Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Southfield

Region: Michigan

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: Henry Ford Health System

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 150.198.123.242
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 48155
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;150.198.123.242.		IN	A

;; AUTHORITY SECTION:
.			3600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019080300 1800 900 604800 86400

;; Query time: 2 msec
;; SERVER: 67.207.67.2#53(67.207.67.2)
;; WHEN: Sun Aug 04 00:43:30 CST 2019
;; MSG SIZE  rcvd: 119
Host info
Host 242.123.198.150.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		67.207.67.2
Address:	67.207.67.2#53

** server can't find 242.123.198.150.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
40.77.167.42 attackbots
Automatic report - Banned IP Access
2019-10-22 19:00:57
210.223.185.30 attackbots
UTC: 2019-10-21 port: 23/tcp
2019-10-22 18:57:14
111.254.2.229 attack
UTC: 2019-10-21 port: 23/tcp
2019-10-22 19:21:25
103.205.133.77 attackspam
Oct 22 00:20:51 xtremcommunity sshd\[765378\]: Invalid user sniknej from 103.205.133.77 port 54342
Oct 22 00:20:51 xtremcommunity sshd\[765378\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.205.133.77
Oct 22 00:20:53 xtremcommunity sshd\[765378\]: Failed password for invalid user sniknej from 103.205.133.77 port 54342 ssh2
Oct 22 00:25:27 xtremcommunity sshd\[765466\]: Invalid user Matthew from 103.205.133.77 port 36036
Oct 22 00:25:27 xtremcommunity sshd\[765466\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.205.133.77
...
2019-10-22 18:46:38
117.94.188.48 attackbots
UTC: 2019-10-21 pkts: 2 port: 23/tcp
2019-10-22 19:18:31
37.59.125.153 attackbots
2019-10-22T12:25:52.105163  sshd[25120]: Invalid user test2 from 37.59.125.153 port 38990
2019-10-22T12:25:52.114845  sshd[25120]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=37.59.125.153
2019-10-22T12:25:52.105163  sshd[25120]: Invalid user test2 from 37.59.125.153 port 38990
2019-10-22T12:25:53.711823  sshd[25120]: Failed password for invalid user test2 from 37.59.125.153 port 38990 ssh2
2019-10-22T12:31:37.859001  sshd[25251]: Invalid user test2 from 37.59.125.153 port 47818
...
2019-10-22 18:58:58
200.57.249.134 attack
UTC: 2019-10-21 pkts: 4 port: 23/tcp
2019-10-22 18:59:40
110.49.101.58 attackspam
$f2bV_matches
2019-10-22 18:54:26
34.83.254.151 attack
Mail/25/465/587-993/995 Probe, Reject, BadAuth, Hack, SPAM -
2019-10-22 19:10:18
51.68.190.223 attack
Oct 22 12:58:32 MK-Soft-VM5 sshd[31827]: Failed password for root from 51.68.190.223 port 39686 ssh2
...
2019-10-22 19:05:39
72.49.13.230 attackspam
UTC: 2019-10-21 port: 22/tcp
2019-10-22 18:54:44
74.82.47.22 attackspam
UTC: 2019-10-21 port: 389/tcp
2019-10-22 18:49:57
36.238.48.39 attackbotsspam
UTC: 2019-10-21 port: 23/tcp
2019-10-22 19:07:36
88.81.72.240 attack
$f2bV_matches
2019-10-22 19:20:08
92.118.160.21 attackbotsspam
4786/tcp 62078/tcp 7547/tcp...
[2019-08-23/10-22]130pkt,68pt.(tcp),6pt.(udp),1tp.(icmp)
2019-10-22 19:15:38

Recently Reported IPs

73.121.30.182 36.65.68.1 64.194.254.228 46.67.154.184
1.190.206.198 190.96.129.114 173.28.207.213 169.252.110.133
193.75.137.63 168.228.150.159 180.0.231.143 175.132.70.203
103.220.34.65 167.202.214.105 58.230.170.156 64.43.243.157
191.53.253.236 62.173.189.202 90.171.199.91 207.136.91.168