Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United Kingdom of Great Britain and Northern Ireland (the)

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 147.149.245.240
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 38730
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;147.149.245.240.		IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025021500 1800 900 604800 86400

;; Query time: 54 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Feb 15 18:47:46 CST 2025
;; MSG SIZE  rcvd: 108
Host info
Host 240.245.149.147.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 240.245.149.147.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
145.239.196.248 attackspambots
...
2020-02-02 01:48:55
144.91.119.49 attackbots
...
2020-02-02 02:00:05
170.210.214.50 attackbots
Unauthorized connection attempt detected from IP address 170.210.214.50 to port 2220 [J]
2020-02-02 02:29:13
144.217.243.216 attackspam
Unauthorized connection attempt detected from IP address 144.217.243.216 to port 2220 [J]
2020-02-02 02:29:37
218.92.0.212 attackspambots
Feb  1 19:18:18 MainVPS sshd[21336]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.212  user=root
Feb  1 19:18:21 MainVPS sshd[21336]: Failed password for root from 218.92.0.212 port 64905 ssh2
Feb  1 19:18:32 MainVPS sshd[21336]: error: maximum authentication attempts exceeded for root from 218.92.0.212 port 64905 ssh2 [preauth]
Feb  1 19:18:18 MainVPS sshd[21336]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.212  user=root
Feb  1 19:18:21 MainVPS sshd[21336]: Failed password for root from 218.92.0.212 port 64905 ssh2
Feb  1 19:18:32 MainVPS sshd[21336]: error: maximum authentication attempts exceeded for root from 218.92.0.212 port 64905 ssh2 [preauth]
Feb  1 19:18:39 MainVPS sshd[22245]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.212  user=root
Feb  1 19:18:40 MainVPS sshd[22245]: Failed password for root from 218.92.0.212 port 32760 ssh2
...
2020-02-02 02:20:17
144.48.110.182 attack
...
2020-02-02 02:05:57
122.155.11.89 attackspambots
Unauthorized connection attempt detected from IP address 122.155.11.89 to port 2220 [J]
2020-02-02 01:49:22
41.231.56.98 attackbots
Unauthorized connection attempt detected from IP address 41.231.56.98 to port 22 [J]
2020-02-02 01:56:45
144.91.102.190 attack
...
2020-02-02 02:01:25
144.217.42.212 attack
...
2020-02-02 02:25:51
145.239.11.235 attackspambots
Unauthorized connection attempt detected from IP address 145.239.11.235 to port 2220 [J]
2020-02-02 01:51:09
121.241.244.92 attack
Invalid user user from 121.241.244.92 port 57952
pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.241.244.92
Failed password for invalid user user from 121.241.244.92 port 57952 ssh2
Invalid user redmine from 121.241.244.92 port 52872
pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.241.244.92
Failed password for invalid user redmine from 121.241.244.92 port 52872 ssh2
2020-02-02 01:55:56
193.29.15.96 attack
193.29.15.96 was recorded 5 times by 5 hosts attempting to connect to the following ports: 123. Incident counter (4h, 24h, all-time): 5, 5, 33
2020-02-02 02:13:53
112.120.166.11 attack
Unauthorized connection attempt detected from IP address 112.120.166.11 to port 5555 [J]
2020-02-02 02:30:19
5.116.149.54 attackspambots
445/tcp
[2020-02-01]1pkt
2020-02-02 02:22:07

Recently Reported IPs

240.251.227.200 211.183.57.64 62.93.153.227 79.237.43.139
165.227.51.56 189.226.113.226 116.129.226.227 236.165.227.251
85.239.198.99 82.20.103.141 60.200.57.37 186.87.209.229
66.48.101.149 17.63.116.73 240.63.82.94 176.9.196.10
84.85.1.238 5.33.184.222 215.75.28.200 230.114.137.89