{"id":884,"date":"2026-02-16T14:44:26","date_gmt":"2026-02-16T14:44:26","guid":{"rendered":"https:\/\/ruby-doc.org\/blog\/?p=884"},"modified":"2026-02-16T14:48:33","modified_gmt":"2026-02-16T14:48:33","slug":"111-90-150-188","status":"publish","type":"post","link":"https:\/\/ruby-doc.org\/blog\/111-90-150-188\/","title":{"rendered":"111.90.150.188 \u2013 What This IP Address Is and Why People Are Searching for It"},"content":{"rendered":"\n<p>If you have recently searched for <strong>111.90.150.188<\/strong>, you are not alone. Many people look up specific IP addresses after noticing unusual activity in their website logs, firewall alerts, email headers, or analytics dashboards. When an unfamiliar IP repeatedly appears in traffic reports, login attempts, or security notifications, it is natural to want to know what it represents.<\/p>\n\n\n\n<p>This article explains what an IP address like 111.90.150.188 is, why it may appear in your data, and what steps you can take if you are concerned.<\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<h2 class=\"wp-block-heading\">What Is 111.90.150.188?<\/h2>\n\n\n\n<p>111.90.150.188 is an <strong>IPv4 address<\/strong>. IPv4 (Internet Protocol version 4) is the most widely used system for identifying devices connected to the internet. Every device that connects online\u2014servers, laptops, smartphones, routers\u2014uses an IP address to send and receive data.<\/p>\n\n\n\n<p>An IP address alone does not tell you:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>The exact person behind it<\/li>\n\n\n\n<li>The precise physical location<\/li>\n\n\n\n<li>The intent of the traffic<\/li>\n\n\n\n<li>Whether it is legitimate or malicious<\/li>\n<\/ul>\n\n\n\n<p>It only identifies a connection endpoint at a specific point in time.<\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<h2 class=\"wp-block-heading\">Network and Hosting Information<\/h2>\n\n\n\n<figure class=\"wp-block-image size-large\"><img fetchpriority=\"high\" decoding=\"async\" width=\"1024\" height=\"575\" src=\"https:\/\/ruby-doc.org\/blog\/wp-content\/uploads\/2026\/02\/111.90.150.188-1024x575.jpg\" alt=\"111.90.150.188\" class=\"wp-image-885\" srcset=\"https:\/\/ruby-doc.org\/blog\/wp-content\/uploads\/2026\/02\/111.90.150.188-1024x575.jpg 1024w, https:\/\/ruby-doc.org\/blog\/wp-content\/uploads\/2026\/02\/111.90.150.188-300x169.jpg 300w, https:\/\/ruby-doc.org\/blog\/wp-content\/uploads\/2026\/02\/111.90.150.188-768x431.jpg 768w, https:\/\/ruby-doc.org\/blog\/wp-content\/uploads\/2026\/02\/111.90.150.188-1536x863.jpg 1536w, https:\/\/ruby-doc.org\/blog\/wp-content\/uploads\/2026\/02\/111.90.150.188-2048x1151.jpg 2048w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<p>The IP 111.90.150.188 falls within the <strong>111.90.150.0\/23 subnet<\/strong>, which is commonly used by network hosting providers. Public IP tracking platforms, including services like IP Teoh and ipgeolocation.io, record it for geolocation and analytics purposes. Interestingly, some searches suggest this IP has been linked to music-related data on platforms such as Last.fm, including artist profiles or track activity.<\/p>\n\n\n\n<p><strong>IP Range:<\/strong> 111.90.150.0 \u2013 111.90.151.255<br><strong>Subnet:<\/strong> 111.90.150.0\/23<br><strong>Usage Context:<\/strong> Typically associated with hosting infrastructure and geolocation lookups.<\/p>\n\n\n\n<p>For up-to-date insights on location or potential security concerns, it is recommended to consult dedicated IP reputation and monitoring tools, as they provide real-time information beyond static records.<\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<h2 class=\"wp-block-heading\">Why Are People Searching for This IP?<\/h2>\n\n\n\n<p>There are several common reasons why an address like 111.90.150.188 attracts attention.