Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Kristiansand

Region: Vest-Agder

Country: Norway

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 158.150.133.196
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 44692
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;158.150.133.196.		IN	A

;; AUTHORITY SECTION:
.			505	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019110301 1800 900 604800 86400

;; Query time: 59 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Nov 04 07:49:27 CST 2019
;; MSG SIZE  rcvd: 119
Host info
Host 196.133.150.158.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
** server can't find 196.133.150.158.in-addr.arpa: NXDOMAIN

Related IP info:
Related comments:
IP Type Details Datetime
222.161.56.248 attackbotsspam
$f2bV_matches
2019-11-18 05:59:07
129.213.100.212 attackspambots
SSH invalid-user multiple login try
2019-11-18 06:00:43
104.248.58.71 attackspambots
Nov 17 19:46:35 srv01 sshd[21685]: Invalid user kalmbach from 104.248.58.71 port 43732
Nov 17 19:46:35 srv01 sshd[21685]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.248.58.71
Nov 17 19:46:35 srv01 sshd[21685]: Invalid user kalmbach from 104.248.58.71 port 43732
Nov 17 19:46:37 srv01 sshd[21685]: Failed password for invalid user kalmbach from 104.248.58.71 port 43732 ssh2
Nov 17 19:50:07 srv01 sshd[21876]: Invalid user podmaroff from 104.248.58.71 port 52742
...
2019-11-18 05:43:13
103.70.204.194 attackbotsspam
2019-11-17 11:41:47 H=(locopress.it) [103.70.204.194]:33227 I=[192.147.25.65]:25 F= rejected RCPT : RBL: found in thrukfz5b56tq6xao6odgdyjrq.zen.dq.spamhaus.net (127.0.0.4, 127.0.0.3, 127.0.0.11) (https://www.spamhaus.org/sbl/query/SBLCSS)
2019-11-17 11:41:48 H=(locopress.it) [103.70.204.194]:33227 I=[192.147.25.65]:25 F= rejected RCPT : RBL: found in thrukfz5b56tq6xao6odgdyjrq.zen.dq.spamhaus.net (127.0.0.4, 127.0.0.3, 127.0.0.11) (https://www.spamhaus.org/sbl/query/SBLCSS)
2019-11-17 11:41:48 H=(locopress.it) [103.70.204.194]:33227 I=[192.147.25.65]:25 F= rejected RCPT : RBL: found in thrukfz5b56tq6xao6odgdyjrq.zen.dq.spamhaus.net (127.0.0.4, 127.0.0.3, 127.0.0.11) (https://www.spamhaus.org/sbl/query/SBLCSS)
...
2019-11-18 05:30:16
14.250.45.154 attackbotsspam
port scan and connect, tcp 23 (telnet)
2019-11-18 06:03:05
151.53.219.213 attack
Automatic report - Port Scan Attack
2019-11-18 05:42:57
185.175.93.14 attack
ET DROP Dshield Block Listed Source group 1 - port: 54000 proto: TCP cat: Misc Attack
2019-11-18 06:01:59
183.56.212.91 attackspambots
Nov 17 05:04:55 auw2 sshd\[349\]: Invalid user hauglin from 183.56.212.91
Nov 17 05:04:55 auw2 sshd\[349\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=183.56.212.91
Nov 17 05:04:57 auw2 sshd\[349\]: Failed password for invalid user hauglin from 183.56.212.91 port 59918 ssh2
Nov 17 05:11:20 auw2 sshd\[1023\]: Invalid user beng from 183.56.212.91
Nov 17 05:11:20 auw2 sshd\[1023\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=183.56.212.91
2019-11-18 05:41:15
181.236.190.35 attackbots
Telnet/23 MH Probe, BF, Hack -
2019-11-18 05:37:00
200.69.204.143 attack
Nov 17 18:57:50 server sshd\[20828\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=200.69.204.143  user=root
Nov 17 18:57:52 server sshd\[20828\]: Failed password for root from 200.69.204.143 port 48162 ssh2
Nov 17 19:16:05 server sshd\[25516\]: Invalid user otha from 200.69.204.143
Nov 17 19:16:05 server sshd\[25516\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=200.69.204.143 
Nov 17 19:16:06 server sshd\[25516\]: Failed password for invalid user otha from 200.69.204.143 port 42209 ssh2
...
2019-11-18 05:51:41
178.128.107.61 attack
Nov 17 18:57:10 XXX sshd[48389]: Invalid user ofsaa from 178.128.107.61 port 58728
2019-11-18 05:33:19
148.70.101.245 attackspambots
Nov 17 14:29:15 marvibiene sshd[4215]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=148.70.101.245  user=sshd
Nov 17 14:29:17 marvibiene sshd[4215]: Failed password for sshd from 148.70.101.245 port 37064 ssh2
Nov 17 14:35:24 marvibiene sshd[4240]: Invalid user apache from 148.70.101.245 port 44706
...
2019-11-18 05:48:12
167.71.6.221 attack
$f2bV_matches
2019-11-18 05:55:27
177.52.93.233 attackbots
IP Ban Report :  
 https://help-dysk.pl/wordpress-firewall-plugins/ip/177.52.93.233/ 
 
 BR - 1H : (371)  
 Protection Against DDoS WordPress plugin :  
 "odzyskiwanie danych help-dysk" 
 IP Address Ranges by Country : BR 
 NAME ASN : ASN52801 
 
 IP : 177.52.93.233 
 
 CIDR : 177.52.93.0/24 
 
 PREFIX COUNT : 8 
 
 UNIQUE IP COUNT : 2048 
 
 
 ATTACKS DETECTED ASN52801 :  
  1H - 1 
  3H - 1 
  6H - 1 
 12H - 1 
 24H - 1 
 
 DateTime : 2019-11-17 15:35:05 
 
 INFO : Port Scan TELNET Detected and Blocked by ADMIN  - data recovery
2019-11-18 05:57:02
177.189.216.8 attackspambots
$f2bV_matches
2019-11-18 05:24:56

Recently Reported IPs

168.187.222.88 182.218.118.42 42.19.131.192 132.163.139.203
41.253.112.137 31.74.141.151 70.54.83.91 131.155.222.246
35.158.151.206 190.235.32.23 40.215.91.241 95.226.75.170
212.24.170.25 63.129.239.141 58.248.118.4 118.70.252.62
120.139.194.205 167.60.57.127 213.218.1.17 31.0.85.242