Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: None

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 48.150.149.8
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 53753
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;48.150.149.8.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025021800 1800 900 604800 86400

;; Query time: 11 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Feb 18 21:07:52 CST 2025
;; MSG SIZE  rcvd: 105
Host info
Host 8.149.150.48.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 8.149.150.48.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
109.202.117.2 attack
10/31/2019-08:08:31.858705 109.202.117.2 Protocol: 6 ET SCAN Potential SSH Scan
2019-10-31 20:27:38
51.75.133.167 attackbots
Oct 31 02:38:21 web1 sshd\[15316\]: Invalid user ts35 from 51.75.133.167
Oct 31 02:38:21 web1 sshd\[15316\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.75.133.167
Oct 31 02:38:23 web1 sshd\[15316\]: Failed password for invalid user ts35 from 51.75.133.167 port 58270 ssh2
Oct 31 02:42:21 web1 sshd\[15698\]: Invalid user user from 51.75.133.167
Oct 31 02:42:21 web1 sshd\[15698\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.75.133.167
2019-10-31 20:55:53
91.237.201.49 attack
Chat Spam
2019-10-31 20:35:51
119.29.53.107 attack
Oct 31 13:38:30 piServer sshd[30876]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=119.29.53.107
Oct 31 13:38:33 piServer sshd[30876]: Failed password for invalid user sftp from 119.29.53.107 port 47222 ssh2
Oct 31 13:43:46 piServer sshd[31303]: Failed password for root from 119.29.53.107 port 37433 ssh2
...
2019-10-31 20:43:58
117.35.218.174 attackbotsspam
Automatic report - FTP Brute Force
2019-10-31 20:43:40
109.202.117.35 attackbotsspam
10/31/2019-08:08:34.630440 109.202.117.35 Protocol: 6 ET SCAN Potential SSH Scan
2019-10-31 20:26:14
69.25.149.164 attackbots
2019-10-31T12:08:24.407012abusebot-8.cloudsearch.cf sshd\[29392\]: Invalid user lumiere from 69.25.149.164 port 58849
2019-10-31 20:31:48
123.181.56.174 attackspam
scan z
2019-10-31 20:37:53
185.40.4.228 attack
10/31/2019-13:07:54.492880 185.40.4.228 Protocol: 6 ET SCAN Suspicious inbound to MSSQL port 1433
2019-10-31 20:53:21
93.174.95.106 attack
MultiHost/MultiPort Probe, Scan, Hack -
2019-10-31 20:32:26
144.217.14.18 attack
2019-10-31T12:40:35.076756abusebot-8.cloudsearch.cf sshd\[29543\]: Invalid user thanhhoa from 144.217.14.18 port 60770
2019-10-31 21:08:51
185.176.27.118 attackspambots
10/31/2019-08:30:36.566274 185.176.27.118 Protocol: 6 ET DROP Dshield Block Listed Source group 1
2019-10-31 20:31:03
186.4.184.218 attackbots
Oct 31 13:27:10 vps666546 sshd\[1666\]: Invalid user masanta from 186.4.184.218 port 37940
Oct 31 13:27:10 vps666546 sshd\[1666\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=186.4.184.218
Oct 31 13:27:12 vps666546 sshd\[1666\]: Failed password for invalid user masanta from 186.4.184.218 port 37940 ssh2
Oct 31 13:32:13 vps666546 sshd\[1762\]: Invalid user Godaddy from 186.4.184.218 port 47106
Oct 31 13:32:13 vps666546 sshd\[1762\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=186.4.184.218
...
2019-10-31 20:40:25
188.17.79.132 attackspambots
Chat Spam
2019-10-31 20:30:28
202.120.40.69 attackbots
Oct 31 13:43:14 lnxmysql61 sshd[29314]: Failed password for root from 202.120.40.69 port 56206 ssh2
Oct 31 13:43:14 lnxmysql61 sshd[29314]: Failed password for root from 202.120.40.69 port 56206 ssh2
2019-10-31 21:07:22

Recently Reported IPs

244.221.113.216 95.23.128.206 56.245.58.20 87.141.201.91
171.7.168.76 33.222.255.71 175.154.147.98 75.245.250.21
255.184.74.181 68.12.210.203 169.75.251.82 228.236.252.129
232.122.116.77 138.130.219.68 240.236.151.210 94.91.174.125
146.63.207.71 223.236.241.247 15.211.191.223 171.227.70.91