Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Canada

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 20.48.240.150
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 42604
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;20.48.240.150.			IN	A

;; AUTHORITY SECTION:
.			29	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025021501 1800 900 604800 86400

;; Query time: 35 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Feb 16 12:24:12 CST 2025
;; MSG SIZE  rcvd: 106
Host info
Host 150.240.48.20.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 150.240.48.20.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
104.244.72.98 attackbotsspam
port scan and connect, tcp 22 (ssh)
2019-11-25 13:54:22
168.196.2.108 attack
Caught in portsentry honeypot
2019-11-25 13:57:33
87.64.179.105 attack
Nov 25 05:58:11 lnxded64 sshd[14865]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=87.64.179.105
Nov 25 05:58:13 lnxded64 sshd[14865]: Failed password for invalid user segal from 87.64.179.105 port 42322 ssh2
Nov 25 05:58:31 lnxded64 sshd[14877]: Failed password for root from 87.64.179.105 port 40220 ssh2
2019-11-25 13:54:08
54.36.180.236 attack
Invalid user steam from 54.36.180.236 port 39896
2019-11-25 14:00:47
103.85.19.189 attackspam
Automatic report - Port Scan Attack
2019-11-25 14:08:22
148.70.218.43 attackbotsspam
2019-11-25T05:55:30.849229tmaserv sshd\[23839\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=148.70.218.43
2019-11-25T05:55:32.665807tmaserv sshd\[23839\]: Failed password for invalid user barnes from 148.70.218.43 port 42882 ssh2
2019-11-25T06:59:22.259616tmaserv sshd\[26899\]: Invalid user lightdm from 148.70.218.43 port 49936
2019-11-25T06:59:22.264189tmaserv sshd\[26899\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=148.70.218.43
2019-11-25T06:59:24.479844tmaserv sshd\[26899\]: Failed password for invalid user lightdm from 148.70.218.43 port 49936 ssh2
2019-11-25T07:07:37.841070tmaserv sshd\[27276\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=148.70.218.43  user=root
...
2019-11-25 13:58:35
171.34.173.49 attackspam
Nov 25 04:50:44 game-panel sshd[32128]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=171.34.173.49
Nov 25 04:50:46 game-panel sshd[32128]: Failed password for invalid user apache from 171.34.173.49 port 46587 ssh2
Nov 25 04:58:42 game-panel sshd[32364]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=171.34.173.49
2019-11-25 13:46:08
51.75.16.138 attackspambots
Nov 25 06:13:45 h2812830 sshd[8814]: Invalid user eef from 51.75.16.138 port 54992
Nov 25 06:13:45 h2812830 sshd[8814]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.ip-51-75-16.eu
Nov 25 06:13:45 h2812830 sshd[8814]: Invalid user eef from 51.75.16.138 port 54992
Nov 25 06:13:47 h2812830 sshd[8814]: Failed password for invalid user eef from 51.75.16.138 port 54992 ssh2
Nov 25 06:36:53 h2812830 sshd[9512]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.ip-51-75-16.eu  user=root
Nov 25 06:36:55 h2812830 sshd[9512]: Failed password for root from 51.75.16.138 port 38260 ssh2
...
2019-11-25 13:39:07
217.182.55.149 attack
Nov 25 05:58:17 * sshd[28649]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=217.182.55.149
Nov 25 05:58:19 * sshd[28649]: Failed password for invalid user wwwadmin from 217.182.55.149 port 58754 ssh2
2019-11-25 13:59:17
111.231.113.236 attackbotsspam
Nov 25 06:47:13 localhost sshd\[7733\]: Invalid user admin from 111.231.113.236 port 56122
Nov 25 06:47:13 localhost sshd\[7733\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.231.113.236
Nov 25 06:47:16 localhost sshd\[7733\]: Failed password for invalid user admin from 111.231.113.236 port 56122 ssh2
2019-11-25 14:03:30
63.88.23.227 attackspambots
63.88.23.227 was recorded 19 times by 8 hosts attempting to connect to the following ports: 80. Incident counter (4h, 24h, all-time): 19, 79, 618
2019-11-25 13:52:32
154.221.24.135 attack
$f2bV_matches_ltvn
2019-11-25 13:47:04
80.97.66.135 attackspam
Automatic report - Banned IP Access
2019-11-25 14:19:14
117.131.207.235 attack
Nov 25 06:12:35 andromeda postfix/smtpd\[38280\]: warning: unknown\[117.131.207.235\]: SASL LOGIN authentication failed: authentication failure
Nov 25 06:12:46 andromeda postfix/smtpd\[38280\]: warning: unknown\[117.131.207.235\]: SASL LOGIN authentication failed: authentication failure
Nov 25 06:12:49 andromeda postfix/smtpd\[12491\]: warning: unknown\[117.131.207.235\]: SASL LOGIN authentication failed: authentication failure
Nov 25 06:12:55 andromeda postfix/smtpd\[12491\]: warning: unknown\[117.131.207.235\]: SASL LOGIN authentication failed: authentication failure
Nov 25 06:13:03 andromeda postfix/smtpd\[38280\]: warning: unknown\[117.131.207.235\]: SASL LOGIN authentication failed: authentication failure
2019-11-25 13:49:50
152.136.72.17 attack
Nov 25 05:58:12 host sshd[6685]: Invalid user backup from 152.136.72.17 port 42686
...
2019-11-25 14:04:31

Recently Reported IPs

154.255.22.175 143.65.250.2 157.159.88.97 7.64.212.15
226.152.162.183 118.92.227.175 60.43.30.71 171.183.3.92
137.121.149.213 176.2.83.241 127.50.231.26 75.197.216.85
201.37.154.7 12.186.63.255 242.127.234.215 153.129.15.85
181.230.141.27 209.108.10.14 142.232.155.71 58.2.37.191