Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Granada

Region: Comunidad Autónoma de Andalucía

Country: Spain

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 150.214.205.51
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 4850
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;150.214.205.51.			IN	A

;; AUTHORITY SECTION:
.			58	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2023050500 1800 900 604800 86400

;; Query time: 61 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri May 05 16:12:11 CST 2023
;; MSG SIZE  rcvd: 107
Host info
51.205.214.150.in-addr.arpa domain name pointer nat-cvi-p-5051.ugr.es.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
51.205.214.150.in-addr.arpa	name = nat-cvi-p-5051.ugr.es.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
200.54.218.82 attack
Brute force attempt
2019-12-14 02:14:36
134.209.97.228 attackspam
Repeated brute force against a port
2019-12-14 02:14:56
41.38.97.25 attackspam
Dec 13 16:58:40 [munged] sshd[17361]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=41.38.97.25
2019-12-14 01:58:24
139.199.164.132 attack
Dec 13 12:55:28 ny01 sshd[8388]: Failed password for root from 139.199.164.132 port 33176 ssh2
Dec 13 13:01:27 ny01 sshd[9121]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.199.164.132
Dec 13 13:01:29 ny01 sshd[9121]: Failed password for invalid user ju from 139.199.164.132 port 51274 ssh2
2019-12-14 02:07:05
178.150.216.229 attack
Dec 13 18:00:38 MK-Soft-VM3 sshd[29633]: Failed password for root from 178.150.216.229 port 39076 ssh2
...
2019-12-14 01:50:44
114.26.49.139 attack
Unauthorized connection attempt detected from IP address 114.26.49.139 to port 445
2019-12-14 02:01:17
106.75.84.197 attackbots
Unauthorized connection attempt detected from IP address 106.75.84.197 to port 13
2019-12-14 02:08:39
177.207.6.208 attackspam
Automatic report - Port Scan Attack
2019-12-14 02:06:09
83.16.14.107 attackspambots
Dec 13 16:57:06 *** sshd[26560]: Invalid user shimi from 83.16.14.107
2019-12-14 02:09:19
154.47.138.53 attack
Unauthorized connection attempt detected from IP address 154.47.138.53 to port 445
2019-12-14 02:20:26
36.89.149.249 attack
$f2bV_matches
2019-12-14 02:09:55
192.228.100.238 attack
SSH login attempts
2019-12-14 01:59:07
167.172.170.60 attackbotsspam
Unauthorized IMAP connection attempt
2019-12-14 02:17:58
190.13.129.34 attackspambots
Dec 13 16:51:05 legacy sshd[14896]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=190.13.129.34
Dec 13 16:51:07 legacy sshd[14896]: Failed password for invalid user hz52109 from 190.13.129.34 port 45050 ssh2
Dec 13 16:58:45 legacy sshd[15248]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=190.13.129.34
...
2019-12-14 01:54:11
222.186.180.17 attack
Dec 14 01:12:53 webhost01 sshd[22016]: Failed password for root from 222.186.180.17 port 55966 ssh2
Dec 14 01:13:07 webhost01 sshd[22016]: error: maximum authentication attempts exceeded for root from 222.186.180.17 port 55966 ssh2 [preauth]
...
2019-12-14 02:13:47

Recently Reported IPs

202.55.160.68 140.116.33.48 140.116.67.107 198.51.92.2
140.116.56.143 203.119.25.1 140.116.20.241 182.255.120.72
140.116.138.52 140.116.199.164 140.116.14.19 140.116.109.11
140.116.28.241 140.116.8.119 140.116.137.129 130.64.25.58
4.142.61.243 138.16.108.234 194.27.245.79 140.116.165.57