Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Seoul

Region: Seoul

Country: Korea Republic of

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 210.120.14.150
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 30941
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;210.120.14.150.			IN	A

;; AUTHORITY SECTION:
.			296	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2020100201 1800 900 604800 86400

;; Query time: 116 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Oct 03 03:04:09 CST 2020
;; MSG SIZE  rcvd: 118
Host info
150.14.120.210.in-addr.arpa domain name pointer mail.ctrade.co.kr.
150.14.120.210.in-addr.arpa domain name pointer mail.xtrade.co.kr.
150.14.120.210.in-addr.arpa domain name pointer ctrade.co.kr.
150.14.120.210.in-addr.arpa domain name pointer strade.co.kr.
150.14.120.210.in-addr.arpa domain name pointer mail.strade.co.kr.
150.14.120.210.in-addr.arpa domain name pointer xtrade.co.kr.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
150.14.120.210.in-addr.arpa	name = strade.co.kr.
150.14.120.210.in-addr.arpa	name = mail.strade.co.kr.
150.14.120.210.in-addr.arpa	name = xtrade.co.kr.
150.14.120.210.in-addr.arpa	name = mail.ctrade.co.kr.
150.14.120.210.in-addr.arpa	name = mail.xtrade.co.kr.
150.14.120.210.in-addr.arpa	name = ctrade.co.kr.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
132.232.2.100 attackspam
Invalid user roOT from 132.232.2.100 port 59682
2020-09-20 18:15:57
192.144.232.129 attackbots
Invalid user barberapp from 192.144.232.129 port 33526
2020-09-20 18:21:14
49.235.133.208 attack
$f2bV_matches
2020-09-20 18:42:30
221.143.48.143 attack
SSH Brute-Force reported by Fail2Ban
2020-09-20 18:25:06
144.34.203.73 attack
SSHD brute force attack detected from [144.34.203.73]
2020-09-20 18:31:35
184.105.139.78 attackbots
MultiHost/MultiPort Probe, Scan, Hack -
2020-09-20 18:40:10
184.105.247.198 attackspambots
MultiHost/MultiPort Probe, Scan, Hack -
2020-09-20 18:22:44
102.165.30.37 attackbotsspam
TCP port : 5289
2020-09-20 18:24:32
184.105.139.75 attackbotsspam
Tried our host z.
2020-09-20 18:18:05
216.218.206.100 attackspambots
 TCP (SYN) 216.218.206.100:47402 -> port 50075, len 44
2020-09-20 18:46:04
216.218.206.86 attack
firewall-block, port(s): 500/udp
2020-09-20 18:49:43
74.82.47.12 attack
srv02 Mass scanning activity detected Target: 8443  ..
2020-09-20 18:13:01
201.1.173.138 attackspam
Listed on    zen-spamhaus also barracudaCentral and dnsbl-sorbs   / proto=6  .  srcport=20052  .  dstport=8080  .     (2280)
2020-09-20 18:44:47
192.42.116.22 attackspam
Sep 20 08:22:48 vpn01 sshd[10728]: Failed password for root from 192.42.116.22 port 44304 ssh2
Sep 20 08:22:50 vpn01 sshd[10728]: Failed password for root from 192.42.116.22 port 44304 ssh2
...
2020-09-20 18:48:24
35.226.191.68 attackbotsspam
SSH 2020-09-19 22:40:05	35.226.191.68	139.99.22.221	>	POST	presidenonline.com	/wp-login.php	HTTP/1.1	-	-
2020-09-20 06:49:02	35.226.191.68	139.99.22.221	>	GET	edsumedia.com	/wp-login.php	HTTP/1.1	-	-
2020-09-20 06:49:03	35.226.191.68	139.99.22.221	>	POST	edsumedia.com	/wp-login.php	HTTP/1.1	-	-
2020-09-20 18:14:43

Recently Reported IPs

136.119.181.119 57.221.236.120 123.185.200.72 137.248.59.247
152.201.169.51 173.193.47.207 46.227.57.153 139.186.53.200
31.245.94.162 123.86.89.204 191.109.231.55 112.79.243.219
99.68.72.144 102.65.222.5 96.14.95.237 55.174.221.249
68.231.99.154 114.82.57.39 12.122.111.137 105.178.205.138