Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Fujisawa

Region: Kanagawa

Country: Japan

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 150.7.166.148
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 4755
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;150.7.166.148.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025030700 1800 900 604800 86400

;; Query time: 15 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Mar 07 20:51:41 CST 2025
;; MSG SIZE  rcvd: 106
Host info
b'Host 148.166.7.150.in-addr.arpa not found: 2(SERVFAIL)
'
Nslookup info:
server can't find 150.7.166.148.in-addr.arpa: SERVFAIL
Related IP info:
Related comments:
IP Type Details Datetime
54.38.65.127 attackbots
[munged]::443 54.38.65.127 - - [05/Oct/2020:15:28:38 +0200] "POST /[munged]: HTTP/1.1" 200 6586 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
2020-10-06 03:40:55
106.37.72.234 attackbots
$f2bV_matches
2020-10-06 03:23:59
113.87.167.84 attackspambots
2020-10-04T21:14:13.307332shield sshd\[19281\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=113.87.167.84  user=root
2020-10-04T21:14:15.559620shield sshd\[19281\]: Failed password for root from 113.87.167.84 port 58532 ssh2
2020-10-04T21:15:59.430929shield sshd\[19503\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=113.87.167.84  user=root
2020-10-04T21:16:01.568115shield sshd\[19503\]: Failed password for root from 113.87.167.84 port 50858 ssh2
2020-10-04T21:17:43.635320shield sshd\[19759\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=113.87.167.84  user=root
2020-10-06 03:36:14
117.29.240.155 attackspam
Oct  5 00:23:15 srv01 postfix/smtpd\[4972\]: warning: unknown\[117.29.240.155\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Oct  5 00:23:27 srv01 postfix/smtpd\[4972\]: warning: unknown\[117.29.240.155\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Oct  5 00:23:43 srv01 postfix/smtpd\[4972\]: warning: unknown\[117.29.240.155\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Oct  5 00:24:02 srv01 postfix/smtpd\[4972\]: warning: unknown\[117.29.240.155\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Oct  5 00:24:15 srv01 postfix/smtpd\[4972\]: warning: unknown\[117.29.240.155\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
...
2020-10-06 03:13:55
49.88.112.70 attack
Oct  5 19:55:30 mx sshd[1187865]: Failed password for root from 49.88.112.70 port 35309 ssh2
Oct  5 19:57:41 mx sshd[1187886]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.88.112.70  user=root
Oct  5 19:57:43 mx sshd[1187886]: Failed password for root from 49.88.112.70 port 39376 ssh2
Oct  5 19:58:27 mx sshd[1187893]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.88.112.70  user=root
Oct  5 19:58:29 mx sshd[1187893]: Failed password for root from 49.88.112.70 port 14128 ssh2
...
2020-10-06 03:17:54
195.72.145.211 attackspambots
Port scan denied
2020-10-06 03:06:53
159.203.110.73 attack
Oct  5 15:42:56 rush sshd[30585]: Failed password for root from 159.203.110.73 port 55580 ssh2
Oct  5 15:43:00 rush sshd[30587]: Failed password for root from 159.203.110.73 port 60918 ssh2
...
2020-10-06 03:15:24
176.212.108.221 attackspambots
IP 176.212.108.221 attacked honeypot on port: 23 at 10/5/2020 1:41:29 AM
2020-10-06 03:12:53
200.105.170.138 attack
Icarus honeypot on github
2020-10-06 03:28:38
78.128.113.42 attackspambots
 TCP (SYN) 78.128.113.42:54394 -> port 3490, len 44
2020-10-06 03:27:54
193.169.253.108 attack
Brute forcing email accounts
2020-10-06 03:40:03
45.129.33.58 attackspambots
ET DROP Dshield Block Listed Source group 1 - port: 55123 proto: tcp cat: Misc Attackbytes: 60
2020-10-06 03:45:37
79.118.112.74 attack
Listed on    abuseat.org plus zen-spamhaus   / proto=6  .  srcport=29703  .  dstport=5555  .     (3487)
2020-10-06 03:42:45
192.241.237.154 attack
[N1.H1.VM1] Port Scanner Detected Blocked by UFW
2020-10-06 03:10:38
79.137.79.48 attackbotsspam
WordPress wp-login brute force :: 79.137.79.48 0.108 - [05/Oct/2020:14:14:36  0000] [censored_1] "POST /wp-login.php HTTP/1.1" 200 2383 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0" "HTTP/1.1"
2020-10-06 03:29:38

Recently Reported IPs

59.3.161.48 56.58.60.230 173.185.87.161 57.11.16.17
184.182.204.75 167.51.251.156 52.228.11.221 76.211.12.1
242.240.168.196 69.206.210.57 26.168.212.198 194.217.228.141
203.5.110.138 50.224.112.143 154.220.154.251 172.72.45.234
245.234.56.163 218.246.78.245 61.209.54.164 9.107.59.79