Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Norresundby

Region: North Denmark

Country: Denmark

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 77.68.150.91
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 22934
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;77.68.150.91.			IN	A

;; AUTHORITY SECTION:
.			576	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2020022101 1800 900 604800 86400

;; Query time: 125 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Feb 22 04:27:51 CST 2020
;; MSG SIZE  rcvd: 116
Host info
Host 91.150.68.77.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 91.150.68.77.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
153.36.242.143 attackspam
Sep 23 15:39:42 amit sshd\[3200\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=153.36.242.143  user=root
Sep 23 15:39:44 amit sshd\[3200\]: Failed password for root from 153.36.242.143 port 61052 ssh2
Sep 23 15:39:47 amit sshd\[3200\]: Failed password for root from 153.36.242.143 port 61052 ssh2
...
2019-09-23 21:47:30
185.200.118.75 attackbots
" "
2019-09-23 21:46:19
212.30.52.243 attack
Sep 23 02:54:34 hiderm sshd\[4941\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=212.30.52.243  user=backup
Sep 23 02:54:36 hiderm sshd\[4941\]: Failed password for backup from 212.30.52.243 port 43244 ssh2
Sep 23 02:59:02 hiderm sshd\[5341\]: Invalid user lab from 212.30.52.243
Sep 23 02:59:02 hiderm sshd\[5341\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=212.30.52.243
Sep 23 02:59:04 hiderm sshd\[5341\]: Failed password for invalid user lab from 212.30.52.243 port 36186 ssh2
2019-09-23 21:15:36
202.83.172.249 attackbots
Sep 23 03:13:52 web1 sshd\[22077\]: Invalid user tanis from 202.83.172.249
Sep 23 03:13:52 web1 sshd\[22077\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=202.83.172.249
Sep 23 03:13:54 web1 sshd\[22077\]: Failed password for invalid user tanis from 202.83.172.249 port 41824 ssh2
Sep 23 03:18:38 web1 sshd\[22523\]: Invalid user trading from 202.83.172.249
Sep 23 03:18:38 web1 sshd\[22523\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=202.83.172.249
2019-09-23 21:19:04
138.94.114.238 attack
Sep 23 09:35:51 vtv3 sshd\[4557\]: Invalid user nemes from 138.94.114.238 port 39204
Sep 23 09:35:51 vtv3 sshd\[4557\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.94.114.238
Sep 23 09:35:53 vtv3 sshd\[4557\]: Failed password for invalid user nemes from 138.94.114.238 port 39204 ssh2
Sep 23 09:41:40 vtv3 sshd\[7372\]: Invalid user 6 from 138.94.114.238 port 48096
Sep 23 09:41:40 vtv3 sshd\[7372\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.94.114.238
Sep 23 09:52:38 vtv3 sshd\[12783\]: Invalid user pos from 138.94.114.238 port 33112
Sep 23 09:52:38 vtv3 sshd\[12783\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.94.114.238
Sep 23 09:52:40 vtv3 sshd\[12783\]: Failed password for invalid user pos from 138.94.114.238 port 33112 ssh2
Sep 23 09:58:15 vtv3 sshd\[15415\]: Invalid user ftpuser from 138.94.114.238 port 41984
Sep 23 09:58:15 vtv3 sshd\[15415\]: pam_uni
2019-09-23 21:44:40
1.163.32.24 attack
Sep 23 14:38:41 HOSTNAME sshd[27010]: User r.r from 1-163-32-24.dynamic-ip.hinet.net not allowed because not listed in AllowUsers
Sep 23 14:38:42 HOSTNAME sshd[27010]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=1-163-32-24.dynamic-ip.hinet.net  user=r.r


