Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Norway

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 195.139.150.227
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 15247
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;195.139.150.227.		IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025020600 1800 900 604800 86400

;; Query time: 16 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 07 00:53:57 CST 2025
;; MSG SIZE  rcvd: 108
Host info
Host 227.150.139.195.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 227.150.139.195.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
195.250.87.210 attackbotsspam
MultiHost/MultiPort Probe, Scan, Hack -
2020-05-23 03:02:05
162.243.139.140 attackbotsspam
MultiHost/MultiPort Probe, Scan, Hack -
2020-05-23 02:55:12
194.31.244.38 attackbots
MultiHost/MultiPort Probe, Scan, Hack -
2020-05-23 03:15:00
1.20.178.243 attack
1590148123 - 05/22/2020 13:48:43 Host: 1.20.178.243/1.20.178.243 Port: 445 TCP Blocked
2020-05-23 02:57:18
197.211.237.154 attackspambots
SIP/5060 Probe, BF, Hack -
2020-05-23 02:46:23
194.31.244.42 attackspambots
MultiHost/MultiPort Probe, Scan, Hack -
2020-05-23 03:13:44
192.3.139.56 attack
Invalid user dbt from 192.3.139.56 port 32802
2020-05-23 03:23:46
37.120.192.25 attack
fell into ViewStateTrap:oslo
2020-05-23 02:56:45
112.85.42.173 attackbotsspam
May 22 20:57:11 santamaria sshd\[8913\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.85.42.173  user=root
May 22 20:57:13 santamaria sshd\[8913\]: Failed password for root from 112.85.42.173 port 30052 ssh2
May 22 20:57:32 santamaria sshd\[8920\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.85.42.173  user=root
...
2020-05-23 03:06:05
40.87.140.134 attackspam
Automatically reported by fail2ban report script (mx1)
2020-05-23 03:10:44
5.251.22.2 attackbotsspam
port scan and connect, tcp 23 (telnet)
2020-05-23 02:57:04
114.37.68.169 attackbotsspam
Port probing on unauthorized port 2323
2020-05-23 02:45:11
77.109.173.12 attackbotsspam
SSH invalid-user multiple login attempts
2020-05-23 03:08:04
42.200.244.178 attack
prod8
...
2020-05-23 02:53:25
106.12.12.84 attackbots
Unauthorised connection attempt detected at AUO NODE 4. System is sshd. Protected by AUO Stack Web Application Firewall (WAF)
2020-05-23 03:04:41

Recently Reported IPs

15.216.25.68 174.154.109.61 230.107.11.215 198.5.213.126
4.48.103.210 44.244.64.94 246.22.230.47 21.59.186.6
114.161.105.162 97.124.81.62 108.87.50.213 46.47.16.65
147.195.141.95 64.124.208.78 247.220.204.110 42.95.255.188
88.255.151.61 235.33.144.124 45.66.144.30 242.47.171.99