Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States of America (the)

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 48.150.202.197
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 1299
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;48.150.202.197.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025012301 1800 900 604800 86400

;; Query time: 11 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Jan 24 06:44:06 CST 2025
;; MSG SIZE  rcvd: 107
Host info
Host 197.202.150.48.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 197.202.150.48.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
207.155.193.201 attack
port scan and connect, tcp 443 (https)
2020-09-09 22:31:21
46.101.181.170 attack
2020-09-09T13:03:50.012759dmca.cloudsearch.cf sshd[9189]: Invalid user arijit from 46.101.181.170 port 45016
2020-09-09T13:03:50.017552dmca.cloudsearch.cf sshd[9189]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=46.101.181.170
2020-09-09T13:03:50.012759dmca.cloudsearch.cf sshd[9189]: Invalid user arijit from 46.101.181.170 port 45016
2020-09-09T13:03:52.291910dmca.cloudsearch.cf sshd[9189]: Failed password for invalid user arijit from 46.101.181.170 port 45016 ssh2
2020-09-09T13:08:45.169297dmca.cloudsearch.cf sshd[9246]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=46.101.181.170  user=root
2020-09-09T13:08:46.941952dmca.cloudsearch.cf sshd[9246]: Failed password for root from 46.101.181.170 port 51324 ssh2
2020-09-09T13:13:41.366575dmca.cloudsearch.cf sshd[9293]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=46.101.181.170  user=root
2020-09-09T13:13:43.4404
...
2020-09-09 22:57:11
240e:390:1040:1f5b:246:5d43:7e00:189c attackspambots
Attempted Email Sync. Password Hacking/Probing.
2020-09-09 22:34:28
199.167.91.162 attack
port scan and connect, tcp 23 (telnet)
2020-09-09 23:07:15
90.84.189.254 attack
Coordinated SSH brute-force attack from different IPs. pam_unix(sshd:auth): user=root
2020-09-09 22:57:41
221.148.45.168 attackspam
...
2020-09-09 22:42:51
222.186.42.137 attackbotsspam
Sep  9 11:00:03 NPSTNNYC01T sshd[24527]: Failed password for root from 222.186.42.137 port 19346 ssh2
Sep  9 11:00:15 NPSTNNYC01T sshd[24573]: Failed password for root from 222.186.42.137 port 22698 ssh2
Sep  9 11:00:18 NPSTNNYC01T sshd[24573]: Failed password for root from 222.186.42.137 port 22698 ssh2
...
2020-09-09 23:04:39
49.233.139.218 attackspam
Sep  9 06:30:06 dignus sshd[22643]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.233.139.218
Sep  9 06:30:09 dignus sshd[22643]: Failed password for invalid user cyrus from 49.233.139.218 port 33038 ssh2
Sep  9 06:31:05 dignus sshd[22719]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.233.139.218  user=root
Sep  9 06:31:08 dignus sshd[22719]: Failed password for root from 49.233.139.218 port 41618 ssh2
Sep  9 06:32:01 dignus sshd[22792]: Invalid user lubin from 49.233.139.218 port 50200
...
2020-09-09 23:05:54
185.216.32.130 attackspam
Sep  9 08:01:15 l02a sshd[29540]: Invalid user admin from 185.216.32.130
Sep  9 08:01:16 l02a sshd[29540]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=185.216.32.130 
Sep  9 08:01:15 l02a sshd[29540]: Invalid user admin from 185.216.32.130
Sep  9 08:01:17 l02a sshd[29540]: Failed password for invalid user admin from 185.216.32.130 port 45976 ssh2
2020-09-09 23:00:32
185.247.224.53 attack
$f2bV_matches
2020-09-09 22:44:54
103.105.67.146 attackbotsspam
$f2bV_matches
2020-09-09 22:48:49
123.125.21.125 attack
Sep  9 08:51:10 root sshd[27360]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=123.125.21.125 
...
2020-09-09 22:52:02
139.99.171.51 attack
(sshd) Failed SSH login from 139.99.171.51 (AU/Australia/relay6.tor.ian.sh): 5 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: Sep  9 00:36:37 server sshd[13653]: Failed password for root from 139.99.171.51 port 40899 ssh2
Sep  9 00:36:40 server sshd[13653]: Failed password for root from 139.99.171.51 port 40899 ssh2
Sep  9 00:36:44 server sshd[13653]: Failed password for root from 139.99.171.51 port 40899 ssh2
Sep  9 00:36:47 server sshd[13653]: Failed password for root from 139.99.171.51 port 40899 ssh2
Sep  9 00:36:51 server sshd[13653]: Failed password for root from 139.99.171.51 port 40899 ssh2
2020-09-09 23:06:39
89.189.186.45 attackspam
Sep  9 15:49:39 ajax sshd[29409]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=89.189.186.45 
Sep  9 15:49:40 ajax sshd[29409]: Failed password for invalid user admin from 89.189.186.45 port 51708 ssh2
2020-09-09 22:58:20
47.47.129.78 attackbotsspam
Attempted Email Sync. Password Hacking/Probing.
2020-09-09 22:46:26

Recently Reported IPs

253.130.216.150 169.128.50.85 211.30.33.27 68.113.146.182
223.138.38.141 26.50.26.66 221.242.30.182 230.45.0.172
220.182.247.182 75.9.215.181 161.73.114.58 129.180.95.85
151.45.73.188 248.92.35.0 95.237.251.236 16.80.37.212
135.22.153.115 189.240.116.2 20.237.139.214 251.71.251.178