Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Singapore

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 147.145.2.147
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 2614
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;147.145.2.147.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025021301 1800 900 604800 86400

;; Query time: 37 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 14 13:13:10 CST 2025
;; MSG SIZE  rcvd: 106
Host info
Host 147.2.145.147.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 147.2.145.147.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
159.203.197.154 attackspam
proto=tcp  .  spt=48858  .  dpt=3389  .  src=159.203.197.154  .  dst=xx.xx.4.1  .     (Listed on    abuseat-org plus zen-spamhaus and rbldns-ru)     (884)
2019-11-10 05:08:52
3.124.221.134 attackbotsspam
Brute forcing RDP port 3389
2019-11-10 05:22:55
1.1.230.30 attackbots
Unauthorized connection attempt from IP address 1.1.230.30 on Port 445(SMB)
2019-11-10 04:53:59
188.17.61.170 attackbots
Chat Spam
2019-11-10 05:06:22
183.222.71.110 attack
PHP DIESCAN Information Disclosure Vulnerability
2019-11-10 04:59:57
115.74.227.101 attackbots
Unauthorized connection attempt from IP address 115.74.227.101 on Port 445(SMB)
2019-11-10 05:07:10
179.57.127.142 attack
Unauthorized connection attempt from IP address 179.57.127.142 on Port 445(SMB)
2019-11-10 05:02:30
71.6.167.142 attackspam
3389BruteforceFW21
2019-11-10 05:23:52
185.129.194.31 attack
Unauthorized connection attempt from IP address 185.129.194.31 on Port 445(SMB)
2019-11-10 05:07:32
93.61.124.33 attackspambots
ECShop Remote Code Execution Vulnerability
2019-11-10 04:58:56
222.186.173.201 attackspambots
SSH Brute Force, server-1 sshd[27952]: Failed password for root from 222.186.173.201 port 3584 ssh2
2019-11-10 04:51:10
77.39.9.14 attackbotsspam
Unauthorized connection attempt from IP address 77.39.9.14 on Port 445(SMB)
2019-11-10 04:47:18
116.0.49.252 attack
Unauthorized connection attempt from IP address 116.0.49.252 on Port 445(SMB)
2019-11-10 04:51:59
206.174.214.90 attackspambots
Failed password for root from 206.174.214.90 port 38178 ssh2
2019-11-10 05:10:32
103.86.43.27 attackspambots
Chat Spam
2019-11-10 05:19:46

Recently Reported IPs

117.139.97.162 163.150.232.19 89.80.64.226 24.215.6.45
219.65.211.113 215.87.253.242 130.245.138.19 123.30.219.201
245.140.43.206 77.38.148.23 51.48.19.200 246.150.207.181
217.116.68.177 132.255.210.134 221.101.170.241 118.178.216.143
138.160.70.189 255.115.168.9 185.32.189.246 133.84.247.23