Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Kashiba

Region: Nara

Country: Japan

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 180.50.148.159
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 37256
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;180.50.148.159.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025021300 1800 900 604800 86400

;; Query time: 46 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Feb 13 21:01:06 CST 2025
;; MSG SIZE  rcvd: 107
Host info
159.148.50.180.in-addr.arpa domain name pointer p4025159-ipxg12501sapodori.hokkaido.ocn.ne.jp.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
159.148.50.180.in-addr.arpa	name = p4025159-ipxg12501sapodori.hokkaido.ocn.ne.jp.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
118.25.131.80 attack
DATE:2020-09-29 20:20:19,IP:118.25.131.80,MATCHES:10,PORT:ssh
2020-09-30 05:46:37
128.199.233.44 attack
Sep 28 20:23:11 eddieflores sshd\[30475\]: Invalid user hadoop from 128.199.233.44
Sep 28 20:23:11 eddieflores sshd\[30475\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.199.233.44
Sep 28 20:23:13 eddieflores sshd\[30475\]: Failed password for invalid user hadoop from 128.199.233.44 port 40848 ssh2
Sep 28 20:26:45 eddieflores sshd\[30678\]: Invalid user ubuntu from 128.199.233.44
Sep 28 20:26:45 eddieflores sshd\[30678\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.199.233.44
2020-09-30 05:36:31
123.234.188.104 attackspambots
port scan and connect, tcp 23 (telnet)
2020-09-30 06:04:53
49.233.37.15 attack
Invalid user user1 from 49.233.37.15 port 57702
2020-09-30 05:43:15
106.75.79.155 attack
Sep 29 20:26:33 mout sshd[19936]: Invalid user system from 106.75.79.155 port 34394
2020-09-30 05:38:44
142.93.132.221 attackspambots
[N3.H3.VM3] Port Scanner Detected Blocked by UFW
2020-09-30 05:51:26
106.54.141.45 attack
Sep 29 11:33:50 xeon sshd[14006]: Failed password for backup from 106.54.141.45 port 37856 ssh2
2020-09-30 05:59:57
103.137.36.254 attack
port scan and connect, tcp 80 (http)
2020-09-30 06:03:49
122.51.41.109 attack
Invalid user big from 122.51.41.109 port 35824
2020-09-30 05:33:46
167.114.103.140 attackbots
bruteforce detected
2020-09-30 05:49:53
167.114.98.229 attackspam
Invalid user info from 167.114.98.229 port 58392
2020-09-30 05:37:50
119.29.195.187 attackspam
Sep 29 17:27:11 melroy-server sshd[17444]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=119.29.195.187 
Sep 29 17:27:13 melroy-server sshd[17444]: Failed password for invalid user admin from 119.29.195.187 port 43502 ssh2
...
2020-09-30 05:55:52
103.228.19.2 attack
Port Scan
...
2020-09-30 06:00:21
52.172.199.83 attackbotsspam
DATE:2020-09-29 22:41:18, IP:52.172.199.83, PORT:ssh SSH brute force auth (docker-dc)
2020-09-30 05:36:54
151.236.193.195 attackbots
Sep 29 22:37:58 rocket sshd[27760]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=151.236.193.195
Sep 29 22:38:01 rocket sshd[27760]: Failed password for invalid user japan from 151.236.193.195 port 27402 ssh2
Sep 29 22:42:25 rocket sshd[28441]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=151.236.193.195
...
2020-09-30 05:54:36

Recently Reported IPs

215.193.128.29 164.209.72.107 136.73.135.40 2.85.52.47
24.143.161.60 26.199.209.137 57.74.51.167 28.184.134.149
73.251.190.198 218.149.189.67 61.34.8.217 215.26.72.245
242.154.185.28 157.250.182.79 82.195.14.30 157.234.151.33
203.74.165.91 31.143.52.19 201.127.58.5 191.224.13.65