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">1. It Appears in Website Logs<\/h3>\n\n\n\n<p>Website owners often notice unfamiliar IP addresses in:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Access logs<\/li>\n\n\n\n<li>Admin login attempts<\/li>\n\n\n\n<li>Contact form submissions<\/li>\n\n\n\n<li>Repeated page requests<\/li>\n<\/ul>\n\n\n\n<p>If the address appears frequently, it can raise suspicion.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">2. Failed Login Attempts<\/h3>\n\n\n\n<p>Many <a href=\"https:\/\/wordpress.com\/\">WordPress<\/a>, cPanel, SSH, or admin panels record the IP address of failed login attempts. If 111.90.150.188 shows up repeatedly, it may be part of:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Automated bot traffic<\/li>\n\n\n\n<li>Credential stuffing attempts<\/li>\n\n\n\n<li>Brute-force login scans<\/li>\n<\/ul>\n\n\n\n<h3 class=\"wp-block-heading\">3. Suspicious Email Headers<\/h3>\n\n\n\n<p>If you receive spam or phishing emails, you may inspect the email header. Sometimes a sending or relay IP address is visible, leading people to search it online.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">4. Firewall or Security Alerts<\/h3>\n\n\n\n<p>Security tools such as:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Web application firewalls (WAFs)<\/li>\n\n\n\n<li>Server monitoring software<\/li>\n\n\n\n<li>CDN security logs<\/li>\n\n\n\n<li>Cloud hosting dashboards<\/li>\n<\/ul>\n\n\n\n<p>may flag certain IPs based on behaviour patterns.<\/p>\n\n\n\n<p>When users see an alert referencing 111.90.150.188, they search to determine if others have reported similar activity.<\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<h2 class=\"wp-block-heading\">Is 111.90.150.188 Dangerous?<\/h2>\n\n\n\n<p>An IP address by itself is not inherently dangerous. What matters is <strong>behaviour<\/strong>, not the number.<\/p>\n\n\n\n<p>Signs that an IP may be involved in malicious activity include:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Repeated rapid requests<\/li>\n\n\n\n<li>Attempts to access restricted areas<\/li>\n\n\n\n<li>Login brute-force patterns<\/li>\n\n\n\n<li>Scanning multiple URLs in sequence<\/li>\n\n\n\n<li>Triggering firewall rules<\/li>\n<\/ul>\n\n\n\n<p>However, automated scanning is extremely common on the modern internet. Every public website receives bot traffic daily. Not all of it is harmful\u2014search engine crawlers, uptime monitors, and data indexers also scan sites.<\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<h2 class=\"wp-block-heading\">How to Check If an IP Is Causing Issues<\/h2>\n\n\n\n<p>If you have seen 111.90.150.188 in your logs and are concerned, take these steps:<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">1. Review Access Patterns<\/h3>\n\n\n\n<p>Look for:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Frequency of requests<\/li>\n\n\n\n<li>Time intervals between hits<\/li>\n\n\n\n<li>Targeted URLs<\/li>\n\n\n\n<li>HTTP status codes (<a href=\"https:\/\/www.w3.org\/Protocols\/rfc2616\/rfc2616-sec10.html\">read more<\/a>)<\/li>\n<\/ul>\n\n\n\n<p>A few isolated visits usually mean nothing. Hundreds of rapid attempts may suggest automation.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">2. Check User Agents<\/h3>\n\n\n\n<p>Examine the user-agent string in your logs. Legitimate crawlers often identify themselves clearly. Suspicious traffic may use:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Blank user agents<\/li>\n\n\n\n<li>Generic browser strings<\/li>\n\n\n\n<li>Outdated or mismatched identifiers<\/li>\n<\/ul>\n\n\n\n<h3 class=\"wp-block-heading\">3. Use Threat Intelligence Tools<\/h3>\n\n\n\n<p>You can check IP reputation databases or threat intelligence services to see if the address has been reported elsewhere.