864
2019-11-01 15:41:25
119.60.255.90 attackspambots
2019-11-01T04:44:00.658416  sshd[30877]: Invalid user ballin from 119.60.255.90 port 44394
2019-11-01T04:44:00.672265  sshd[30877]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=119.60.255.90
2019-11-01T04:44:00.658416  sshd[30877]: Invalid user ballin from 119.60.255.90 port 44394
2019-11-01T04:44:02.933593  sshd[30877]: Failed password for invalid user ballin from 119.60.255.90 port 44394 ssh2
2019-11-01T04:52:34.664305  sshd[31043]: Invalid user 123 from 119.60.255.90 port 56482
...
2019-11-01 15:46:57
177.42.254.199 attackspam
web-1 [ssh_2] SSH Attack
2019-11-01 15:54:19
178.124.172.70 attack
37215/tcp
[2019-11-01]1pkt
2019-11-01 15:50:26
193.112.97.157 attackspam
...
2019-11-01 15:29:13
150.95.135.190 attackspambots
2019-11-01T06:39:03.679636abusebot-8.cloudsearch.cf sshd\[1749\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=v150-95-135-190.a080.g.tyo1.static.cnode.io  user=root
2019-11-01 15:40:46
83.21.127.228 attack
IP Ban Report :  
 https://help-dysk.pl/wordpress-firewall-plugins/ip/83.21.127.228/ 
 
 PL - 1H : (134)  
 Protection Against DDoS WordPress plugin :  
 "odzyskiwanie danych help-dysk" 
 IP Address Ranges by Country : PL 
 NAME ASN : ASN5617 
 
 IP : 83.21.127.228 
 
 CIDR : 83.20.0.0/14 
 
 PREFIX COUNT : 183 
 
 UNIQUE IP COUNT : 5363456 
 
 
 ATTACKS DETECTED ASN5617 :  
  1H - 4 
  3H - 10 
  6H - 16 
 12H - 29 
 24H - 57 
 
 DateTime : 2019-11-01 04:52:36 
 
 INFO : Port Scan TELNET Detected and Blocked by ADMIN  - data recovery
2019-11-01 15:44:32
118.89.165.245 attack
Oct 31 18:31:06 auw2 sshd\[29842\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.89.165.245  user=root
Oct 31 18:31:08 auw2 sshd\[29842\]: Failed password for root from 118.89.165.245 port 38718 ssh2
Oct 31 18:35:47 auw2 sshd\[30236\]: Invalid user slurm from 118.89.165.245
Oct 31 18:35:47 auw2 sshd\[30236\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.89.165.245
Oct 31 18:35:49 auw2 sshd\[30236\]: Failed password for invalid user slurm from 118.89.165.245 port 46960 ssh2
2019-11-01 15:31:42

Recently Reported IPs

205.38.235.117 201.57.102.56 207.104.207.125 238.124.58.82
231.102.122.28 195.57.72.71 221.215.94.253 152.91.186.93
225.82.251.239 202.76.138.23 204.205.72.202 182.127.122.51
14.61.28.155 214.224.116.209 179.133.158.141 248.181.100.147
221.213.40.205 144.99.53.4 73.20.239.198 64.60.51.199