Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 204.199.117.150
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 6053
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;204.199.117.150.		IN	A

;; AUTHORITY SECTION:
.			350	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022021300 1800 900 604800 86400

;; Query time: 14 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Feb 13 16:39:38 CST 2022
;; MSG SIZE  rcvd: 108
Host info
150.117.199.204.in-addr.arpa domain name pointer 204-199-117-150.centurylink.com.co.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
150.117.199.204.in-addr.arpa	name = 204-199-117-150.centurylink.com.co.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
201.204.168.47 attackbotsspam
Automatic report - Port Scan Attack
2019-09-14 06:06:46
45.136.109.36 attackspam
Sep 13 22:52:48 h2177944 kernel: \[1284443.015811\] \[UFW BLOCK\] IN=venet0 OUT= MAC= SRC=45.136.109.36 DST=85.214.117.9 LEN=40 TOS=0x00 PREC=0x00 TTL=248 ID=12078 PROTO=TCP SPT=54315 DPT=4682 WINDOW=1024 RES=0x00 SYN URGP=0 
Sep 13 23:15:33 h2177944 kernel: \[1285808.334162\] \[UFW BLOCK\] IN=venet0 OUT= MAC= SRC=45.136.109.36 DST=85.214.117.9 LEN=40 TOS=0x00 PREC=0x00 TTL=248 ID=60290 PROTO=TCP SPT=54315 DPT=4277 WINDOW=1024 RES=0x00 SYN URGP=0 
Sep 13 23:18:51 h2177944 kernel: \[1286005.825544\] \[UFW BLOCK\] IN=venet0 OUT= MAC= SRC=45.136.109.36 DST=85.214.117.9 LEN=40 TOS=0x00 PREC=0x00 TTL=249 ID=53210 PROTO=TCP SPT=54315 DPT=4201 WINDOW=1024 RES=0x00 SYN URGP=0 
Sep 13 23:19:45 h2177944 kernel: \[1286060.041444\] \[UFW BLOCK\] IN=venet0 OUT= MAC= SRC=45.136.109.36 DST=85.214.117.9 LEN=40 TOS=0x00 PREC=0x00 TTL=249 ID=44403 PROTO=TCP SPT=54315 DPT=4816 WINDOW=1024 RES=0x00 SYN URGP=0 
Sep 13 23:22:40 h2177944 kernel: \[1286235.121123\] \[UFW BLOCK\] IN=venet0 OUT= MAC= SRC=45.136.109.36 DST=85.214.117.9
2019-09-14 05:59:19
195.154.33.66 attackbots
Sep 13 21:33:46 hcbbdb sshd\[26851\]: Invalid user daniel from 195.154.33.66
Sep 13 21:33:46 hcbbdb sshd\[26851\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=195.154.33.66
Sep 13 21:33:48 hcbbdb sshd\[26851\]: Failed password for invalid user daniel from 195.154.33.66 port 52104 ssh2
Sep 13 21:39:07 hcbbdb sshd\[27396\]: Invalid user luser from 195.154.33.66
Sep 13 21:39:07 hcbbdb sshd\[27396\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=195.154.33.66
2019-09-14 05:45:11
178.34.190.39 attackspambots
Sep 14 03:19:11 areeb-Workstation sshd[5461]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.34.190.39
Sep 14 03:19:13 areeb-Workstation sshd[5461]: Failed password for invalid user test2 from 178.34.190.39 port 47334 ssh2
...
2019-09-14 06:04:43
192.227.252.14 attackspambots
Sep 13 23:49:00 markkoudstaal sshd[7708]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=192.227.252.14
Sep 13 23:49:02 markkoudstaal sshd[7708]: Failed password for invalid user deployer from 192.227.252.14 port 39454 ssh2
Sep 13 23:54:30 markkoudstaal sshd[8233]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=192.227.252.14
2019-09-14 06:05:50
189.135.116.34 attack
Automatic report - Port Scan Attack
2019-09-14 05:53:08
218.75.37.21 attackbots
Unauthorised access (Sep 14) SRC=218.75.37.21 LEN=52 TOS=0x10 PREC=0x40 TTL=114 ID=15912 DF TCP DPT=1433 WINDOW=8192 SYN
2019-09-14 06:00:17
117.185.62.146 attackspam
Sep 13 23:22:43 saschabauer sshd[1977]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=117.185.62.146
Sep 13 23:22:45 saschabauer sshd[1977]: Failed password for invalid user nagios from 117.185.62.146 port 53946 ssh2
2019-09-14 05:55:56
35.187.248.21 attackbots
Sep 13 17:37:03 vps200512 sshd\[15843\]: Invalid user snake from 35.187.248.21
Sep 13 17:37:03 vps200512 sshd\[15843\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=35.187.248.21
Sep 13 17:37:05 vps200512 sshd\[15843\]: Failed password for invalid user snake from 35.187.248.21 port 34474 ssh2
Sep 13 17:41:54 vps200512 sshd\[16009\]: Invalid user oy from 35.187.248.21
Sep 13 17:41:54 vps200512 sshd\[16009\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=35.187.248.21
2019-09-14 05:52:11
139.59.94.203 attackspam
fail2ban honeypot
2019-09-14 05:37:25
49.88.112.114 attack
Sep 13 11:54:36 lcprod sshd\[538\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.88.112.114  user=root
Sep 13 11:54:38 lcprod sshd\[538\]: Failed password for root from 49.88.112.114 port 51145 ssh2
Sep 13 11:55:26 lcprod sshd\[621\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.88.112.114  user=root
Sep 13 11:55:28 lcprod sshd\[621\]: Failed password for root from 49.88.112.114 port 41575 ssh2
Sep 13 11:56:19 lcprod sshd\[688\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.88.112.114  user=root
2019-09-14 06:08:11
80.211.0.160 attackspam
Sep 13 23:46:56 plex sshd[12696]: Invalid user 1q2w3e from 80.211.0.160 port 58402
2019-09-14 05:58:24
210.211.127.223 attack
DATE:2019-09-13 23:23:15, IP:210.211.127.223, PORT:ssh SSH brute force auth (thor)
2019-09-14 05:39:05
95.58.161.180 attack
Chat Spam
2019-09-14 05:50:41
36.108.170.176 attack
2019-09-13T14:23:18.808953suse-nuc sshd[5909]: Invalid user shashank from 36.108.170.176 port 45155
...
2019-09-14 05:37:54

Recently Reported IPs

204.112.213.80 204.236.184.246 204.12.187.203 204.153.121.143
204.157.102.57 204.199.90.206 204.44.109.23 204.48.23.164
204.44.109.71 204.48.75.236 204.13.155.64 204.79.197.254
204.9.182.99 205.134.178.98 205.137.50.209 205.164.154.96
205.164.121.144 204.9.246.225 205.164.163.25 205.109.154.45