<\/p>\n\n\n\n<p>Keep in mind:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Listings change frequently<\/li>\n\n\n\n<li>A clean status today does not guarantee future safety<\/li>\n\n\n\n<li>A flagged status does not prove malicious intent<\/li>\n<\/ul>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<h2 class=\"wp-block-heading\">Should You Block 111.90.150.188?<\/h2>\n\n\n\n<p>Blocking an IP can be appropriate if:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>It repeatedly attempts unauthorised access<\/li>\n\n\n\n<li>It triggers security rules<\/li>\n\n\n\n<li>It causes server strain<\/li>\n<\/ul>\n\n\n\n<p>However, blocking should be part of a broader security approach:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Enable rate limiting<\/li>\n\n\n\n<li>Use strong passwords<\/li>\n\n\n\n<li>Implement two-factor authentication<\/li>\n\n\n\n<li>Keep software updated<\/li>\n\n\n\n<li>Use a firewall or CDN protection layer<\/li>\n<\/ul>\n\n\n\n<p>Relying solely on IP blocking is ineffective long-term, as malicious actors often rotate addresses.<\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<h2 class=\"wp-block-heading\">Why Articles About Specific IPs Exist<\/h2>\n\n\n\n<p>You may notice many websites publishing articles about individual IP addresses. This happens because:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>People search specific IPs after seeing them in logs<\/li>\n\n\n\n<li>There is little contextual information available<\/li>\n\n\n\n<li>Users want reassurance or clarification<\/li>\n<\/ul>\n\n\n\n<p>Publishing educational content helps explain:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>What IP addresses are<\/li>\n\n\n\n<li>How internet traffic works<\/li>\n\n\n\n<li>What steps to take if concerned<\/li>\n<\/ul>\n\n\n\n<p>It also prevents misinformation and panic around unfamiliar technical details.<\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<h2 class=\"wp-block-heading\">Key Takeaways<\/h2>\n\n\n\n<ul class=\"wp-block-list\">\n<li>111.90.150.188 is simply an IPv4 address.<\/li>\n\n\n\n<li>It is part of a subnet commonly associated with hosting providers: 111.90.150.0\/23.<\/li>\n\n\n\n<li>An IP address alone does not identify a person.<\/li>\n\n\n\n<li>Seeing it in logs does not automatically mean malicious activity.<\/li>\n\n\n\n<li>Behaviour patterns matter more than the number itself.<\/li>\n\n\n\n<li>Security best practices are more effective than single-IP blocking.<\/li>\n<\/ul>\n\n\n\n<p>If you discovered 111.90.150.188 in your server logs, the most important step is to analyse behaviour rather than assume intent. The modern internet is filled with automated scanning and background traffic\u2014most websites experience it daily.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>If you have recently searched for 111.90.150.188, you are not alone. Many people look up specific IP addresses after noticing unusual activity in their website logs, firewall alerts, email headers, or analytics dashboards. When an unfamiliar IP repeatedly appears in traffic reports, login attempts, or security notifications, it is natural to want to know what [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":885,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[22],"tags":[],"class_list":["post-884","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-ip"],"blocksy_meta":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>111.90.150.188 \u2013 What This IP Address Is and Why People Are Searching for It<\/title>\n<meta name=\"description\" content=\"Discover what IP 111.90.150.188 is, its network info, usage context, and how to check for security or location concerns.