Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Augsburg

Region: Bayern

Country: Germany

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 213.209.150.207
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 25436
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;213.209.150.207.		IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025080600 1800 900 604800 86400

;; Query time: 10 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Aug 06 15:30:55 CST 2025
;; MSG SIZE  rcvd: 108
Host info
Host 207.150.209.213.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 207.150.209.213.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
46.232.112.21 attack
abuse-sasl
2019-07-17 03:40:29
41.232.175.141 attackspambots
/wp-login.php
2019-07-17 03:16:20
51.68.71.144 attackspambots
Jul 16 21:10:18 SilenceServices sshd[11456]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.68.71.144
Jul 16 21:10:20 SilenceServices sshd[11456]: Failed password for invalid user mc3 from 51.68.71.144 port 45094 ssh2
Jul 16 21:14:52 SilenceServices sshd[15298]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.68.71.144
2019-07-17 03:26:37
94.102.56.151 attackspam
Multiport scan : 8 ports scanned 80 443 444 4443 10443 20443 30443 44443
2019-07-17 03:35:35
185.176.27.26 attack
16.07.2019 17:56:35 Connection to port 20485 blocked by firewall
2019-07-17 03:05:01
168.232.8.8 attackspambots
2019-07-16T19:16:12.216750abusebot.cloudsearch.cf sshd\[8518\]: Invalid user fs from 168.232.8.8 port 36099
2019-07-17 03:17:18
142.93.101.158 attack
MultiHost/MultiPort Probe, Scan, Hack -
2019-07-17 03:40:14
92.118.37.43 attackspam
Multiport scan : 53 ports scanned 97 322 489 1823 3245 3559 3776 4270 4371 4741 5027 5085 5091 5103 5157 5254 5275 5317 5342 5362 5409 5423 5433 5448 5471 5491 5507 5528 5654 5683 5693 5704 5785 5870 5893 5899 5903 5908 5964 5978 6011 6133 6148 6315 6426 6535 6691 6866 6922 6958 7587 8929 16361
2019-07-17 03:40:55
221.235.184.80 attack
Hit on /wp-login.php
2019-07-17 03:48:44
167.114.230.252 attack
Jul 16 15:15:18 localhost sshd\[75162\]: Invalid user anton from 167.114.230.252 port 33418
Jul 16 15:15:18 localhost sshd\[75162\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.114.230.252
Jul 16 15:15:19 localhost sshd\[75162\]: Failed password for invalid user anton from 167.114.230.252 port 33418 ssh2
Jul 16 15:19:58 localhost sshd\[75249\]: Invalid user pa from 167.114.230.252 port 60670
Jul 16 15:19:58 localhost sshd\[75249\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.114.230.252
...
2019-07-17 03:47:25
117.60.141.125 attackbots
20 attempts against mh-ssh on sky.magehost.pro
2019-07-17 03:50:28
91.206.15.239 attackbots
16.07.2019 14:11:15 Connection to port 15555 blocked by firewall
2019-07-17 03:41:48
37.49.231.130 attackspambots
Scanning (more than 2 packets) random ports - tries to find possible vulnerable services
2019-07-17 03:33:26
89.248.160.193 attackspambots
Scanning (more than 2 packets) random ports - tries to find possible vulnerable services
2019-07-17 03:48:02
91.177.116.173 attackspambots
Jul 16 20:48:36 bouncer sshd\[11750\]: Invalid user hy from 91.177.116.173 port 59272
Jul 16 20:48:36 bouncer sshd\[11750\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=91.177.116.173 
Jul 16 20:48:37 bouncer sshd\[11750\]: Failed password for invalid user hy from 91.177.116.173 port 59272 ssh2
...
2019-07-17 03:42:38

Recently Reported IPs

47.91.125.252 21.6.79.43 221.6.79.43 61.167.255.60
41.239.63.117 123.245.84.79 104.234.115.167 59.49.9.130
154.198.93.226 105.28.232.183 87.236.176.89 81.17.23.242
196.251.92.11 196.251.0.11 31.130.35.29 20.106.32.153
113.215.188.110 66.249.76.225 172.178.83.104 37.159.60.171