Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States of America (the)

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 150.208.139.107
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 38764
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;150.208.139.107.		IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025022200 1800 900 604800 86400

;; Query time: 15 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Feb 22 16:29:52 CST 2025
;; MSG SIZE  rcvd: 108
Host info
Host 107.139.208.150.in-addr.arpa not found: 2(SERVFAIL)
Nslookup info:
server can't find 150.208.139.107.in-addr.arpa: SERVFAIL
Related IP info:
Related comments:
IP Type Details Datetime
120.70.103.239 attackspambots
Invalid user meteor from 120.70.103.239 port 56620
2020-05-01 15:07:00
206.189.47.166 attackbots
Invalid user pke from 206.189.47.166 port 45664
2020-05-01 15:32:46
106.12.120.207 attack
2020-05-01T01:00:37.175145linuxbox-skyline sshd[88830]: Invalid user monit from 106.12.120.207 port 41592
...
2020-05-01 15:13:46
150.136.8.55 attackspambots
Invalid user sonny from 150.136.8.55 port 55166
2020-05-01 15:00:50
37.204.205.176 attack
Invalid user tor from 37.204.205.176 port 35704
2020-05-01 15:27:51
223.171.32.55 attackbots
Failed password for invalid user www from 223.171.32.55 port 55624 ssh2
2020-05-01 15:30:47
96.77.231.29 attack
hit -> srv3:22
2020-05-01 15:16:00
164.132.56.243 attackbots
Invalid user postgres from 164.132.56.243 port 41745
2020-05-01 14:59:37
163.177.97.2 attack
Invalid user backup from 163.177.97.2 port 36538
2020-05-01 15:00:03
1.245.61.144 attack
Invalid user admin from 1.245.61.144 port 23173
2020-05-01 15:30:31
193.112.107.200 attackbotsspam
hit -> srv3:22
2020-05-01 15:34:42
111.229.196.156 attackbotsspam
May  1 03:55:17 firewall sshd[17704]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.229.196.156
May  1 03:55:17 firewall sshd[17704]: Invalid user lcy from 111.229.196.156
May  1 03:55:19 firewall sshd[17704]: Failed password for invalid user lcy from 111.229.196.156 port 43868 ssh2
...
2020-05-01 15:09:43
145.239.78.111 attack
May  1 06:49:40 vps647732 sshd[32080]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=145.239.78.111
May  1 06:49:42 vps647732 sshd[32080]: Failed password for invalid user market from 145.239.78.111 port 39036 ssh2
...
2020-05-01 15:02:28
154.8.178.29 attackbotsspam
Invalid user ispconfig from 154.8.178.29 port 40722
2020-05-01 15:00:35
78.118.109.112 attack
May  1 09:10:29 OPSO sshd\[23597\]: Invalid user rabbitmq from 78.118.109.112 port 43190
May  1 09:10:29 OPSO sshd\[23597\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=78.118.109.112
May  1 09:10:31 OPSO sshd\[23597\]: Failed password for invalid user rabbitmq from 78.118.109.112 port 43190 ssh2
May  1 09:17:37 OPSO sshd\[24753\]: Invalid user hd from 78.118.109.112 port 52072
May  1 09:17:37 OPSO sshd\[24753\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=78.118.109.112
2020-05-01 15:19:17

Recently Reported IPs

136.190.214.61 70.243.138.199 159.148.164.54 25.180.139.238
249.108.218.219 245.14.194.62 191.53.45.36 61.89.91.189
5.243.62.253 186.223.31.255 58.65.153.72 74.211.210.141
245.88.182.42 178.102.63.88 44.246.139.152 66.142.171.242
24.37.130.255 245.189.174.94 68.30.92.187 243.219.126.221