Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Nigeria

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 196.11.150.2
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 18719
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;196.11.150.2.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025080900 1800 900 604800 86400

;; Query time: 13 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Aug 09 18:50:15 CST 2025
;; MSG SIZE  rcvd: 105
Host info
b'Host 2.150.11.196.in-addr.arpa not found: 2(SERVFAIL)
'
Nslookup info:
server can't find 196.11.150.2.in-addr.arpa: SERVFAIL
Related IP info:
Related comments:
IP Type Details Datetime
95.49.99.64 attackbotsspam
Honeypot attack, port: 23, PTR: afdv64.neoplus.adsl.tpnet.pl.
2019-12-15 22:24:54
180.76.245.228 attackbotsspam
Dec 15 14:30:23 h2812830 sshd[7908]: Invalid user bergsand from 180.76.245.228 port 47622
Dec 15 14:30:23 h2812830 sshd[7908]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.76.245.228
Dec 15 14:30:23 h2812830 sshd[7908]: Invalid user bergsand from 180.76.245.228 port 47622
Dec 15 14:30:25 h2812830 sshd[7908]: Failed password for invalid user bergsand from 180.76.245.228 port 47622 ssh2
Dec 15 14:41:22 h2812830 sshd[8346]: Invalid user hatim from 180.76.245.228 port 54150
...
2019-12-15 22:10:23
59.115.117.88 attack
Honeypot attack, port: 23, PTR: 59-115-117-88.dynamic-ip.hinet.net.
2019-12-15 22:13:56
13.71.22.47 attack
Unauthorized connection attempt detected from IP address 13.71.22.47 to port 5021
2019-12-15 21:57:44
222.124.16.227 attackbotsspam
Dec 15 08:12:58 ns382633 sshd\[24438\]: Invalid user there from 222.124.16.227 port 46590
Dec 15 08:12:58 ns382633 sshd\[24438\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.124.16.227
Dec 15 08:13:00 ns382633 sshd\[24438\]: Failed password for invalid user there from 222.124.16.227 port 46590 ssh2
Dec 15 08:22:54 ns382633 sshd\[26228\]: Invalid user moutafian from 222.124.16.227 port 58842
Dec 15 08:22:54 ns382633 sshd\[26228\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.124.16.227
2019-12-15 22:23:10
148.240.238.91 attackspam
Dec 15 09:01:55 woltan sshd[16047]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=148.240.238.91
2019-12-15 21:50:08
112.85.42.176 attackspam
Dec 15 13:52:09 thevastnessof sshd[31543]: Failed password for root from 112.85.42.176 port 54591 ssh2
...
2019-12-15 21:59:36
113.78.240.28 attack
Sun Dec 15 14:50:08 2019 [pid 25343] [anonymous] FAIL LOGIN: Client "113.78.240.28"
Sun Dec 15 14:50:08 2019 [pid 25345] [www] FAIL LOGIN: Client "113.78.240.28"
Sun Dec 15 14:50:13 2019 [pid 25347] [notgoodbutcrazy] FAIL LOGIN: Client "113.78.240.28"
Sun Dec 15 14:50:14 2019 [pid 25350] [notgoodbutcrazy] FAIL LOGIN: Client "113.78.240.28"
Sun Dec 15 14:50:18 2019 [pid 25352] [notgoodbutcrazy] FAIL LOGIN: Client "113.78.240.28"
2019-12-15 22:18:59
92.118.37.99 attackbots
Dec 15 16:14:13 debian-2gb-vpn-nbg1-1 kernel: [794025.754630] [UFW BLOCK] IN=eth0 OUT= MAC=96:00:00:38:96:44:d2:74:7f:6e:37:e3:08:00 SRC=92.118.37.99 DST=78.46.192.101 LEN=40 TOS=0x00 PREC=0x00 TTL=247 ID=35266 PROTO=TCP SPT=43034 DPT=2541 WINDOW=1024 RES=0x00 SYN URGP=0
2019-12-15 21:49:13
193.112.155.138 attack
2019-12-15T11:46:04.395459static.108.197.76.144.clients.your-server.de sshd[8489]: Invalid user www from 193.112.155.138
2019-12-15T11:46:04.397986static.108.197.76.144.clients.your-server.de sshd[8489]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=193.112.155.138
2019-12-15T11:46:06.671565static.108.197.76.144.clients.your-server.de sshd[8489]: Failed password for invalid user www from 193.112.155.138 port 39914 ssh2
2019-12-15T11:53:31.704708static.108.197.76.144.clients.your-server.de sshd[9630]: Invalid user ellinger from 193.112.155.138
2019-12-15T11:53:31.707153static.108.197.76.144.clients.your-server.de sshd[9630]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=193.112.155.138

........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=193.112.155.138
2019-12-15 21:54:30
89.40.114.52 attackbots
\[2019-12-15 08:52:49\] NOTICE\[2839\] chan_sip.c: Registration from '"424" \' failed for '89.40.114.52:5132' - Wrong password
\[2019-12-15 08:52:49\] SECURITY\[2857\] res_security_log.c: SecurityEvent="InvalidPassword",EventTV="2019-12-15T08:52:49.138-0500",Severity="Error",Service="SIP",EventVersion="2",AccountID="424",SessionID="0x7f0fb4fbea58",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/89.40.114.52/5132",Challenge="61a619a6",ReceivedChallenge="61a619a6",ReceivedHash="7a4d13af3fe833608e5e4a57d630a323"
\[2019-12-15 08:54:37\] NOTICE\[2839\] chan_sip.c: Registration from '"7810" \' failed for '89.40.114.52:5084' - Wrong password
\[2019-12-15 08:54:37\] SECURITY\[2857\] res_security_log.c: SecurityEvent="InvalidPassword",EventTV="2019-12-15T08:54:37.849-0500",Severity="Error",Service="SIP",EventVersion="2",AccountID="7810",SessionID="0x7f0fb4ca4128",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/89.4
2019-12-15 22:02:13
83.97.20.162 attackbots
scan r
2019-12-15 21:45:24
212.156.17.218 attackbots
Dec 15 14:42:48 MK-Soft-VM6 sshd[8261]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=212.156.17.218 
Dec 15 14:42:50 MK-Soft-VM6 sshd[8261]: Failed password for invalid user met from 212.156.17.218 port 33864 ssh2
...
2019-12-15 21:56:11
111.231.143.71 attackspam
2019-12-15T11:14:28.568970homeassistant sshd[11286]: Invalid user up from 111.231.143.71 port 50946
2019-12-15T11:14:28.575524homeassistant sshd[11286]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.231.143.71
...
2019-12-15 21:57:17
113.75.207.172 attackspam
Scanning
2019-12-15 21:53:54

Recently Reported IPs

41.236.247.246 152.163.144.239 116.76.37.80 98.80.4.125
86.166.46.37 78.133.140.11 74.65.94.57 107.174.159.154
120.236.198.196 192.168.31.191 165.175.142.86 31.88.247.252
45.156.87.165 185.194.88.22 210.130.1.1 124.44.116.187
37.168.200.195 91.224.92.99 220.69.56.1 222.94.32.89