Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 20.150.149.136
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 36344
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;20.150.149.136.			IN	A

;; AUTHORITY SECTION:
.			419	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022020702 1800 900 604800 86400

;; Query time: 45 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Feb 08 08:50:59 CST 2022
;; MSG SIZE  rcvd: 107
Host info
Host 136.149.150.20.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 136.149.150.20.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
188.166.145.175 attackspambots
188.166.145.175 - - [08/Aug/2020:16:40:58 +0100] "POST /wp-login.php HTTP/1.1" 200 1969 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
188.166.145.175 - - [08/Aug/2020:16:40:58 +0100] "POST /wp-login.php HTTP/1.1" 200 1977 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
188.166.145.175 - - [08/Aug/2020:16:40:58 +0100] "POST /xmlrpc.php HTTP/1.1" 403 219 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
...
2020-08-09 00:17:38
218.92.0.216 attack
Aug  8 18:07:12 amit sshd\[19537\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.216  user=root
Aug  8 18:07:14 amit sshd\[19537\]: Failed password for root from 218.92.0.216 port 64170 ssh2
Aug  8 18:07:16 amit sshd\[19537\]: Failed password for root from 218.92.0.216 port 64170 ssh2
...
2020-08-09 00:09:24
80.234.165.143 attackspam
Aug  8 13:13:50 rocket sshd[918]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=80.234.165.143
Aug  8 13:13:50 rocket sshd[919]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=80.234.165.143
...
2020-08-09 00:18:10
2a01:4f8:192:734b::2 attackspam
20 attempts against mh-misbehave-ban on cedar
2020-08-08 23:58:38
36.92.1.31 attack
36.92.1.31 - - [08/Aug/2020:13:13:35 +0100] "POST /wp-login.php HTTP/1.1" 200 1861 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
36.92.1.31 - - [08/Aug/2020:13:13:39 +0100] "POST /wp-login.php HTTP/1.1" 200 1903 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
36.92.1.31 - - [08/Aug/2020:13:13:42 +0100] "POST /xmlrpc.php HTTP/1.1" 403 219 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
...
2020-08-09 00:27:18
182.148.112.4 attackbots
Banned for a week because repeated abuses, for example SSH, but not only
2020-08-08 23:52:14
59.125.160.248 attackbots
(sshd) Failed SSH login from 59.125.160.248 (TW/Taiwan/59-125-160-248.HINET-IP.hinet.net): 5 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: Aug  8 16:27:00 grace sshd[25478]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=59.125.160.248  user=root
Aug  8 16:27:03 grace sshd[25478]: Failed password for root from 59.125.160.248 port 36237 ssh2
Aug  8 16:39:35 grace sshd[27089]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=59.125.160.248  user=root
Aug  8 16:39:37 grace sshd[27089]: Failed password for root from 59.125.160.248 port 59558 ssh2
Aug  8 16:43:52 grace sshd[27716]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=59.125.160.248  user=root
2020-08-08 23:57:44
68.183.83.38 attackbotsspam
2020-08-08T09:08:42.8170791495-001 sshd[21789]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=68.183.83.38  user=root
2020-08-08T09:08:44.6227861495-001 sshd[21789]: Failed password for root from 68.183.83.38 port 48690 ssh2
2020-08-08T09:13:19.9693841495-001 sshd[22048]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=68.183.83.38  user=root
2020-08-08T09:13:22.8030011495-001 sshd[22048]: Failed password for root from 68.183.83.38 port 60172 ssh2
2020-08-08T09:17:49.1944661495-001 sshd[22317]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=68.183.83.38  user=root
2020-08-08T09:17:51.4267161495-001 sshd[22317]: Failed password for root from 68.183.83.38 port 43422 ssh2
...
2020-08-08 23:48:09
45.88.110.138 attackspambots
Aug  8 16:27:40 dev0-dcde-rnet sshd[32673]: Failed password for root from 45.88.110.138 port 37398 ssh2
Aug  8 16:31:20 dev0-dcde-rnet sshd[32742]: Failed password for root from 45.88.110.138 port 42302 ssh2
2020-08-09 00:15:44
70.98.78.168 attack
E-Mail Spam (RBL) [REJECTED]
2020-08-09 00:07:41
136.144.242.253 attack
Lines containing failures of 136.144.242.253
Aug  7 01:08:05 siirappi sshd[10345]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=136.144.242.253  user=r.r
Aug  7 01:08:08 siirappi sshd[10345]: Failed password for r.r from 136.144.242.253 port 57298 ssh2
Aug  7 01:08:09 siirappi sshd[10345]: Received disconnect from 136.144.242.253 port 57298:11: Bye Bye [preauth]
Aug  7 01:08:09 siirappi sshd[10345]: Disconnected from authenticating user r.r 136.144.242.253 port 57298 [preauth]
Aug  7 01:16:35 siirappi sshd[10460]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=136.144.242.253  user=r.r
Aug  7 01:16:36 siirappi sshd[10460]: Failed password for r.r from 136.144.242.253 port 34952 ssh2
Aug  7 01:16:38 siirappi sshd[10460]: Received disconnect from 136.144.242.253 port 34952:11: Bye Bye [preauth]
Aug  7 01:16:38 siirappi sshd[10460]: Disconnected from authenticating user r.r 136.144.242.253 p........
------------------------------
2020-08-09 00:30:35
223.150.246.66 attackspambots
Aug  8 14:13:22 web1 pure-ftpd: \(\?@223.150.246.66\) \[WARNING\] Authentication failed for user \[anonymous\]
Aug  8 14:13:31 web1 pure-ftpd: \(\?@223.150.246.66\) \[WARNING\] Authentication failed for user \[www\]
Aug  8 14:13:44 web1 pure-ftpd: \(\?@223.150.246.66\) \[WARNING\] Authentication failed for user \[www\]
2020-08-09 00:16:27
209.141.46.97 attackbotsspam
Brute-force attempt banned
2020-08-09 00:04:23
94.23.216.167 attackbotsspam
Variety of malicious activity against Wordpress installs
2020-08-08 23:51:36
217.182.36.107 attack
 UDP 217.182.36.107:5521 -> port 5060, len 443
2020-08-08 23:56:39

Recently Reported IPs

101.34.117.47 116.59.30.19 176.120.195.128 186.238.15.98
47.118.68.225 196.189.57.47 85.174.200.231 213.184.225.80
177.74.56.226 213.14.181.117 83.253.185.165 1.198.221.61
103.83.145.123 23.108.43.26 84.244.59.35 222.244.253.22
180.183.98.33 192.177.158.172 36.90.61.91 41.239.2.242