Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Dübendorf

Region: Zurich

Country: Switzerland

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 150.205.201.40
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 16080
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;150.205.201.40.			IN	A

;; AUTHORITY SECTION:
.			575	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019120401 1800 900 604800 86400

;; Query time: 109 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Dec 04 14:24:32 CST 2019
;; MSG SIZE  rcvd: 118
Host info
Host 40.201.205.150.in-addr.arpa not found: 2(SERVFAIL)
Nslookup info:
;; Got SERVFAIL reply from 183.60.83.19, trying next server
Server:		183.60.82.98
Address:	183.60.82.98#53

** server can't find 40.201.205.150.in-addr.arpa: SERVFAIL
Related IP info:
Related comments:
IP Type Details Datetime
203.90.16.223 attackspam
Automatic report - Banned IP Access
2020-05-26 14:46:56
200.75.12.34 attack
1590448803 - 05/26/2020 01:20:03 Host: 200.75.12.34/200.75.12.34 Port: 445 TCP Blocked
2020-05-26 14:57:32
104.206.128.26 attackbotsspam
8045/tcp 2543/tcp 2602/tcp...
[2020-03-25/05-25]65pkt,20pt.(tcp),1pt.(udp)
2020-05-26 14:58:32
119.188.241.207 attack
SSH invalid-user multiple login try
2020-05-26 15:03:52
49.88.112.115 attack
Unauthorized connection attempt detected from IP address 49.88.112.115 to port 22
2020-05-26 14:55:59
196.52.43.98 attack
 TCP (SYN) 196.52.43.98:62682 -> port 139, len 44
2020-05-26 14:44:44
123.30.149.92 attackbots
May 26 07:09:07 game-panel sshd[16531]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=123.30.149.92
May 26 07:09:09 game-panel sshd[16531]: Failed password for invalid user jenkins from 123.30.149.92 port 39463 ssh2
May 26 07:09:11 game-panel sshd[16531]: Failed password for invalid user jenkins from 123.30.149.92 port 39463 ssh2
May 26 07:09:14 game-panel sshd[16531]: Failed password for invalid user jenkins from 123.30.149.92 port 39463 ssh2
2020-05-26 15:14:18
188.92.77.235 attack
Port Scan detected!
...
2020-05-26 14:50:52
183.131.84.141 attackspam
detected by Fail2Ban
2020-05-26 14:59:20
111.231.225.162 attackbotsspam
May 26 07:39:57 ajax sshd[23962]: Failed password for root from 111.231.225.162 port 38146 ssh2
2020-05-26 15:05:23
117.27.76.238 attackbotsspam
DATE:2020-05-26 07:28:06, IP:117.27.76.238, PORT:ssh SSH brute force auth (docker-dc)
2020-05-26 15:13:05
189.69.58.244 attackspambots
Port probing on unauthorized port 445
2020-05-26 15:18:38
172.81.204.133 attackspam
Failed password for invalid user prueba from 172.81.204.133 port 38146 ssh2
2020-05-26 15:15:30
47.148.104.20 attackbots
php WP PHPmyadamin ABUSE blocked for 12h
2020-05-26 15:07:48
116.255.131.142 attackbotsspam
Invalid user ijm from 116.255.131.142 port 57842
2020-05-26 14:59:38

Recently Reported IPs

56.235.16.171 223.108.97.37 74.168.160.108 76.59.160.161
223.14.28.106 59.58.209.253 196.20.96.228 129.25.31.91
125.34.161.207 223.242.131.109 37.210.161.121 104.125.246.52
18.180.98.73 78.189.143.227 198.227.66.24 128.73.53.170
176.56.155.119 134.32.47.100 83.63.225.38 93.61.251.156