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=1.163.32.24
2019-09-23 21:05:46
222.186.173.215 attackbots
Sep 23 15:08:19 tux-35-217 sshd\[7101\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.173.215  user=root
Sep 23 15:08:21 tux-35-217 sshd\[7101\]: Failed password for root from 222.186.173.215 port 9602 ssh2
Sep 23 15:08:26 tux-35-217 sshd\[7101\]: Failed password for root from 222.186.173.215 port 9602 ssh2
Sep 23 15:08:31 tux-35-217 sshd\[7101\]: Failed password for root from 222.186.173.215 port 9602 ssh2
...
2019-09-23 21:25:23
201.53.220.200 attackbots
Autoban   201.53.220.200 AUTH/CONNECT
2019-09-23 21:28:40
89.40.193.124 attack
Sep 23 14:37:46 mxgate1 postfix/postscreen[14502]: CONNECT from [89.40.193.124]:42302 to [176.31.12.44]:25
Sep 23 14:37:46 mxgate1 postfix/dnsblog[14507]: addr 89.40.193.124 listed by domain cbl.abuseat.org as 127.0.0.2
Sep 23 14:37:46 mxgate1 postfix/dnsblog[14506]: addr 89.40.193.124 listed by domain zen.spamhaus.org as 127.0.0.4
Sep 23 14:37:46 mxgate1 postfix/dnsblog[14506]: addr 89.40.193.124 listed by domain zen.spamhaus.org as 127.0.0.11
Sep 23 14:37:46 mxgate1 postfix/dnsblog[14505]: addr 89.40.193.124 listed by domain b.barracudacentral.org as 127.0.0.2
Sep 23 14:37:52 mxgate1 postfix/postscreen[14502]: DNSBL rank 4 for [89.40.193.124]:42302
Sep x@x
Sep 23 14:37:54 mxgate1 postfix/postscreen[14502]: HANGUP after 1.5 from [89.40.193.124]:42302 in tests after SMTP handshake
Sep 23 14:37:54 mxgate1 postfix/postscreen[14502]: DISCONNECT [89.40.193.124]:42302


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=89.40.193.124
2019-09-23 21:01:13
118.217.216.100 attackbots
Sep 23 03:28:44 lcdev sshd\[5993\]: Invalid user Turkka from 118.217.216.100
Sep 23 03:28:44 lcdev sshd\[5993\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.217.216.100
Sep 23 03:28:46 lcdev sshd\[5993\]: Failed password for invalid user Turkka from 118.217.216.100 port 18578 ssh2
Sep 23 03:33:16 lcdev sshd\[6325\]: Invalid user yo from 118.217.216.100
Sep 23 03:33:16 lcdev sshd\[6325\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.217.216.100
2019-09-23 21:45:00
149.3.126.254 attackbotsspam
Port Scan: TCP/443
2019-09-23 21:25:45
181.48.134.66 attackspambots
Sep 23 03:28:39 hpm sshd\[31021\]: Invalid user easy from 181.48.134.66
Sep 23 03:28:39 hpm sshd\[31021\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=181.48.134.66
Sep 23 03:28:41 hpm sshd\[31021\]: Failed password for invalid user easy from 181.48.134.66 port 55040 ssh2
Sep 23 03:32:50 hpm sshd\[31358\]: Invalid user zang from 181.48.134.66
Sep 23 03:32:50 hpm sshd\[31358\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=181.48.134.66
2019-09-23 21:43:43
178.128.217.40 attack
Sep 23 03:15:41 hpm sshd\[29915\]: Invalid user ahavi from 178.128.217.40
Sep 23 03:15:41 hpm sshd\[29915\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.128.217.40
Sep 23 03:15:43 hpm sshd\[29915\]: Failed password for invalid user ahavi from 178.128.217.40 port 38324 ssh2
Sep 23 03:20:43 hpm sshd\[30339\]: Invalid user eternum from 178.128.217.40
Sep 23 03:20:43 hpm sshd\[30339\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.128.217.40
2019-09-23 21:24:22
36.227.78.223 attackbots
IP Ban Report : https://help-dysk.pl/wordpress-firewall-plugins/ip/36.227.78.223/ 
 TW - 1H : (2838)  
 Protection Against DDoS WordPress plugin :  
 "odzyskiwanie danych help-dysk" 
 IP Address Ranges by Country : TW 
 NAME ASN : ASN3462 
 
 IP : 36.227.78.223 
 
 CIDR : 36.227.0.0/16 
 
 PREFIX COUNT : 390 
 
 UNIQUE IP COUNT : 12267520 
 
 
 WYKRYTE ATAKI Z ASN3462 :  
  1H - 274 
  3H - 1101 
  6H - 2228 
 12H - 2740 
 24H - 2749 
 
 INFO : Port Scan TELNET Detected and Blocked by ADMIN  - data recovery
2019-09-23 21:30:33
80.52.199.93 attackspambots
2019-09-23T13:14:06.221588abusebot.cloudsearch.cf sshd\[17722\]: Invalid user guest from 80.52.199.93 port 45622
2019-09-23 21:40:18

Recently Reported IPs

66.26.228.117 218.234.50.16 114.32.36.74 84.236.174.194
54.160.16.150 109.157.88.61 204.45.13.115 46.122.120.56
125.29.56.218 46.119.129.193 49.169.13.236 75.234.96.179
216.24.85.247 23.94.167.101 124.228.180.230 156.246.218.145
5.143.44.217 218.118.187.248 130.89.64.182 100.163.0.25