Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Los Angeles

Region: California

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 45.199.141.150
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 38957
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;45.199.141.150.			IN	A

;; AUTHORITY SECTION:
.			588	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022091402 1800 900 604800 86400

;; Query time: 76 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Sep 15 08:19:59 CST 2022
;; MSG SIZE  rcvd: 107
Host info
Host 150.141.199.45.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 150.141.199.45.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
95.177.173.99 attackspambots
May 26 09:23:12 abendstille sshd\[31828\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=95.177.173.99  user=root
May 26 09:23:14 abendstille sshd\[31828\]: Failed password for root from 95.177.173.99 port 55316 ssh2
May 26 09:27:05 abendstille sshd\[3371\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=95.177.173.99  user=root
May 26 09:27:07 abendstille sshd\[3371\]: Failed password for root from 95.177.173.99 port 59838 ssh2
May 26 09:31:01 abendstille sshd\[7121\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=95.177.173.99  user=root
...
2020-05-26 18:59:41
123.24.182.140 attackbotsspam
445/tcp
[2020-05-26]1pkt
2020-05-26 18:45:40
178.90.110.39 attackbotsspam
Unauthorized connection attempt from IP address 178.90.110.39 on Port 445(SMB)
2020-05-26 18:32:49
145.239.92.211 attackspam
5x Failed Password
2020-05-26 18:38:38
139.196.41.233 attackspambots
ICMP MH Probe, Scan /Distributed -
2020-05-26 18:51:53
114.43.215.201 attackbotsspam
Telnet/23 MH Probe, Scan, BF, Hack -
2020-05-26 19:03:30
80.82.65.122 attackbots
May 26 12:19:00 ns3042688 courier-pop3d: LOGIN FAILED, user=test@makita-dolmar.biz, ip=\[::ffff:80.82.65.122\]
...
2020-05-26 18:45:00
14.232.91.161 attack
Unauthorized connection attempt from IP address 14.232.91.161 on Port 445(SMB)
2020-05-26 18:56:15
223.238.76.70 attack
Unauthorized connection attempt from IP address 223.238.76.70 on Port 445(SMB)
2020-05-26 18:28:36
83.209.248.201 attackbotsspam
Telnet/23 MH Probe, Scan, BF, Hack -
2020-05-26 18:55:56
137.97.79.77 attackbots
Unauthorized connection attempt from IP address 137.97.79.77 on Port 445(SMB)
2020-05-26 18:48:31
118.165.16.4 attackspam
Telnet/23 MH Probe, Scan, BF, Hack -
2020-05-26 18:40:36
113.220.21.98 attack
Port probing on unauthorized port 8080
2020-05-26 18:43:06
159.192.177.244 attack
Unauthorized connection attempt from IP address 159.192.177.244 on Port 445(SMB)
2020-05-26 18:44:17
114.35.222.68 attackspam
Telnet/23 MH Probe, Scan, BF, Hack -
2020-05-26 18:57:59

Recently Reported IPs

95.38.239.18 156.239.55.68 45.221.41.88 193.56.65.124
183.214.36.84 154.201.34.112 45.138.100.152 47.49.171.19
120.204.100.189 95.164.234.113 172.245.28.110 104.144.155.221
192.241.125.221 154.6.12.150 45.80.107.148 193.233.142.85
69.167.136.118 121.228.14.16 176.56.107.122 105.159.249.53