Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Japan

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 219.100.150.13
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 32738
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;219.100.150.13.			IN	A

;; AUTHORITY SECTION:
.			600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022091502 1800 900 604800 86400

;; Query time: 66 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Sep 16 03:10:01 CST 2022
;; MSG SIZE  rcvd: 107
Host info
13.150.100.219.in-addr.arpa domain name pointer d219100150013.cable.ogaki-tv.ne.jp.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
13.150.100.219.in-addr.arpa	name = d219100150013.cable.ogaki-tv.ne.jp.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
171.241.133.37 attackspam
Unauthorized connection attempt from IP address 171.241.133.37 on Port 445(SMB)
2019-11-06 05:08:27
80.55.101.146 attackbots
postfix (unknown user, SPF fail or relay access denied)
2019-11-06 04:53:18
202.143.121.81 attackbotsspam
Unauthorized connection attempt from IP address 202.143.121.81 on Port 445(SMB)
2019-11-06 05:04:23
37.17.62.180 attack
Unauthorized connection attempt from IP address 37.17.62.180 on Port 445(SMB)
2019-11-06 04:42:33
210.71.232.236 attackbots
$f2bV_matches
2019-11-06 04:45:09
94.97.13.47 attackspambots
Unauthorized connection attempt from IP address 94.97.13.47 on Port 445(SMB)
2019-11-06 05:11:37
157.245.139.186 attackspam
Nov  5 21:41:34 MK-Soft-Root1 sshd[11065]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.245.139.186 
Nov  5 21:41:37 MK-Soft-Root1 sshd[11065]: Failed password for invalid user Rupesh from 157.245.139.186 port 52698 ssh2
...
2019-11-06 04:50:24
201.1.79.219 attackspam
WEB_SERVER 403 Forbidden
2019-11-06 04:57:42
71.218.169.122 attackspambots
Telnet brute force and port scan
2019-11-06 04:48:26
14.245.194.239 attackspam
Unauthorized connection attempt from IP address 14.245.194.239 on Port 445(SMB)
2019-11-06 04:51:18
113.140.75.205 attack
$f2bV_matches
2019-11-06 04:56:19
125.78.148.88 attack
445/tcp 445/tcp 445/tcp...
[2019-10-16/11-05]4pkt,1pt.(tcp)
2019-11-06 04:58:05
103.7.37.44 attack
Unauthorized connection attempt from IP address 103.7.37.44 on Port 445(SMB)
2019-11-06 05:10:27
106.13.71.133 attack
SSH brutforce
2019-11-06 05:18:10
46.105.132.32 attack
Unauthorized connection attempt from IP address 46.105.132.32 on Port 139(NETBIOS)
2019-11-06 05:09:26

Recently Reported IPs

211.97.119.77 42.236.138.161 112.232.227.201 217.124.157.102
123.130.218.96 49.73.60.239 89.132.7.148 90.177.221.67
171.38.217.39 119.249.26.106 117.95.186.194 36.249.53.172
49.68.159.218 68.183.227.168 185.89.100.67 37.35.40.172
75.167.105.57 13.214.32.110 93.177.118.41 159.65.199.203