Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Oldetrijne

Region: Friesland

Country: Netherlands

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
IP Type Details Datetime
147.12.145.35 attackbotsspam
Sep 22 05:10:30 roki-contabo sshd\[28671\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=147.12.145.35  user=root
Sep 22 05:10:32 roki-contabo sshd\[28671\]: Failed password for root from 147.12.145.35 port 54146 ssh2
Sep 22 14:01:02 roki-contabo sshd\[17813\]: Invalid user pi from 147.12.145.35
Sep 22 14:01:02 roki-contabo sshd\[17813\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=147.12.145.35
Sep 22 14:01:05 roki-contabo sshd\[17813\]: Failed password for invalid user pi from 147.12.145.35 port 40331 ssh2
...
2020-09-23 02:50:42
147.12.145.35 attackbots
Brute-force attempt banned
2020-09-22 18:58:39
147.12.145.127 attack
Unauthorized connection attempt detected from IP address 147.12.145.127 to port 5555 [J]
2020-03-02 22:57:57
147.12.145.68 attack
Port probing on unauthorized port 23
2020-02-09 16:03:56
147.12.145.29 attackspam
Unauthorized connection attempt detected from IP address 147.12.145.29 to port 5555 [J]
2020-01-26 02:39:11
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 147.12.14.2
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 62050
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;147.12.14.2.			IN	A

;; AUTHORITY SECTION:
.			402	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2023010200 1800 900 604800 86400

;; Query time: 148 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Jan 02 17:36:48 CST 2023
;; MSG SIZE  rcvd: 104
Host info
2.14.12.147.in-addr.arpa domain name pointer www.kabelnoord.nl.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
2.14.12.147.in-addr.arpa	name = www.kabelnoord.nl.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
103.220.47.34 attackbots
Invalid user ari from 103.220.47.34 port 41678
2020-08-21 12:09:00
123.31.26.130 attack
Invalid user has from 123.31.26.130 port 59184
2020-08-21 12:08:18
59.108.53.146 attack
Invalid user veeam from 59.108.53.146 port 38980
2020-08-21 12:03:54
45.225.92.93 attack
Aug 20 19:18:39 Host-KEWR-E sshd[18111]: Disconnected from invalid user www 45.225.92.93 port 43734 [preauth]
...
2020-08-21 08:03:24
129.204.205.125 attackbots
Aug 20 11:16:33 XXX sshd[34199]: Invalid user alvin from 129.204.205.125 port 59546
2020-08-21 08:11:27
80.67.172.162 attack
Aug 21 01:34:27 nas sshd[6529]: Failed password for root from 80.67.172.162 port 34910 ssh2
Aug 21 01:34:30 nas sshd[6529]: Failed password for root from 80.67.172.162 port 34910 ssh2
Aug 21 01:34:35 nas sshd[6529]: Failed password for root from 80.67.172.162 port 34910 ssh2
Aug 21 01:34:39 nas sshd[6529]: Failed password for root from 80.67.172.162 port 34910 ssh2
...
2020-08-21 08:09:48
124.238.113.126 attackspam
Invalid user login from 124.238.113.126 port 39954
2020-08-21 12:03:25
182.74.86.27 attackspambots
Invalid user cym from 182.74.86.27 port 37658
2020-08-21 12:06:46
167.99.93.5 attack
2020-08-20T18:10:01.021839morrigan.ad5gb.com sshd[1217191]: Failed password for root from 167.99.93.5 port 60984 ssh2
2020-08-20T18:10:01.614815morrigan.ad5gb.com sshd[1217191]: Disconnected from authenticating user root 167.99.93.5 port 60984 [preauth]
2020-08-21 08:06:46
181.223.64.154 attackbots
Invalid user vps from 181.223.64.154 port 44038
2020-08-21 08:10:57
185.220.103.5 attackbotsspam
Aug 20 23:48:59 vpn01 sshd[8220]: Failed password for root from 185.220.103.5 port 46682 ssh2
Aug 20 23:49:09 vpn01 sshd[8220]: Failed password for root from 185.220.103.5 port 46682 ssh2
...
2020-08-21 08:10:26
121.32.26.105 attackspambots
k+ssh-bruteforce
2020-08-21 08:18:35
193.27.228.177 attackspam
port
2020-08-21 08:24:12
80.82.70.118 attack
Icarus honeypot on github
2020-08-21 08:09:35
98.109.110.110 attackbots
Port Scan detected!
...
2020-08-21 12:09:28

Recently Reported IPs

147.140.182.74 146.237.212.224 144.87.246.219 144.2.105.149
144.173.184.159 143.52.21.184 143.145.26.105 142.76.108.37
142.148.192.108 141.96.132.174 142.13.78.78 140.243.240.186
141.231.78.128 140.200.120.169 14.204.251.241 14.187.125.212
138.42.71.157 138.55.215.89 10.143.133.43 138.125.188.62