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/ruby-doc.org\/blog\/111-90-150-188\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"111.90.150.188 \u2013 What This IP Address Is and Why People Are Searching for It\" \/>\n<meta property=\"og:description\" content=\"Discover what IP 111.90.150.188 is, its network info, usage context, and how to check for security or location concerns.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/ruby-doc.org\/blog\/111-90-150-188\/\" \/>\n<meta property=\"og:site_name\" content=\"Ruby-Doc.org\" \/>\n<meta property=\"article:published_time\" content=\"2026-02-16T14:44:26+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2026-02-16T14:48:33+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/ruby-doc.org\/blog\/wp-content\/uploads\/2026\/02\/111.90.150.188-scaled.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"2560\" \/>\n\t<meta property=\"og:image:height\" content=\"1438\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Ryan McGregor\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Ryan McGregor\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/ruby-doc.org\\\/blog\\\/111-90-150-188\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/ruby-doc.org\\\/blog\\\/111-90-150-188\\\/\"},\"author\":{\"name\":\"Ryan McGregor\",\"@id\":\"https:\\\/\\\/ruby-doc.org\\\/blog\\\/#\\\/schema\\\/person\\\/db7fcc3c518c40f29f8bf79ffa678dfc\"},\"headline\":\"111.90.150.188 \u2013 What This IP Address Is and Why People Are Searching for It\",\"datePublished\":\"2026-02-16T14:44:26+00:00\",\"dateModified\":\"2026-02-16T14:48:33+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/ruby-doc.org\\\/blog\\\/111-90-150-188\\\/\"},\"wordCount\":877,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/ruby-doc.org\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/ruby-doc.org\\\/blog\\\/111-90-150-188\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/ruby-doc.org\\\/blog\\\/wp-content\\\/uploads\\\/2026\\\/02\\\/111.90.150.188-scaled.jpg\",\"articleSection\":[\"IP\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/ruby-doc.org\\\/blog\\\/111-90-150-188\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/ruby-doc.org\\\/blog\\\/111-90-150-188\\\/\",\"url\":\"https:\\\/\\\/ruby-doc.org\\\/blog\\\/111-90-150-188\\\/\",\"name\":\"111.90.150.188 \u2013 What This IP Address Is and Why People Are Searching for It\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/ruby-doc.org\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/ruby-doc.org\\\/blog\\\/111-90-150-188\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/ruby-doc.org\\\/blog\\\/111-90-150-188\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/ruby-doc.org\\\/blog\\\/wp-content\\\/uploads\\\/2026\\\/02\\\/111.90.150.188-scaled.jpg\",\"datePublished\":\"2026-02-16T14:44:26+00:00\",\"dateModified\":\"2026-02-16T14:48:33+00:00\",\"description\":\"Discover what IP 111.90.150.188 is, its network info, usage context, and how to check for security or location concerns.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/ruby-doc.org\\\/blog\\\/111-90-150-188\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/ruby-doc.org\\\/blog\\\/111-90-150-188\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/ruby-doc.org\\\/blog\\\/111-90-150-188\\\/#primaryimage\",\"url\":\"https:\\\/\\\/ruby-doc.org\\\/blog\\\/wp-content\\\/uploads\\\/2026\\\/02\\\/111.90.150.188-scaled.jpg\",\"contentUrl\":\"https:\\\/\\\/ruby-doc.org\\\/blog\\\/wp-content\\\/uploads\\\/2026\\\/02\\\/111.90.150.188-scaled.jpg\",\"width\":2560,\"height\":1438,\"caption\":\"111.90.150.188\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/ruby-doc.org\\\/blog\\\/111-90-150-188\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/ruby-doc.org\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"111.90.150.188 \u2013 What This IP Address Is and Why People Are Searching for It\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/ruby-doc.org\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/ruby-doc.org\\\/blog\\\/\",\"name\":\"Ruby-Doc.org\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/ruby-doc.org\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/ruby-doc.org\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/ruby-doc.org\\\/blog\\\/#organization\",\"name\":\"Ruby-Doc.org\",\"url\":\"https:\\\/\\\/ruby-doc.org\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/ruby-doc.