Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Magdeburg

Region: Sachsen-Anhalt

Country: Germany

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 88.150.6.2
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 11148
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;88.150.6.2.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025121401 1800 900 604800 86400

;; Query time: 11 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Dec 15 11:49:58 CST 2025
;; MSG SIZE  rcvd: 103
Host info
2.6.150.88.in-addr.arpa domain name pointer port-ip-88-150-6-2.reverse.mdcc-fun.de.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
2.6.150.88.in-addr.arpa	name = port-ip-88-150-6-2.reverse.mdcc-fun.de.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
66.161.137.115 attack
445/tcp 445/tcp 445/tcp
[2020-03-04/04-12]3pkt
2020-04-13 06:47:56
117.158.56.11 attackspambots
Invalid user 1922 from 117.158.56.11 port 44401
2020-04-13 06:55:25
85.248.156.75 attack
ssh brute force
2020-04-13 06:35:11
218.248.42.226 attackspambots
1433/tcp 445/tcp
[2020-03-19/04-12]2pkt
2020-04-13 06:51:03
185.147.68.23 attackspam
$f2bV_matches
2020-04-13 06:36:09
5.182.211.180 attack
Invalid user admin from 5.182.211.180 port 46442
2020-04-13 06:31:33
80.82.77.139 attack
port scan and connect, tcp 443 (https)
2020-04-13 06:52:35
120.132.101.8 attack
Apr 12 23:30:39 intra sshd\[39168\]: Invalid user student6 from 120.132.101.8Apr 12 23:30:41 intra sshd\[39168\]: Failed password for invalid user student6 from 120.132.101.8 port 45606 ssh2Apr 12 23:35:46 intra sshd\[39246\]: Invalid user ckobia from 120.132.101.8Apr 12 23:35:48 intra sshd\[39246\]: Failed password for invalid user ckobia from 120.132.101.8 port 51374 ssh2Apr 12 23:39:57 intra sshd\[39303\]: Invalid user oracle from 120.132.101.8Apr 12 23:40:00 intra sshd\[39303\]: Failed password for invalid user oracle from 120.132.101.8 port 57142 ssh2
...
2020-04-13 07:03:31
210.209.72.232 attackbotsspam
ssh brute force
2020-04-13 06:53:51
175.11.208.92 attack
Automatic report - Brute Force attack using this IP address
2020-04-13 06:31:11
176.113.115.209 attack
firewall-block, port(s): 3400/tcp
2020-04-13 06:30:52
222.64.92.65 attack
SSH Invalid Login
2020-04-13 06:45:00
58.222.107.253 attackbots
Apr 13 02:13:23 gw1 sshd[24989]: Failed password for root from 58.222.107.253 port 31579 ssh2
...
2020-04-13 06:46:13
104.248.48.218 attack
ssh brute force
2020-04-13 06:52:05
218.3.172.106 attackspam
1433/tcp 1433/tcp 1433/tcp...
[2020-03-17/04-12]5pkt,1pt.(tcp)
2020-04-13 06:42:53

Recently Reported IPs

71.215.33.108 233.149.183.250 223.38.64.38 241.47.44.29
108.149.139.201 148.101.119.208 56.232.82.211 137.193.79.101
83.255.113.202 57.137.54.191 182.144.12.112 123.103.214.155
8.245.154.2 54.201.132.222 75.22.184.170 149.255.190.239
93.33.196.222 82.14.232.34 78.4.178.154 248.4.22.164