Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Japan

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 150.99.80.113
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 18969
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;150.99.80.113.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025013100 1800 900 604800 86400

;; Query time: 14 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Jan 31 20:07:06 CST 2025
;; MSG SIZE  rcvd: 106
Host info
Host 113.80.99.150.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 113.80.99.150.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
188.165.202.144 attack
WordPress brute force
2020-08-02 08:54:19
185.141.170.163 attackspam
RDP Bruteforce
2020-08-02 08:57:25
142.93.35.169 attackbots
142.93.35.169 - - [02/Aug/2020:05:26:52 +0200] "POST /xmlrpc.php HTTP/1.1" 403 461 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
142.93.35.169 - - [02/Aug/2020:05:56:03 +0200] "POST /xmlrpc.php HTTP/1.1" 403 17841 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
...
2020-08-02 12:12:49
117.192.10.186 attackspam
Unauthorized connection attempt from IP address 117.192.10.186 on Port 445(SMB)
2020-08-02 09:07:21
124.204.65.82 attackspambots
Aug  2 01:05:01 firewall sshd[4019]: Failed password for root from 124.204.65.82 port 30615 ssh2
Aug  2 01:09:03 firewall sshd[4097]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=124.204.65.82  user=root
Aug  2 01:09:05 firewall sshd[4097]: Failed password for root from 124.204.65.82 port 15734 ssh2
...
2020-08-02 12:13:02
45.40.201.5 attackbots
(sshd) Failed SSH login from 45.40.201.5 (CN/China/-): 5 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: Aug  2 06:41:39 srv sshd[21596]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.40.201.5  user=root
Aug  2 06:41:41 srv sshd[21596]: Failed password for root from 45.40.201.5 port 47020 ssh2
Aug  2 06:49:42 srv sshd[21895]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.40.201.5  user=root
Aug  2 06:49:44 srv sshd[21895]: Failed password for root from 45.40.201.5 port 39344 ssh2
Aug  2 06:56:17 srv sshd[22139]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.40.201.5  user=root
2020-08-02 12:03:15
206.189.145.233 attackbots
Aug  2 00:42:37 game-panel sshd[31590]: Failed password for root from 206.189.145.233 port 43530 ssh2
Aug  2 00:45:45 game-panel sshd[31730]: Failed password for root from 206.189.145.233 port 35630 ssh2
2020-08-02 08:56:26
3.6.37.185 attack
Attempted connection to port 3389.
2020-08-02 09:01:56
51.158.122.211 attackbotsspam
Invalid user tangqw from 51.158.122.211 port 33830
2020-08-02 12:09:45
211.170.61.184 attackspambots
(sshd) Failed SSH login from 211.170.61.184 (KR/South Korea/-): 5 in the last 3600 secs
2020-08-02 09:03:59
177.36.208.61 attackbotsspam
Unauthorized connection attempt from IP address 177.36.208.61 on Port 445(SMB)
2020-08-02 09:00:49
193.219.12.117 attack
WordPress brute force
2020-08-02 08:51:50
79.120.54.174 attackspam
Invalid user lijin from 79.120.54.174 port 43138
2020-08-02 12:05:45
222.186.52.78 attackbots
2020-08-02T03:55:30.730881shield sshd\[10580\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.52.78  user=root
2020-08-02T03:55:32.228015shield sshd\[10580\]: Failed password for root from 222.186.52.78 port 36637 ssh2
2020-08-02T03:55:36.024539shield sshd\[10580\]: Failed password for root from 222.186.52.78 port 36637 ssh2
2020-08-02T03:55:38.316032shield sshd\[10580\]: Failed password for root from 222.186.52.78 port 36637 ssh2
2020-08-02T03:56:15.568847shield sshd\[10650\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.52.78  user=root
2020-08-02 12:06:13
192.169.219.79 attack
WordPress brute force
2020-08-02 08:52:35

Recently Reported IPs

141.45.189.212 78.250.68.251 114.203.146.64 77.153.132.204
163.43.253.180 8.18.124.226 245.66.96.108 167.147.162.222
21.165.38.11 192.242.223.117 219.108.113.237 93.32.82.14
97.15.154.81 136.79.112.241 89.248.166.183 98.22.132.55
160.136.21.129 240.71.85.195 187.11.23.251 180.169.81.7