Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States

Internet Service Provider: AT&T

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 63.199.80.150
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 11863
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;63.199.80.150.			IN	A

;; AUTHORITY SECTION:
.			598	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2020052501 1800 900 604800 86400

;; Query time: 80 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue May 26 06:29:31 CST 2020
;; MSG SIZE  rcvd: 117
Host info
Host 150.80.199.63.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 150.80.199.63.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
146.0.131.255 attackspam
pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=146.0.131.255  user=root
Failed password for root from 146.0.131.255 port 47624 ssh2
pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=146.0.131.255  user=root
Failed password for root from 146.0.131.255 port 58948 ssh2
Invalid user payserver from 146.0.131.255 port 42064
2019-10-29 05:20:06
81.22.45.190 attackspambots
10/28/2019-22:16:04.738578 81.22.45.190 Protocol: 6 ET DROP Dshield Block Listed Source group 1
2019-10-29 05:20:24
60.173.178.149 attack
10/28/2019-16:11:08.388590 60.173.178.149 Protocol: 6 ET CINS Active Threat Intelligence Poor Reputation IP group 59
2019-10-29 04:57:39
177.80.232.35 attackspam
Autoban   177.80.232.35 AUTH/CONNECT
2019-10-29 04:59:41
159.65.172.240 attackbots
Oct 28 20:10:16 anodpoucpklekan sshd[61685]: Invalid user th123 from 159.65.172.240 port 55288
...
2019-10-29 05:32:38
107.170.227.141 attackbotsspam
Oct 28 21:58:27 localhost sshd\[830\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=107.170.227.141  user=root
Oct 28 21:58:29 localhost sshd\[830\]: Failed password for root from 107.170.227.141 port 48364 ssh2
Oct 28 22:02:27 localhost sshd\[1240\]: Invalid user hdduser from 107.170.227.141 port 58364
Oct 28 22:02:27 localhost sshd\[1240\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=107.170.227.141
2019-10-29 05:14:32
158.69.63.244 attack
Oct 28 20:04:07 yesfletchmain sshd\[18277\]: User root from 158.69.63.244 not allowed because not listed in AllowUsers
Oct 28 20:04:07 yesfletchmain sshd\[18277\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=158.69.63.244  user=root
Oct 28 20:04:09 yesfletchmain sshd\[18277\]: Failed password for invalid user root from 158.69.63.244 port 41132 ssh2
Oct 28 20:11:00 yesfletchmain sshd\[18442\]: User root from 158.69.63.244 not allowed because not listed in AllowUsers
Oct 28 20:11:00 yesfletchmain sshd\[18442\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=158.69.63.244  user=root
...
2019-10-29 05:03:56
185.150.65.40 attackbots
firewall-block, port(s): 23/tcp
2019-10-29 05:33:11
160.176.185.123 attackbots
Oct 28 21:10:50 serwer sshd\[14709\]: Invalid user noc from 160.176.185.123 port 53719
Oct 28 21:10:54 serwer sshd\[14709\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=160.176.185.123
Oct 28 21:10:56 serwer sshd\[14709\]: Failed password for invalid user noc from 160.176.185.123 port 53719 ssh2
...
2019-10-29 05:05:46
91.206.200.231 attackspam
Automatic report - XMLRPC Attack
2019-10-29 05:16:41
139.99.77.197 attack
Oct 16 20:39:13 localhost postfix/smtpd[22838]: disconnect from unknown[139.99.77.197] ehlo=1 auth=0/1 quhostname=1 commands=2/3
Oct 16 21:22:42 localhost postfix/smtpd[2020]: disconnect from unknown[139.99.77.197] ehlo=1 auth=0/1 quhostname=1 commands=2/3
Oct 16 22:04:45 localhost postfix/smtpd[12185]: disconnect from unknown[139.99.77.197] ehlo=1 auth=0/1 quhostname=1 commands=2/3
Oct 16 22:46:21 localhost postfix/smtpd[23301]: disconnect from unknown[139.99.77.197] ehlo=1 auth=0/1 quhostname=1 commands=2/3
Oct 16 23:31:12 localhost postfix/smtpd[2628]: disconnect from unknown[139.99.77.197] ehlo=1 auth=0/1 quhostname=1 commands=2/3


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=139.99.77.197
2019-10-29 05:28:23
5.135.198.62 attackspambots
Oct 29 03:43:08 webhost01 sshd[29558]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=5.135.198.62
Oct 29 03:43:10 webhost01 sshd[29558]: Failed password for invalid user gabriele from 5.135.198.62 port 42033 ssh2
...
2019-10-29 05:12:05
61.130.28.153 attackbotsspam
Oct 28 21:10:41 arianus sshd\[30595\]: Unable to negotiate with 61.130.28.153 port 59214: no matching key exchange method found. Their offer: diffie-hellman-group14-sha1,diffie-hellman-group-exchange-sha1,diffie-hellman-group1-sha1 \[preauth\]
...
2019-10-29 05:17:06
138.94.114.238 attack
Oct 28 21:41:07 markkoudstaal sshd[25922]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.94.114.238
Oct 28 21:41:09 markkoudstaal sshd[25922]: Failed password for invalid user lena from 138.94.114.238 port 52172 ssh2
Oct 28 21:46:17 markkoudstaal sshd[26485]: Failed password for root from 138.94.114.238 port 58378 ssh2
2019-10-29 05:02:59
46.38.144.57 attack
Oct 28 22:16:59 relay postfix/smtpd\[26611\]: warning: unknown\[46.38.144.57\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Oct 28 22:17:27 relay postfix/smtpd\[1034\]: warning: unknown\[46.38.144.57\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Oct 28 22:18:08 relay postfix/smtpd\[26611\]: warning: unknown\[46.38.144.57\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Oct 28 22:18:36 relay postfix/smtpd\[1034\]: warning: unknown\[46.38.144.57\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Oct 28 22:19:20 relay postfix/smtpd\[445\]: warning: unknown\[46.38.144.57\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
...
2019-10-29 05:22:37

Recently Reported IPs

113.22.166.23 210.90.206.246 219.236.231.252 199.85.74.135
128.195.96.169 190.14.233.89 75.21.3.86 46.232.146.182
212.55.43.201 86.156.115.79 1.253.239.169 36.218.149.189
70.140.152.21 221.39.207.77 190.171.120.57 49.235.89.234
12.210.115.202 178.23.0.19 181.251.248.142 104.190.190.227