Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Australia

Internet Service Provider: Telstra

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 137.147.234.242
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 12173
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;137.147.234.242.		IN	A

;; AUTHORITY SECTION:
.			557	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2020041702 1800 900 604800 86400

;; Query time: 98 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Apr 18 06:13:54 CST 2020
;; MSG SIZE  rcvd: 119
Host info
242.234.147.137.in-addr.arpa domain name pointer cpe-137-147-234-242.bpw5-r-037.win.vic.bigpond.net.au.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
242.234.147.137.in-addr.arpa	name = cpe-137-147-234-242.bpw5-r-037.win.vic.bigpond.net.au.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
27.71.85.223 attack
failed password atempts
2023-12-24 09:36:05
185.110.56.133 attack
Scan port
2024-01-25 17:13:30
2001:0002:14:5:1:2:bf35:2610 spambotsattackproxynormal
Checking online
2024-01-29 02:13:06
111.90.150.188 spambotsattackproxynormal
Yaa
2024-01-04 06:31:10
188.130.137.228 attack
I got hacked by this person
2023-12-17 17:28:17
185.63.253.200 spambotsattackproxynormal
+62 822-6614-1074
2024-02-10 01:31:34
185.161.248.193 attack
Scan port
2024-01-05 14:03:20
87.70.41.55 botsattack
hacking
2024-02-14 13:58:47
149.18.30.244 spam
Stop logging in my accounts lil bro
2024-02-12 17:52:20
111.90.150.188 spambotsattackproxy
Bokep indonesia
2024-01-23 08:58:56
196.189.37.186 normal
itap
2024-01-30 20:29:50
45.128.232.108 attack
This indicates that someone may be attempting to exploit an application's vulnerabilities.
Detection Category
DShield
Signature
ET DROP Dshield Block Listed Source group 1
2024-02-09 15:51:20
90.151.171.106 botsattack
Scan port
2024-02-16 13:23:24
23.26.254.91 attack
NTP DDoS
2023-12-15 13:48:21
103.208.200.86 attack
Client IP: 103.208.200.86
Attack ID: 20000022
Message ID: 099312035727
2024-02-02 14:44:37

Recently Reported IPs

2a02:598:aaaa:2::8065 117.5.120.197 14.146.94.223 114.239.17.157
54.160.50.223 172.41.21.78 34.92.43.30 80.57.27.193
50.51.29.149 37.221.94.224 205.182.140.8 192.115.115.196
123.126.11.242 189.58.130.213 173.114.50.184 76.254.206.121
202.99.246.65 103.247.183.24 173.30.7.224 58.240.130.162