Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States of America (the)

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 6.97.150.161
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 64314
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;6.97.150.161.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025020901 1800 900 604800 86400

;; Query time: 15 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Feb 10 11:10:49 CST 2025
;; MSG SIZE  rcvd: 105
Host info
Host 161.150.97.6.in-addr.arpa not found: 2(SERVFAIL)
Nslookup info:
server can't find 6.97.150.161.in-addr.arpa: SERVFAIL
Related IP info:
Related comments:
IP Type Details Datetime
138.97.242.113 attackbotsspam
Sep  3 18:45:37 mellenthin postfix/smtpd[20478]: NOQUEUE: reject: RCPT from unknown[138.97.242.113]: 554 5.7.1 Service unavailable; Client host [138.97.242.113] blocked using zen.spamhaus.org; https://www.spamhaus.org/query/ip/138.97.242.113; from= to= proto=ESMTP helo=<138-97-242-113.altavelocidade>
2020-09-04 17:18:53
74.219.227.194 attack
Honeypot attack, port: 445, PTR: rrcs-74-219-227-194.central.biz.rr.com.
2020-09-04 17:10:34
112.85.42.227 attack
Sep  4 04:54:36 NPSTNNYC01T sshd[3160]: Failed password for root from 112.85.42.227 port 57495 ssh2
Sep  4 05:00:05 NPSTNNYC01T sshd[4048]: Failed password for root from 112.85.42.227 port 23006 ssh2
...
2020-09-04 17:27:55
36.81.255.151 attack
Honeypot attack, port: 445, PTR: PTR record not found
2020-09-04 17:43:23
185.239.242.195 attackbotsspam
Sep  4 10:56:58 ns3164893 sshd[13166]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=185.239.242.195  user=root
Sep  4 10:57:00 ns3164893 sshd[13166]: Failed password for root from 185.239.242.195 port 59384 ssh2
...
2020-09-04 17:11:19
185.220.102.248 attackspambots
Fail2Ban Ban Triggered
2020-09-04 17:18:35
183.82.114.15 attackbots
Unauthorized connection attempt from IP address 183.82.114.15 on Port 445(SMB)
2020-09-04 17:10:10
181.48.16.14 attack
Unauthorized connection attempt from IP address 181.48.16.14 on Port 445(SMB)
2020-09-04 17:21:32
157.34.107.246 attackbots
Unauthorized connection attempt from IP address 157.34.107.246 on Port 445(SMB)
2020-09-04 17:29:21
62.150.79.106 attack
Attempted connection to port 1433.
2020-09-04 17:14:50
86.62.93.100 attackbots
1599151526 - 09/03/2020 18:45:26 Host: 86.62.93.100/86.62.93.100 Port: 445 TCP Blocked
2020-09-04 17:37:39
157.48.142.238 attack
Honeypot attack, port: 445, PTR: PTR record not found
2020-09-04 17:05:26
116.247.81.99 attackbots
$f2bV_matches
2020-09-04 17:07:15
58.152.38.250 attack
Invalid user admin from 58.152.38.250 port 36930
2020-09-04 17:38:46
141.136.95.175 attack
Attempted connection to port 445.
2020-09-04 17:29:52

Recently Reported IPs

156.187.169.48 198.50.56.10 200.224.124.37 106.215.106.192
225.219.153.234 57.194.23.230 9.220.97.82 251.158.3.106
83.65.11.0 228.167.208.188 232.136.124.149 132.63.63.132
88.140.121.21 48.235.237.227 55.158.225.33 250.116.40.250
146.214.65.197 87.191.131.163 18.194.198.97 45.211.82.51