Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States of America (the)

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 147.106.48.145
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 31805
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;147.106.48.145.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025012300 1800 900 604800 86400

;; Query time: 16 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Jan 24 01:53:16 CST 2025
;; MSG SIZE  rcvd: 107
Host info
Host 145.48.106.147.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 145.48.106.147.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
125.25.82.179 attack
Unauthorised access (Oct 21) SRC=125.25.82.179 LEN=52 TTL=114 ID=1240 DF TCP DPT=445 WINDOW=8192 SYN 
Unauthorised access (Oct 21) SRC=125.25.82.179 LEN=52 TTL=115 ID=12008 DF TCP DPT=445 WINDOW=8192 SYN
2019-10-21 17:55:41
218.92.0.211 attackspambots
Oct 21 11:59:46 MainVPS sshd[2968]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.211  user=root
Oct 21 11:59:48 MainVPS sshd[2968]: Failed password for root from 218.92.0.211 port 34108 ssh2
Oct 21 12:00:19 MainVPS sshd[22329]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.211  user=root
Oct 21 12:00:21 MainVPS sshd[22329]: Failed password for root from 218.92.0.211 port 61568 ssh2
Oct 21 12:00:55 MainVPS sshd[14520]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.211  user=root
Oct 21 12:00:57 MainVPS sshd[14520]: Failed password for root from 218.92.0.211 port 56391 ssh2
...
2019-10-21 18:09:38
104.144.45.176 attack
(From edwardfleetwood1@gmail.com) Hello there!

I'm a freelance digital marketing specialist who provides SEO services that can improve your search rankings. The boost in your ranking on Google search results will result in getting more unique visits from potential clients on your website, thus making the search engines like Google consider you as a more trusted website. This eventually leads to better credibility and more sales. 

If you're interested, I'll give you a free consultation to inform you about where your site currently stands, what can be done and what to expect once the site has been optimized. Please let me know what you think. I hope to speak with you soon. 

Best regards,
Edward Fleetwood
2019-10-21 18:04:31
91.121.103.175 attackspam
Oct 20 17:55:56 hanapaa sshd\[15110\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=ns354139.ip-91-121-103.eu  user=root
Oct 20 17:55:58 hanapaa sshd\[15110\]: Failed password for root from 91.121.103.175 port 40766 ssh2
Oct 20 18:01:55 hanapaa sshd\[15579\]: Invalid user powerapp from 91.121.103.175
Oct 20 18:01:55 hanapaa sshd\[15579\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=ns354139.ip-91-121-103.eu
Oct 20 18:01:57 hanapaa sshd\[15579\]: Failed password for invalid user powerapp from 91.121.103.175 port 50596 ssh2
2019-10-21 18:30:03
159.65.230.189 attack
2019-10-21T06:03:41.794179abusebot-6.cloudsearch.cf sshd\[7063\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.65.230.189  user=root
2019-10-21 18:23:43
106.13.87.145 attack
Oct 21 03:59:15 firewall sshd[24888]: Invalid user tomcat from 106.13.87.145
Oct 21 03:59:17 firewall sshd[24888]: Failed password for invalid user tomcat from 106.13.87.145 port 59526 ssh2
Oct 21 04:03:59 firewall sshd[24990]: Invalid user spamfilter from 106.13.87.145
...
2019-10-21 18:21:57
88.199.101.103 attack
Oct 21 08:44:09 anodpoucpklekan sshd[5241]: Invalid user aracelis from 88.199.101.103 port 41720
...
2019-10-21 18:05:21
179.99.113.27 attackspam
Unauthorised access (Oct 21) SRC=179.99.113.27 LEN=40 TOS=0x10 PREC=0x40 TTL=240 ID=3772 DF TCP DPT=8080 WINDOW=14600 SYN
2019-10-21 18:17:37
192.42.116.19 attackbots
Oct 21 11:07:17 rotator sshd\[31927\]: Failed password for root from 192.42.116.19 port 45250 ssh2Oct 21 11:07:20 rotator sshd\[31927\]: Failed password for root from 192.42.116.19 port 45250 ssh2Oct 21 11:07:22 rotator sshd\[31927\]: Failed password for root from 192.42.116.19 port 45250 ssh2Oct 21 11:07:25 rotator sshd\[31927\]: Failed password for root from 192.42.116.19 port 45250 ssh2Oct 21 11:07:28 rotator sshd\[31927\]: Failed password for root from 192.42.116.19 port 45250 ssh2Oct 21 11:07:31 rotator sshd\[31927\]: Failed password for root from 192.42.116.19 port 45250 ssh2
...
2019-10-21 18:24:52
128.199.138.31 attack
Oct 21 10:17:14 icinga sshd[17559]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.199.138.31
Oct 21 10:17:15 icinga sshd[17559]: Failed password for invalid user Woodmere from 128.199.138.31 port 41078 ssh2
...
2019-10-21 17:55:12
49.88.112.70 attackspam
Oct 21 11:26:21 MK-Soft-VM5 sshd[23578]: Failed password for root from 49.88.112.70 port 44629 ssh2
Oct 21 11:26:24 MK-Soft-VM5 sshd[23578]: Failed password for root from 49.88.112.70 port 44629 ssh2
...
2019-10-21 18:10:31
51.254.129.128 attackbotsspam
Oct 21 08:28:05 SilenceServices sshd[6646]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.254.129.128
Oct 21 08:28:07 SilenceServices sshd[6646]: Failed password for invalid user youli from 51.254.129.128 port 37774 ssh2
Oct 21 08:31:55 SilenceServices sshd[7740]: Failed password for gnats from 51.254.129.128 port 57059 ssh2
2019-10-21 18:21:28
42.104.97.238 attackbots
Oct 21 00:08:06 ny01 sshd[19935]: Failed password for root from 42.104.97.238 port 52215 ssh2
Oct 21 00:11:25 ny01 sshd[20657]: Failed password for root from 42.104.97.238 port 8364 ssh2
Oct 21 00:14:36 ny01 sshd[20946]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=42.104.97.238
2019-10-21 18:22:32
45.146.203.180 attackbots
Postfix DNSBL listed. Trying to send SPAM.
2019-10-21 18:00:53
175.158.40.97 attackbots
Unauthorised access (Oct 21) SRC=175.158.40.97 LEN=44 TTL=44 ID=58412 TCP DPT=23 WINDOW=6458 SYN
2019-10-21 18:15:46

Recently Reported IPs

42.165.217.18 229.42.113.10 14.93.123.151 237.43.181.232
79.57.223.37 151.14.221.65 255.102.124.22 127.153.246.249
252.176.19.144 195.221.35.38 200.199.113.27 46.108.7.243
188.201.48.162 50.81.254.252 171.175.41.173 229.78.127.17
27.54.228.150 119.117.212.12 99.22.151.12 57.114.171.236