Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Timor-leste

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 150.242.109.82
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 46702
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;150.242.109.82.			IN	A

;; AUTHORITY SECTION:
.			481	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022100601 1800 900 604800 86400

;; Query time: 471 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Oct 07 03:45:28 CST 2022
;; MSG SIZE  rcvd: 107
Host info
b'Host 82.109.242.150.in-addr.arpa not found: 2(SERVFAIL)
'
Nslookup info:
;; Got SERVFAIL reply from 183.60.83.19, trying next server
Server:		183.60.82.98
Address:	183.60.82.98#53

** server can't find 82.109.242.150.in-addr.arpa: SERVFAIL
Related IP info:
Related comments:
IP Type Details Datetime
185.193.90.166 attackspambots
ET DROP Dshield Block Listed Source group 1 - port: 18160 proto: tcp cat: Misc Attackbytes: 60
2020-09-30 15:57:23
71.6.232.6 attackbots
SIP/5060 Probe, BF, Hack -
2020-09-30 15:47:14
193.27.228.156 attackbots
SIP/5060 Probe, BF, Hack -
2020-09-30 15:56:39
178.141.166.137 attack
WEB SPAM: Straight guy With large weenie receives Sucked Then pounds Part 1 Add to playlist Go Gay Tube TV. Want to meet single gay men in Scotland Neck, North Carolina?  https://pornolojizle.info  Free Gay Black Porn Videos With Big Cocks And Nice Ass | Pornhub. Watch video Handsome friends enjoy perfect coitus times. Short story about me getting my cherry popped finally. With your free account you can browser through thousands profiles of cross dressers, transvestites, transgendered and transsexual sing
2020-09-30 15:25:27
111.231.193.72 attackspam
Invalid user 5 from 111.231.193.72 port 42982
2020-09-30 15:22:29
106.12.205.237 attackspam
 TCP (SYN) 106.12.205.237:56909 -> port 1544, len 44
2020-09-30 15:37:15
45.129.33.15 attackbots
TCP Port Scanning
2020-09-30 16:15:54
159.65.157.221 attackspam
CMS (WordPress or Joomla) login attempt.
2020-09-30 15:26:28
103.145.13.221 attackbots
Port scanning [4 denied]
2020-09-30 15:38:52
104.206.128.46 attack
Telnet/23 MH Probe, Scan, BF, Hack -
2020-09-30 16:02:44
45.129.33.81 attackspambots
[MK-Root1] Blocked by UFW
2020-09-30 16:14:49
156.96.112.211 attackbotsspam
US - - [29/Sep/2020:18:15:17 +0300] GET / HTTP/1.1 302 - - -
2020-09-30 15:59:19
51.195.63.170 attackspam
51.195.63.170 was recorded 11 times by 3 hosts attempting to connect to the following ports: 5060. Incident counter (4h, 24h, all-time): 11, 89, 290
2020-09-30 15:23:17
45.129.33.12 attack
 TCP (SYN) 45.129.33.12:49132 -> port 63413, len 44
2020-09-30 16:16:20
103.66.96.230 attackbots
$f2bV_matches
2020-09-30 15:19:26

Recently Reported IPs

185.61.223.13 41.60.237.112 193.233.138.110 123.193.180.46
154.16.243.199 85.239.37.241 209.160.117.85 193.31.126.167
147.78.181.82 85.239.37.165 217.213.96.197 77.83.87.200
217.132.181.190 220.82.130.157 124.221.246.167 202.65.206.110
185.202.108.32 193.31.126.156 193.233.141.117 203.218.253.33