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/ruby-doc.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/07\\\/Ruby-Doc.org_logo_cropped.png\",\"contentUrl\":\"https:\\\/\\\/ruby-doc.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/07\\\/Ruby-Doc.org_logo_cropped.png\",\"width\":909,\"height\":833,\"caption\":\"Ruby-Doc.org\"},\"image\":{\"@id\":\"https:\\\/\\\/ruby-doc.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/ruby-doc.org\\\/blog\\\/#\\\/schema\\\/person\\\/db7fcc3c518c40f29f8bf79ffa678dfc\",\"name\":\"Ryan McGregor\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/f7b4d11da7f55d40163cd9431935ce1148d9bd69c95928064822f7757b6314dd?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/f7b4d11da7f55d40163cd9431935ce1148d9bd69c95928064822f7757b6314dd?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/f7b4d11da7f55d40163cd9431935ce1148d9bd69c95928064822f7757b6314dd?s=96&d=mm&r=g\",\"caption\":\"Ryan McGregor\"},\"url\":\"https:\\\/\\\/ruby-doc.org\\\/blog\\\/author\\\/ryan\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"111.90.150.188 \u2013 What This IP Address Is and Why People Are Searching for It","description":"Discover what IP 111.90.150.188 is, its network info, usage context, and how to check for security or location concerns.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/ruby-doc.org\/blog\/111-90-150-188\/","og_locale":"en_US","og_type":"article","og_title":"111.90.150.188 \u2013 What This IP Address Is and Why People Are Searching for It","og_description":"Discover what IP 111.90.150.188 is, its network info, usage context, and how to check for security or location concerns.","og_url":"https:\/\/ruby-doc.org\/blog\/111-90-150-188\/","og_site_name":"Ruby-Doc.org","article_published_time":"2026-02-16T14:44:26+00:00","article_modified_time":"2026-02-16T14:48:33+00:00","og_image":[{"width":2560,"height":1438,"url":"https:\/\/ruby-doc.org\/blog\/wp-content\/uploads\/2026\/02\/111.90.150.188-scaled.jpg","type":"image\/jpeg"}],"author":"Ryan McGregor","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Ryan McGregor","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/ruby-doc.org\/blog\/111-90-150-188\/#article","isPartOf":{"@id":"https:\/\/ruby-doc.org\/blog\/111-90-150-188\/"},"author":{"name":"Ryan McGregor","@id":"https:\/\/ruby-doc.org\/blog\/#\/schema\/person\/db7fcc3c518c40f29f8bf79ffa678dfc"},"headline":"111.90.150.188 \u2013 What This IP Address Is and Why People Are Searching for It","datePublished":"2026-02-16T14:44:26+00:00","dateModified":"2026-02-16T14:48:33+00:00","mainEntityOfPage":{"@id":"https:\/\/ruby-doc.org\/blog\/111-90-150-188\/"},"wordCount":877,"commentCount":0,"publisher":{"@id":"https:\/\/ruby-doc.org\/blog\/#organization"},"image":{"@id":"https:\/\/ruby-doc.org\/blog\/111-90-150-188\/#primaryimage"},"thumbnailUrl":"https:\/\/ruby-doc.org\/blog\/wp-content\/uploads\/2026\/02\/111.90.150.188-scaled.jpg","articleSection":["IP"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/ruby-doc.org\/blog\/111-90-150-188\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/ruby-doc.org\/blog\/111-90-150-188\/","url":"https:\/\/ruby-doc.org\/blog\/111-90-150-188\/","name":"111.90.150.188 \u2013 What This IP Address Is and Why People Are Searching for It","isPartOf":{"@id":"https:\/\/ruby-doc.