Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: India

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 157.50.150.180
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 52349
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;157.50.150.180.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2024120801 1800 900 604800 86400

;; Query time: 36 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Dec 09 07:28:20 CST 2024
;; MSG SIZE  rcvd: 107
Host info
Host 180.150.50.157.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 180.150.50.157.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
61.177.172.41 attack
Aug  6 06:52:23 rocket sshd[12562]: Failed password for root from 61.177.172.41 port 32122 ssh2
Aug  6 06:52:36 rocket sshd[12562]: error: maximum authentication attempts exceeded for root from 61.177.172.41 port 32122 ssh2 [preauth]
...
2020-08-06 14:06:02
165.22.40.147 attack
Aug  6 07:57:02 inter-technics sshd[18310]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.22.40.147  user=root
Aug  6 07:57:05 inter-technics sshd[18310]: Failed password for root from 165.22.40.147 port 47232 ssh2
Aug  6 08:00:20 inter-technics sshd[18569]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.22.40.147  user=root
Aug  6 08:00:22 inter-technics sshd[18569]: Failed password for root from 165.22.40.147 port 47920 ssh2
Aug  6 08:03:35 inter-technics sshd[18744]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.22.40.147  user=root
Aug  6 08:03:37 inter-technics sshd[18744]: Failed password for root from 165.22.40.147 port 48600 ssh2
...
2020-08-06 14:14:25
167.71.93.65 attackspambots
Website hacking attempt: Improper php file access [php file]
2020-08-06 14:30:58
222.186.173.154 attackbotsspam
Aug  6 16:18:37 localhost sshd[72197]: Unable to negotiate with 222.186.173.154 port 12528: no matching key exchange method found. Their offer: diffie-hellman-group1-sha1,diffie-hellman-group14-sha1,diffie-hellman-group-exchange-sha1 [preauth]
...
2020-08-06 14:19:19
222.186.31.166 attackspambots
detected by Fail2Ban
2020-08-06 14:02:52
221.133.18.115 attack
" "
2020-08-06 14:12:23
112.85.42.181 attackspambots
Aug  6 08:01:35 marvibiene sshd[29520]: Failed password for root from 112.85.42.181 port 57550 ssh2
Aug  6 08:01:40 marvibiene sshd[29520]: Failed password for root from 112.85.42.181 port 57550 ssh2
2020-08-06 14:11:41
106.53.127.49 attack
Aug  5 19:17:55 hanapaa sshd\[24761\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.53.127.49  user=root
Aug  5 19:17:57 hanapaa sshd\[24761\]: Failed password for root from 106.53.127.49 port 43392 ssh2
Aug  5 19:21:09 hanapaa sshd\[24960\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.53.127.49  user=root
Aug  5 19:21:11 hanapaa sshd\[24960\]: Failed password for root from 106.53.127.49 port 49484 ssh2
Aug  5 19:24:27 hanapaa sshd\[25143\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.53.127.49  user=root
2020-08-06 14:08:52
139.155.86.130 attackspam
Aug  6 07:45:22 buvik sshd[8951]: Failed password for root from 139.155.86.130 port 58958 ssh2
Aug  6 07:49:57 buvik sshd[9464]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.155.86.130  user=root
Aug  6 07:49:58 buvik sshd[9464]: Failed password for root from 139.155.86.130 port 55240 ssh2
...
2020-08-06 13:54:45
69.250.156.161 attack
2020-08-06T01:14:40.9246541495-001 sshd[12577]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=c-69-250-156-161.hsd1.md.comcast.net  user=root
2020-08-06T01:14:43.0413721495-001 sshd[12577]: Failed password for root from 69.250.156.161 port 55936 ssh2
2020-08-06T01:27:47.0985631495-001 sshd[13300]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=c-69-250-156-161.hsd1.md.comcast.net  user=root
2020-08-06T01:27:48.9241061495-001 sshd[13300]: Failed password for root from 69.250.156.161 port 39732 ssh2
2020-08-06T01:41:11.8434321495-001 sshd[13837]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=c-69-250-156-161.hsd1.md.comcast.net  user=root
2020-08-06T01:41:13.7144371495-001 sshd[13837]: Failed password for root from 69.250.156.161 port 51772 ssh2
...
2020-08-06 14:35:46
210.179.249.45 attack
Aug  6 07:20:34 dev0-dcde-rnet sshd[16866]: Failed password for root from 210.179.249.45 port 55792 ssh2
Aug  6 07:23:22 dev0-dcde-rnet sshd[16881]: Failed password for root from 210.179.249.45 port 33890 ssh2
2020-08-06 14:22:56
222.186.42.213 attack
Aug  6 06:04:16 rush sshd[23264]: Failed password for root from 222.186.42.213 port 34073 ssh2
Aug  6 06:04:24 rush sshd[23275]: Failed password for root from 222.186.42.213 port 62358 ssh2
...
2020-08-06 14:05:09
191.89.89.51 attackbotsspam
Aug  6 07:40:44 buvik sshd[8250]: Failed password for root from 191.89.89.51 port 53010 ssh2
Aug  6 07:44:00 buvik sshd[8626]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=191.89.89.51  user=root
Aug  6 07:44:02 buvik sshd[8626]: Failed password for root from 191.89.89.51 port 47101 ssh2
...
2020-08-06 13:52:10
106.54.1.58 attackspam
Aug  3 20:11:36 ahost sshd[23946]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.54.1.58  user=r.r
Aug  3 20:11:38 ahost sshd[23946]: Failed password for r.r from 106.54.1.58 port 33082 ssh2
Aug  3 20:11:38 ahost sshd[23946]: Received disconnect from 106.54.1.58: 11: Bye Bye [preauth]
Aug  3 20:13:03 ahost sshd[23950]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.54.1.58  user=r.r
Aug  3 20:13:05 ahost sshd[23950]: Failed password for r.r from 106.54.1.58 port 37642 ssh2
Aug  3 20:13:06 ahost sshd[23950]: Received disconnect from 106.54.1.58: 11: Bye Bye [preauth]
Aug  3 20:14:50 ahost sshd[23975]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.54.1.58  user=r.r
Aug  3 20:14:53 ahost sshd[23975]: Failed password for r.r from 106.54.1.58 port 41970 ssh2
Aug  3 20:30:27 ahost sshd[31931]: pam_unix(sshd:auth): authentication failure; logn........
------------------------------
2020-08-06 14:14:57
183.63.157.138 attack
Aug  6 07:22:28 sip sshd[1208093]: Failed password for root from 183.63.157.138 port 7824 ssh2
Aug  6 07:24:18 sip sshd[1208147]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=183.63.157.138  user=root
Aug  6 07:24:20 sip sshd[1208147]: Failed password for root from 183.63.157.138 port 7826 ssh2
...
2020-08-06 14:25:51

Recently Reported IPs

63.113.172.194 91.225.225.38 60.112.33.134 55.200.105.216
231.48.181.156 199.201.160.31 2.56.209.173 66.60.202.76
46.120.194.137 199.60.59.164 199.213.92.0 196.30.169.21
187.139.94.179 192.162.156.227 225.142.211.169 71.61.51.233
100.246.65.137 190.59.255.94 125.78.6.205 145.122.134.81