Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Demigny

Region: Bourgogne-Franche-Comté

Country: France

Internet Service Provider: SFR

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
% This is the RIPE Database query service.
% The objects are in RPSL format.
%
% The RIPE Database is subject to Terms and Conditions.
% See https://docs.db.ripe.net/terms-conditions.html

% Note: this output has been filtered.
%       To receive output for a database update, use the "-B" flag.

% Information related to '77.144.0.0 - 77.151.255.255'

% Abuse contact for '77.144.0.0 - 77.151.255.255' is 'abuse@gaoland.net'

inetnum:        77.144.0.0 - 77.151.255.255
netname:        SFR-USER-DATA
descr:          Pool for mobile data users
descr:          Dynamic IP
country:        FR
admin-c:        LD699-RIPE
tech-c:         LDC76-RIPE
remarks:        ***********************************
remarks:        * Abuse e-mail: abuse@gaoland.net *
remarks:        ***********************************
status:         ASSIGNED PA
mnt-by:         SFR-MNT
created:        2011-09-27T08:19:22Z
last-modified:  2011-10-03T12:46:43Z
source:         RIPE # Filtered

role:           SFR Legal Contact
address:        Campus SFR
address:        12 rue Jean-Philippe Rameau
address:        CS 80001
address:        93634 La-Plaine-Saint-Denis Cedex
address:        France
phone:          +33 1 70 18 52 00
admin-c:        LDC76-RIPE
admin-c:        HS10001-RIPE
tech-c:         HS10001-RIPE
nic-hdl:        LD699-RIPE
abuse-mailbox:  abuse@gaoland.net
mnt-by:         LDCOM-MNT
created:        2003-10-23T09:15:54Z
last-modified:  2023-09-18T07:21:21Z
source:         RIPE # Filtered

role:           SFR Tech Contact (formerly Neuf Cegetel / LDCOM Networks)
address:        SFR
address:        CAMPUS SFR
address:        16 rue du General Alain de Boissieu
address:        CS 68217
address:        75741 PARIS CEDEX 15
address:        France
phone:          +33 1 85 06 00 00
admin-c:        LD699-RIPE
admin-c:        HS10001-RIPE
tech-c:         DG1056-RIPE
nic-hdl:        LDC76-RIPE
abuse-mailbox:  abuse@gaoland.net
mnt-by:         LDCOM-MNT
created:        2001-12-20T14:34:14Z
last-modified:  2024-11-19T08:08:19Z
source:         RIPE # Filtered

% Information related to '77.144.0.0/12AS15557'

route:          77.144.0.0/12
descr:          SFR ALTICE France
origin:         AS15557
mnt-by:         SFR-MNT
created:        2016-06-09T15:14:19Z
last-modified:  2025-07-30T14:13:51Z
source:         RIPE

% This query was served by the RIPE Database Query Service version 1.122 (DEXTER)
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 77.150.184.99
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 26128
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;77.150.184.99.			IN	A

;; AUTHORITY SECTION:
.			29	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2026050400 1800 900 604800 86400