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/ruby-doc.org\/blog\/111-90-150-188\/#primaryimage"},"image":{"@id":"https:\/\/ruby-doc.org\/blog\/111-90-150-188\/#primaryimage"},"thumbnailUrl":"https:\/\/ruby-doc.org\/blog\/wp-content\/uploads\/2026\/02\/111.90.150.188-scaled.jpg","datePublished":"2026-02-16T14:44:26+00:00","dateModified":"2026-02-16T14:48:33+00:00","description":"Discover what IP 111.90.150.188 is, its network info, usage context, and how to check for security or location concerns.","breadcrumb":{"@id":"https:\/\/ruby-doc.org\/blog\/111-90-150-188\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/ruby-doc.org\/blog\/111-90-150-188\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/ruby-doc.org\/blog\/111-90-150-188\/#primaryimage","url":"https:\/\/ruby-doc.org\/blog\/wp-content\/uploads\/2026\/02\/111.90.150.188-scaled.jpg","contentUrl":"https:\/\/ruby-doc.org\/blog\/wp-content\/uploads\/2026\/02\/111.90.150.188-scaled.jpg","width":2560,"height":1438,"caption":"111.90.150.188"},{"@type":"BreadcrumbList","@id":"https:\/\/ruby-doc.org\/blog\/111-90-150-188\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/ruby-doc.org\/blog\/"},{"@type":"ListItem","position":2,"name":"111.90.150.188 \u2013 What This IP Address Is and Why People Are Searching for It"}]},{"@type":"WebSite","@id":"https:\/\/ruby-doc.org\/blog\/#website","url":"https:\/\/ruby-doc.org\/blog\/","name":"Ruby-Doc.org","description":"","publisher":{"@id":"https:\/\/ruby-doc.org\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/ruby-doc.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/ruby-doc.org\/blog\/#organization","name":"Ruby-Doc.org","url":"https:\/\/ruby-doc.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/ruby-doc.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/ruby-doc.org\/blog\/wp-content\/uploads\/2025\/07\/Ruby-Doc.org_logo_cropped.png","contentUrl":"https:\/\/ruby-doc.org\/blog\/wp-content\/uploads\/2025\/07\/Ruby-Doc.org_logo_cropped.png","width":909,"height":833,"caption":"Ruby-Doc.org"},"image":{"@id":"https:\/\/ruby-doc.org\/blog\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/ruby-doc.org\/blog\/#\/schema\/person\/db7fcc3c518c40f29f8bf79ffa678dfc","name":"Ryan McGregor","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/f7b4d11da7f55d40163cd9431935ce1148d9bd69c95928064822f7757b6314dd?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/f7b4d11da7f55d40163cd9431935ce1148d9bd69c95928064822f7757b6314dd?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/f7b4d11da7f55d40163cd9431935ce1148d9bd69c95928064822f7757b6314dd?s=96&d=mm&r=g","caption":"Ryan McGregor"},"url":"https:\/\/ruby-doc.org\/blog\/author\/ryan\/"}]}},"_links":{"self":[{"href":"https:\/\/ruby-doc.org\/blog\/wp-json\/wp\/v2\/posts\/884","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/ruby-doc.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/ruby-doc.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/ruby-doc.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/ruby-doc.org\/blog\/wp-json\/wp\/v2\/comments?post=884"}],"version-history":[{"count":2,"href":"https:\/\/ruby-doc.org\/blog\/wp-json\/wp\/v2\/posts\/884\/revisions"}],"predecessor-version":[{"id":887,"href":"https:\/\/ruby-doc.org\/blog\/wp-json\/wp\/v2\/posts\/884\/revisions\/887"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/ruby-doc.org\/blog\/wp-json\/wp\/v2\/media\/885"}],"wp:attachment":[{"href":"https:\/\/ruby-doc.org\/blog\/wp-json\/wp\/v2\/media?parent=884"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/ruby-doc.org\/blog\/wp-json\/wp\/v2\/categories?post=884"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/ruby-doc.org\/blog\/wp-json\/wp\/v2\/tags?post=884"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}