Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Japan

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 150.91.48.40
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 62469
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;150.91.48.40.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025022700 1800 900 604800 86400

;; Query time: 15 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Feb 27 16:34:28 CST 2025
;; MSG SIZE  rcvd: 105
Host info
40.48.91.150.in-addr.arpa domain name pointer ap048040.ppp.asahi-net.or.jp.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
40.48.91.150.in-addr.arpa	name = ap048040.ppp.asahi-net.or.jp.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
158.140.111.134 attack
Brute force attempt
2019-10-22 18:23:53
2605:6400:300:3::2 attack
WordPress wp-login brute force :: 2605:6400:300:3::2 0.048 BYPASS [22/Oct/2019:19:49:08  1100] [censored_4] "POST /wp-login.php HTTP/1.1" 200 3989 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
2019-10-22 18:23:20
106.13.221.44 attack
firewall-block, port(s): 7001/tcp, 9200/tcp
2019-10-22 18:13:24
52.130.67.235 attackbotsspam
Invalid user pi from 52.130.67.235 port 38366
2019-10-22 18:30:05
49.88.112.71 attack
2019-10-22T07:21:04.577372abusebot-6.cloudsearch.cf sshd\[9325\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.88.112.71  user=root
2019-10-22 18:30:49
34.82.232.117 attackspambots
$f2bV_matches
2019-10-22 18:15:17
177.47.130.181 attackbotsspam
$f2bV_matches
2019-10-22 18:28:10
66.249.64.89 attackbotsspam
Automatic report - Banned IP Access
2019-10-22 18:28:40
81.214.70.53 attack
UTC: 2019-10-21 port: 23/tcp
2019-10-22 18:19:45
192.169.215.114 attackspam
[SMTP/25/465/587 Probe]
TLS/SSL handshake failed:[ stream truncated]

in stopforumspam:"listed [38 times]"
in blocklist.de:"listed [sasl]"
in DroneBL:"listed [SOCKS Proxy]"
in SpamCop:"listed"
*(10221214)
2019-10-22 18:36:05
111.48.129.253 attackspambots
firewall-block, port(s): 8080/tcp
2019-10-22 18:11:42
115.74.247.131 attackbots
Brute force attempt
2019-10-22 18:41:23
171.6.146.156 attackbots
$f2bV_matches
2019-10-22 18:09:27
149.28.89.132 attackspambots
port scan and connect, tcp 5432 (postgresql)
2019-10-22 18:44:52
34.97.56.231 attack
$f2bV_matches
2019-10-22 18:37:04

Recently Reported IPs

99.8.202.149 28.139.218.165 201.239.38.53 180.221.93.66
200.198.213.92 255.125.145.223 144.43.83.92 23.207.105.178
142.143.220.118 142.245.48.24 194.153.232.204 208.19.180.85
161.25.200.108 66.75.92.17 203.145.209.223 73.18.46.205
148.174.98.106 161.85.203.16 227.104.34.244 50.0.206.253