Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Germany

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 147.142.153.196
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 8705
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;147.142.153.196.		IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025022201 1800 900 604800 86400

;; Query time: 17 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Feb 23 04:13:06 CST 2025
;; MSG SIZE  rcvd: 108
Host info
196.153.142.147.in-addr.arpa domain name pointer dhcp653-196.laptop-wlc.uni-heidelberg.de.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
196.153.142.147.in-addr.arpa	name = dhcp653-196.laptop-wlc.uni-heidelberg.de.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
34.68.146.105 attackspam
Sep  2 05:23:07 vmd26974 sshd[15746]: Failed password for root from 34.68.146.105 port 56136 ssh2
Sep  2 05:54:50 vmd26974 sshd[29128]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=34.68.146.105
...
2020-09-02 13:34:56
129.28.185.31 attackbots
Invalid user admin from 129.28.185.31 port 55870
2020-09-02 13:18:46
139.155.30.122 attack
Invalid user john from 139.155.30.122 port 50670
2020-09-02 13:47:46
54.37.86.192 attack
Invalid user ubuntu from 54.37.86.192 port 49962
2020-09-02 13:49:50
92.195.107.89 attackspambots
SSH/22 MH Probe, BF, Hack -
2020-09-02 13:35:14
192.3.139.56 attackspam
Unauthorized connection attempt detected from IP address 192.3.139.56 to port 3123 [T]
2020-09-02 13:40:09
222.209.247.203 attackspambots
SSH/22 MH Probe, BF, Hack -
2020-09-02 13:43:20
68.183.12.127 attackbots
Failed password for invalid user ke from 68.183.12.127 port 49616 ssh2
2020-09-02 13:14:06
91.121.183.9 attackspambots
91.121.183.9 - - [02/Sep/2020:06:25:55 +0100] "POST /wp-login.php HTTP/1.1" 200 5957 "-" "Mozilla/5.0 (Windows NT 10.0; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/46.0.2490.80 Safari/537.36"
91.121.183.9 - - [02/Sep/2020:06:28:56 +0100] "POST /wp-login.php HTTP/1.1" 200 5957 "-" "Mozilla/5.0 (Windows NT 10.0; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/46.0.2490.80 Safari/537.36"
91.121.183.9 - - [02/Sep/2020:06:31:58 +0100] "POST /wp-login.php HTTP/1.1" 200 5957 "-" "Mozilla/5.0 (Windows NT 10.0; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/46.0.2490.80 Safari/537.36"
...
2020-09-02 13:38:29
198.199.72.47 attackbotsspam
Port scan: Attack repeated for 24 hours
2020-09-02 13:28:27
107.175.33.19 attack
Invalid user fake from 107.175.33.19 port 35873
2020-09-02 13:16:05
159.89.145.59 attackbotsspam
 TCP (SYN) 159.89.145.59:54924 -> port 24869, len 44
2020-09-02 13:37:59
35.134.241.168 attackspambots
(sshd) Failed SSH login from 35.134.241.168 (US/United States/-): 5 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: Sep  1 12:47:28 server4 sshd[18294]: Invalid user admin from 35.134.241.168
Sep  1 12:47:31 server4 sshd[18294]: Failed password for invalid user admin from 35.134.241.168 port 36928 ssh2
Sep  1 12:47:31 server4 sshd[18304]: Invalid user admin from 35.134.241.168
Sep  1 12:47:33 server4 sshd[18304]: Failed password for invalid user admin from 35.134.241.168 port 36995 ssh2
Sep  1 12:47:34 server4 sshd[18308]: Invalid user admin from 35.134.241.168
2020-09-02 13:22:20
101.78.149.142 attackbotsspam
2020-09-02 00:05:58.128199-0500  localhost sshd[55453]: Failed password for invalid user gal from 101.78.149.142 port 42126 ssh2
2020-09-02 13:25:27
51.38.186.180 attack
Invalid user reward from 51.38.186.180 port 54087
2020-09-02 13:17:15

Recently Reported IPs

83.138.236.110 24.86.129.76 155.86.114.213 213.16.246.25
174.109.119.238 13.72.63.110 197.103.32.118 223.105.144.208
176.66.4.44 98.131.242.163 61.60.69.109 164.12.157.200
15.141.113.232 47.15.92.231 248.216.163.150 211.147.62.164
224.150.161.235 213.136.254.103 130.79.20.239 146.65.135.8