Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: San Diego

Region: California

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 63.117.104.150
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 109
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;63.117.104.150.			IN	A

;; AUTHORITY SECTION:
.			515	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2020033102 1800 900 604800 86400

;; Query time: 66 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Apr 01 09:21:39 CST 2020
;; MSG SIZE  rcvd: 118
Host info
Host 150.104.117.63.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 150.104.117.63.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
106.75.138.147 attack
Jul  6 04:42:42 MK-Soft-VM4 sshd\[1074\]: Invalid user control from 106.75.138.147 port 36636
Jul  6 04:42:42 MK-Soft-VM4 sshd\[1074\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.75.138.147
Jul  6 04:42:44 MK-Soft-VM4 sshd\[1074\]: Failed password for invalid user control from 106.75.138.147 port 36636 ssh2
...
2019-07-06 18:12:48
76.186.81.229 attack
Reported by AbuseIPDB proxy server.
2019-07-06 18:24:42
71.6.232.6 attackspambots
22/tcp 3389/tcp 445/tcp...
[2019-05-06/07-06]206pkt,3pt.(tcp),2pt.(udp)
2019-07-06 18:14:21
191.53.253.250 attackspambots
Jul  5 22:41:05 mailman postfix/smtpd[23194]: warning: unknown[191.53.253.250]: SASL PLAIN authentication failed: authentication failure
2019-07-06 18:15:21
41.239.72.54 attackspambots
Jul  6 05:33:30 shared06 sshd[16916]: Invalid user admin from 41.239.72.54
Jul  6 05:33:30 shared06 sshd[16916]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=41.239.72.54
Jul  6 05:33:32 shared06 sshd[16916]: Failed password for invalid user admin from 41.239.72.54 port 50657 ssh2
Jul  6 05:33:32 shared06 sshd[16916]: Connection closed by 41.239.72.54 port 50657 [preauth]


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=41.239.72.54
2019-07-06 18:04:21
200.66.123.114 attackspam
Brute force attempt
2019-07-06 18:16:39
37.59.104.76 attackbots
Jul  6 11:23:03 icinga sshd[18579]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=37.59.104.76
Jul  6 11:23:05 icinga sshd[18579]: Failed password for invalid user marianela from 37.59.104.76 port 42104 ssh2
...
2019-07-06 18:14:45
112.84.61.83 attack
Brute force SMTP login attempts.
2019-07-06 17:41:22
106.13.44.83 attack
$f2bV_matches
2019-07-06 18:01:26
198.108.67.49 attackbots
Port scan: Attack repeated for 24 hours
2019-07-06 18:28:05
182.148.114.139 attackspam
Jul  5 23:40:38 debian sshd\[18326\]: Invalid user mysql2 from 182.148.114.139 port 52139
Jul  5 23:40:38 debian sshd\[18326\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.148.114.139
Jul  5 23:40:40 debian sshd\[18326\]: Failed password for invalid user mysql2 from 182.148.114.139 port 52139 ssh2
...
2019-07-06 18:21:56
109.104.173.46 attack
Triggered by Fail2Ban
2019-07-06 18:16:08
88.214.26.17 attackspambots
DATE:2019-07-06_11:30:43, IP:88.214.26.17, PORT:3306 SQL brute force auth on honeypot MySQL/MariaDB server (honey-neo-dc)
2019-07-06 17:42:31
41.216.186.87 attackspam
SMTP:25. Blocked login attempt.
2019-07-06 18:04:39
78.158.160.20 attackspambots
Unauthorised access (Jul  6) SRC=78.158.160.20 LEN=52 PREC=0x20 TTL=112 ID=32716 DF TCP DPT=445 WINDOW=8192 SYN
2019-07-06 18:30:47

Recently Reported IPs

44.234.43.90 52.28.40.159 155.65.172.170 149.171.240.184
75.61.211.133 146.111.224.219 149.209.198.202 125.211.152.36
162.20.90.140 5.126.222.177 162.238.16.130 193.215.149.230
5.205.245.108 184.143.22.161 212.133.213.217 157.82.35.202
36.110.217.140 110.46.145.24 201.144.109.160 14.178.158.185