;; Query time: 6 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon May 04 16:13:41 CST 2026
;; MSG SIZE  rcvd: 106
Host info
99.184.150.77.in-addr.arpa domain name pointer 99.184.150.77.rev.sfr.net.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
99.184.150.77.in-addr.arpa	name = 99.184.150.77.rev.sfr.net.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
5.63.119.107 attack
1580619515 - 02/02/2020 05:58:35 Host: 5.63.119.107/5.63.119.107 Port: 445 TCP Blocked
2020-02-02 13:12:13
122.51.149.126 attackbotsspam
Unauthorized connection attempt detected from IP address 122.51.149.126 to port 2220 [J]
2020-02-02 10:11:27
45.161.109.35 attackbotsspam
Unauthorized connection attempt detected from IP address 45.161.109.35 to port 1433 [J]
2020-02-02 10:05:32
190.202.32.2 attack
Feb  2 06:15:31 srv01 sshd[32356]: Invalid user jenkins from 190.202.32.2 port 42264
Feb  2 06:15:31 srv01 sshd[32356]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=190.202.32.2
Feb  2 06:15:31 srv01 sshd[32356]: Invalid user jenkins from 190.202.32.2 port 42264
Feb  2 06:15:33 srv01 sshd[32356]: Failed password for invalid user jenkins from 190.202.32.2 port 42264 ssh2
Feb  2 06:18:53 srv01 sshd[32528]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=190.202.32.2  user=root
Feb  2 06:18:55 srv01 sshd[32528]: Failed password for root from 190.202.32.2 port 57177 ssh2
...
2020-02-02 13:26:30
91.183.90.237 attackbotsspam
Unauthorized connection attempt detected from IP address 91.183.90.237 to port 2220 [J]
2020-02-02 10:14:28
112.85.42.186 attackbots
Feb  2 05:56:02 ns381471 sshd[10003]: Failed password for root from 112.85.42.186 port 35220 ssh2
2020-02-02 13:05:09
222.186.30.57 attackspambots
Feb  2 03:12:48 v22018076622670303 sshd\[11772\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.30.57  user=root
Feb  2 03:12:50 v22018076622670303 sshd\[11772\]: Failed password for root from 222.186.30.57 port 59024 ssh2
Feb  2 03:12:53 v22018076622670303 sshd\[11772\]: Failed password for root from 222.186.30.57 port 59024 ssh2
...
2020-02-02 10:14:56
103.123.8.221 attack
Feb  2 04:54:56 web8 sshd\[3901\]: Invalid user user1 from 103.123.8.221
Feb  2 04:54:56 web8 sshd\[3901\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.123.8.221
Feb  2 04:54:58 web8 sshd\[3901\]: Failed password for invalid user user1 from 103.123.8.221 port 48406 ssh2
Feb  2 04:58:37 web8 sshd\[5475\]: Invalid user steam from 103.123.8.221
Feb  2 04:58:37 web8 sshd\[5475\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.123.8.221
2020-02-02 13:08:01
51.38.232.93 attackspambots
Feb  1 23:58:35 plusreed sshd[16025]: Invalid user sbserver from 51.38.232.93
...
2020-02-02 13:11:11
54.37.100.120 attackspam
54.37.100.120 - - [02/Feb/2020:04:58:15 +0000] "POST /wp/wp-login.php HTTP/1.1" 200 6255 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
54.37.100.120 - - [02/Feb/2020:04:58:16 +0000] "POST /wp/xmlrpc.php HTTP/1.1" 200 403 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
...
2020-02-02 13:28:24
188.148.154.34 attackspambots
Honeypot attack, port: 5555, PTR: c188-148-154-34.bredband.comhem.se.
2020-02-02 13:07:14
189.125.93.48 attackspambots
Feb  2 05:58:07 MK-Soft-VM3 sshd[18132]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=189.125.93.48 
Feb  2 05:58:08 MK-Soft-VM3 sshd[18132]: Failed password for invalid user git from 189.125.93.48 port 35588 ssh2
...
2020-02-02 13:19:49
122.240.62.1 attackbotsspam
Unauthorized connection attempt detected from IP address 122.240.62.1 to port 3389 [J]
2020-02-02 10:08:28
95.129.177.122 attack
Honeypot attack, port: 445, PTR: 122.177.ptr.deozal.ru.
2020-02-02 13:03:04
112.74.106.49 attackspambots
Unauthorized connection attempt detected from IP address 112.74.106.49 to port 1433 [J]
2020-02-02 13:15:55

Recently Reported IPs

2606:4700:10::6816:2224 104.236.119.25 51.255.93.92 121.41.165.89
66.132.172.138 64.62.156.138 162.248.164.110 2606:4700:10::6814:4802
216.36.82.2 3.26.63.30 66.132.186.183 43.165.127.225
131.61.72.243 35.234.134.240 240.96.11.44 2606:4700:10::6814:4571
45.43.58.106 226.202.141.197 34.158.17.226 2606:4700:10::6814:6075