Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States of America (the)

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 28.1.229.150
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 46936
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;28.1.229.150.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025020602 1800 900 604800 86400

;; Query time: 40 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 07 07:09:28 CST 2025
;; MSG SIZE  rcvd: 105
Host info
Host 150.229.1.28.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 150.229.1.28.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
80.82.77.240 attackbots
Fail2Ban Ban Triggered
2020-03-25 19:58:30
194.26.29.110 attackspam
Mar 25 11:21:45 src: 194.26.29.110 signature match: "BACKDOOR NetSphere Connection attempt" (sid: 100044) tcp port: 30100
2020-03-25 19:23:00
125.212.217.214 attack
firewall-block, port(s): 1022/tcp
2020-03-25 19:53:06
87.251.74.11 attackspambots
firewall-block, port(s): 6340/tcp, 44449/tcp
2020-03-25 18:54:33
162.243.132.250 attackbots
20/3/25@06:46:27: FAIL: IoT-SSH address from=162.243.132.250
...
2020-03-25 19:41:17
45.143.220.98 attack
Port 50804 scan denied
2020-03-25 19:09:11
83.97.20.37 attackspambots
" "
2020-03-25 18:58:12
188.166.208.131 attack
2020-03-24 UTC: (30x) - admin,armand,aufstellungsort,blade,bn,cod,cww,dy,fl,ftpuser,karena,lead,madhouse,neutron,nginx,nm,nola,orace,penglina,psybnc,simulator,uu,uz,vagrant,velva,web,weichanghe,whisper,www,xl
2020-03-25 19:31:06
27.209.161.166 attackspam
Telnet/23 MH Probe, Scan, BF, Hack -
2020-03-25 19:12:44
103.253.42.35 attackspambots
03/25/2020-01:05:11.433213 103.253.42.35 Protocol: 6 ET SCAN NMAP -sS window 1024
2020-03-25 19:54:55
184.105.139.70 attack
Unauthorized connection attempt detected from IP address 184.105.139.70 to port 389
2020-03-25 19:37:04
74.82.47.50 attackbots
30005/tcp 873/tcp 6379/tcp...
[2020-01-24/03-25]18pkt,9pt.(tcp),1pt.(udp)
2020-03-25 19:59:02
185.216.140.31 attackspam
Port 3780 scan denied
2020-03-25 19:31:29
45.143.220.236 attack
Port 5142 scan denied
2020-03-25 19:08:23
194.61.27.240 attackspambots
SIP/5060 Probe, BF, Hack -
2020-03-25 19:20:53

Recently Reported IPs

95.100.4.2 137.135.221.67 197.93.225.156 131.86.47.112
218.234.85.178 79.29.234.70 138.133.231.244 216.115.69.212
24.249.108.107 10.138.239.189 236.97.63.151 63.65.43.235
23.237.173.1 243.170.242.117 216.230.20.109 32.222.72.45
7.84.131.187 115.82.69.109 30.193.63.82 181.235.47.140