Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Davis

Region: California

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: University of California at Davis

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 168.150.20.163
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 53369
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;168.150.20.163.			IN	A

;; AUTHORITY SECTION:
.			1902	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019071900 1800 900 604800 86400

;; Query time: 1 msec
;; SERVER: 67.207.67.2#53(67.207.67.2)
;; WHEN: Sat Jul 20 01:03:13 CST 2019
;; MSG SIZE  rcvd: 118
Host info
163.20.150.168.in-addr.arpa domain name pointer campus-020-163.ucdavis.edu.
Nslookup info:
Server:		67.207.67.2
Address:	67.207.67.2#53

Non-authoritative answer:
163.20.150.168.in-addr.arpa	name = campus-020-163.ucdavis.edu.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
146.83.190.243 attack
23/tcp 23/tcp
[2019-06-29/07-11]2pkt
2019-07-11 16:31:28
219.155.11.105 attackbotsspam
[portscan] tcp/23 [TELNET]
*(RWIN=10025)(07111009)
2019-07-11 16:31:48
200.207.63.165 attack
Jul 11 08:51:09 vps647732 sshd[21322]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=200.207.63.165
Jul 11 08:51:11 vps647732 sshd[21322]: Failed password for invalid user google from 200.207.63.165 port 43493 ssh2
...
2019-07-11 16:49:57
72.34.113.202 attackspam
Telnet Server BruteForce Attack
2019-07-11 16:55:22
159.65.84.164 attack
Jul 11 09:36:36 ns37 sshd[15775]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.65.84.164
Jul 11 09:36:36 ns37 sshd[15775]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.65.84.164
2019-07-11 16:20:07
124.248.178.239 attack
@LucianNitescu Personal Honeypot Network <<<>>> Donate at paypal.me/LNitescu <<<>>> 2019-07-11 02:23:14,328 INFO [amun_request_handler] PortScan Detected on Port: 445 (124.248.178.239)
2019-07-11 16:45:38
81.22.45.254 attack
slow and persistent scanner
2019-07-11 17:06:01
23.252.175.89 attackbots
445/tcp 445/tcp 445/tcp...
[2019-05-13/07-11]7pkt,1pt.(tcp)
2019-07-11 16:25:46
184.146.30.146 attack
Criminal harassment from a user under this IP address. To quote one of the emails, “you DESERVE to be raped, you stupid dyke bitch.”
2019-07-11 16:36:16
175.22.165.193 attack
5500/tcp 5500/tcp
[2019-07-07/11]2pkt
2019-07-11 16:48:06
85.117.60.118 attackbots
Autoban   85.117.60.118 AUTH/CONNECT
2019-07-11 16:48:39
207.154.209.159 attack
Jul 11 09:41:50 vps647732 sshd[21600]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=207.154.209.159
Jul 11 09:41:52 vps647732 sshd[21600]: Failed password for invalid user sai from 207.154.209.159 port 39948 ssh2
...
2019-07-11 16:20:40
192.169.255.17 attackspambots
[ThuJul1105:50:40.9566012019][:error][pid990:tid47793951520512][client192.169.255.17:35316][client192.169.255.17]ModSecurity:Accessdeniedwithcode403\(phase2\).Patternmatch"\(\?:\<\|script\|\>\)"atARGS:domain.[file"/usr/local/apache.ea3/conf/modsec_rules/99_asl_jitp.conf"][line"318"][id"347147"][rev"1"][msg"Atomicorp.comWAFRules:Wordpressadmin-ajaxXSSattack"][data"admin-ajax.php"][severity"CRITICAL"][hostname"trulox.ch"][uri"/wp-admin/admin-ajax.php"][unique_id"XSayEJso6Mc81z7Me3RihQAAANg"][ThuJul1105:50:51.5634652019][:error][pid19846:tid47793945216768][client192.169.255.17:36334][client192.169.255.17]ModSecurity:Accessdeniedwithcode403\(phase2\).Patternmatch"miglaa\?_"atARGS:action.[file"/usr/local/apache.ea3/conf/modsec_rules/99_asl_jitp.conf"][line"60"][id"334072"][rev"5"][msg"Atomicorp.comWAFRules:CVE-2019-6703Attackblocked"][severity"ALERT"][hostname"trulox.ch"][uri"/wp-admin/admin-ajax.php"][unique_id"XSayG-VLYmvG5FY1Zn3d6QAAAJU"][ThuJul1105:50:51.9962572019][:e
2019-07-11 16:21:36
109.73.175.142 attackbots
TCP port 23 (Telnet) attempt blocked by firewall. [2019-07-11 05:49:38]
2019-07-11 16:54:48
119.29.18.114 attackbots
Automatic report - Web App Attack
2019-07-11 16:54:17

Recently Reported IPs

157.185.71.38 18.142.205.204 2001:16b8:60e2:ad00:b11c:34ba:c47d:38d9 103.205.140.11
171.250.85.184 49.41.211.85 198.150.223.227 5.164.34.250
100.199.92.115 39.144.191.180 57.30.134.161 78.128.113.68
2403:6200:8841:5623:3550:bc01:c9fe:3095 167.165.56.203 124.72.13.89 47.161.46.9
2003:c4:bf0b:3d85:9d41:d35c:bfb4:9619 37.160.166.35 202.109.58.149 23.65.15.93