Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Japan

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 150.66.114.224
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 20131
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;150.66.114.224.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025030100 1800 900 604800 86400

;; Query time: 13 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Mar 02 01:31:00 CST 2025
;; MSG SIZE  rcvd: 107
Host info
224.114.66.150.in-addr.arpa domain name pointer 150-66-114-224m5.mineo.jp.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
224.114.66.150.in-addr.arpa	name = 150-66-114-224m5.mineo.jp.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
42.200.244.178 attack
May 26 19:28:01 piServer sshd[5218]: Failed password for root from 42.200.244.178 port 51051 ssh2
May 26 19:31:37 piServer sshd[5543]: Failed password for root from 42.200.244.178 port 53210 ssh2
...
2020-05-27 01:41:42
128.199.52.45 attackspambots
2020-05-26T17:49:51.732114sd-86998 sshd[21874]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.199.52.45  user=root
2020-05-26T17:49:53.998569sd-86998 sshd[21874]: Failed password for root from 128.199.52.45 port 60480 ssh2
2020-05-26T17:55:33.491682sd-86998 sshd[22809]: Invalid user tester from 128.199.52.45 port 35268
2020-05-26T17:55:33.493929sd-86998 sshd[22809]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.199.52.45
2020-05-26T17:55:33.491682sd-86998 sshd[22809]: Invalid user tester from 128.199.52.45 port 35268
2020-05-26T17:55:35.043140sd-86998 sshd[22809]: Failed password for invalid user tester from 128.199.52.45 port 35268 ssh2
...
2020-05-27 01:47:13
213.32.92.57 attackbots
May 26 22:09:16 dhoomketu sshd[220466]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=213.32.92.57  user=root
May 26 22:09:18 dhoomketu sshd[220466]: Failed password for root from 213.32.92.57 port 37024 ssh2
May 26 22:11:34 dhoomketu sshd[220504]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=213.32.92.57  user=root
May 26 22:11:36 dhoomketu sshd[220504]: Failed password for root from 213.32.92.57 port 48076 ssh2
May 26 22:13:52 dhoomketu sshd[220552]: Invalid user Includu135dx from 213.32.92.57 port 59136
...
2020-05-27 01:42:42
222.186.190.17 attack
May 26 22:48:01 gw1 sshd[21891]: Failed password for root from 222.186.190.17 port 45939 ssh2
...
2020-05-27 01:57:50
128.14.209.242 attackbotsspam
 TCP (SYN) 128.14.209.242:14749 -> port 443, len 40
2020-05-27 01:28:00
50.100.113.207 attack
May 26 19:34:09 ArkNodeAT sshd\[3796\]: Invalid user ghegheb0ss from 50.100.113.207
May 26 19:34:09 ArkNodeAT sshd\[3796\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=50.100.113.207
May 26 19:34:11 ArkNodeAT sshd\[3796\]: Failed password for invalid user ghegheb0ss from 50.100.113.207 port 40690 ssh2
2020-05-27 01:55:24
141.144.61.39 attack
Unauthorized access or intrusion attempt detected from Thor banned IP
2020-05-27 01:41:28
177.22.91.247 attackspam
May 26 17:55:14 odroid64 sshd\[9315\]: Invalid user niquette from 177.22.91.247
May 26 17:55:14 odroid64 sshd\[9315\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=177.22.91.247
...
2020-05-27 01:59:16
45.82.68.157 attackbots
 TCP (SYN) 45.82.68.157:59700 -> port 1080, len 52
2020-05-27 01:37:40
51.83.72.243 attackbots
Failed password for invalid user witzig from 51.83.72.243 port 52712 ssh2
2020-05-27 01:46:00
59.56.99.130 attackbotsspam
Fail2Ban - SSH Bruteforce Attempt
2020-05-27 02:00:19
87.251.74.50 attackspambots
May 26 19:37:49 ns3164893 sshd[29661]: Invalid user user from 87.251.74.50 port 19826
May 26 19:37:49 ns3164893 sshd[29660]: Invalid user admin from 87.251.74.50 port 19518
...
2020-05-27 01:56:09
78.176.47.73 attack
Automatic report - Port Scan Attack
2020-05-27 01:58:49
207.46.13.129 attackbotsspam
Automatic report - Banned IP Access
2020-05-27 01:37:08
222.186.173.238 attackbotsspam
May 26 19:51:44 abendstille sshd\[5013\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.173.238  user=root
May 26 19:51:46 abendstille sshd\[5013\]: Failed password for root from 222.186.173.238 port 35948 ssh2
May 26 19:51:50 abendstille sshd\[5013\]: Failed password for root from 222.186.173.238 port 35948 ssh2
May 26 19:51:54 abendstille sshd\[5013\]: Failed password for root from 222.186.173.238 port 35948 ssh2
May 26 19:51:57 abendstille sshd\[5013\]: Failed password for root from 222.186.173.238 port 35948 ssh2
...
2020-05-27 02:02:50

Recently Reported IPs

25.249.234.249 17.130.23.213 203.164.238.204 31.131.58.239
202.134.73.44 7.194.88.56 5.85.101.114 65.172.47.42
155.208.183.30 238.182.187.213 32.99.71.23 135.193.68.116
146.72.72.49 17.139.158.200 226.108.62.177 17.237.105.99
190.40.2.117 44.112.46.198 217.136.198.242 139.162.123.125