Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Osaka

Region: Osaka

Country: Japan

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 150.9.3.112
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 32811
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;150.9.3.112.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025021002 1800 900 604800 86400

;; Query time: 12 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Feb 11 08:47:15 CST 2025
;; MSG SIZE  rcvd: 104
Host info
112.3.9.150.in-addr.arpa domain name pointer as003112.dynamic.ppp.asahi-net.or.jp.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
112.3.9.150.in-addr.arpa	name = as003112.dynamic.ppp.asahi-net.or.jp.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
27.223.89.238 attackspam
Dec 28 07:22:26 odroid64 sshd\[32598\]: User root from 27.223.89.238 not allowed because not listed in AllowUsers
Dec 28 07:22:26 odroid64 sshd\[32598\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=27.223.89.238  user=root
...
2019-12-28 20:01:39
223.71.167.61 attackspam
Honeypot attack, port: 81, PTR: PTR record not found
2019-12-28 19:52:14
77.222.187.70 attack
Honeypot attack, port: 23, PTR: PTR record not found
2019-12-28 19:24:26
216.218.206.107 attack
RPC Portmapper DUMP Request Detected
2019-12-28 19:35:07
89.218.191.26 attackspam
Honeypot attack, port: 445, PTR: PTR record not found
2019-12-28 19:50:07
178.62.30.41 attackspambots
Honeypot attack, port: 81, PTR: PTR record not found
2019-12-28 19:36:27
211.144.12.75 attackspambots
Dec 28 07:13:49 mail sshd[28402]: Invalid user ziraksaz from 211.144.12.75
Dec 28 07:13:49 mail sshd[28402]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=211.144.12.75
Dec 28 07:13:49 mail sshd[28402]: Invalid user ziraksaz from 211.144.12.75
Dec 28 07:13:52 mail sshd[28402]: Failed password for invalid user ziraksaz from 211.144.12.75 port 64163 ssh2
Dec 28 07:22:51 mail sshd[29508]: Invalid user butter from 211.144.12.75
...
2019-12-28 19:43:06
116.120.115.80 attackspambots
Honeypot attack, port: 23, PTR: PTR record not found
2019-12-28 19:34:39
45.55.80.186 attackspambots
Invalid user host from 45.55.80.186 port 41410
2019-12-28 19:26:39
159.203.26.191 attack
Honeypot attack, port: 445, PTR: min-extra-scan-208-ca-prod.binaryedge.ninja.
2019-12-28 19:31:17
217.218.21.242 attack
$f2bV_matches
2019-12-28 19:32:44
112.85.42.172 attackbots
Dec 28 11:42:02 IngegnereFirenze sshd[6957]: Did not receive identification string from 112.85.42.172 port 56116
...
2019-12-28 20:00:56
27.254.207.181 attack
Honeypot attack, port: 445, PTR: 181.207.254.27.static-ip.csloxinfo.net.
2019-12-28 19:47:25
220.133.249.198 attackbots
Honeypot attack, port: 445, PTR: 220-133-249-198.HINET-IP.hinet.net.
2019-12-28 19:52:52
176.31.250.160 attackspambots
2019-12-28T09:29:58.037073abusebot-2.cloudsearch.cf sshd[9772]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=ns341006.ip-176-31-250.eu  user=root
2019-12-28T09:29:59.950443abusebot-2.cloudsearch.cf sshd[9772]: Failed password for root from 176.31.250.160 port 37804 ssh2
2019-12-28T09:33:55.473774abusebot-2.cloudsearch.cf sshd[9836]: Invalid user sinusbot from 176.31.250.160 port 38520
2019-12-28T09:33:55.481274abusebot-2.cloudsearch.cf sshd[9836]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=ns341006.ip-176-31-250.eu
2019-12-28T09:33:55.473774abusebot-2.cloudsearch.cf sshd[9836]: Invalid user sinusbot from 176.31.250.160 port 38520
2019-12-28T09:33:57.259410abusebot-2.cloudsearch.cf sshd[9836]: Failed password for invalid user sinusbot from 176.31.250.160 port 38520 ssh2
2019-12-28T09:36:04.175210abusebot-2.cloudsearch.cf sshd[9884]: Invalid user marthe from 176.31.250.160 port 58604
...
2019-12-28 19:25:44

Recently Reported IPs

4.65.149.36 154.129.12.64 137.40.219.231 80.125.87.193
6.247.3.106 134.253.224.187 108.155.177.1 99.164.60.87
177.80.83.2 16.118.164.58 24.180.149.203 53.64.234.167
175.210.21.97 155.104.133.197 149.208.225.124 194.221.88.115
149.228.89.250 106.25.226.97 71.85.15.222 75.198.236.170