Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States of America (the)

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 147.164.130.104
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 15096
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;147.164.130.104.		IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025020601 1800 900 604800 86400

;; Query time: 42 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 07 05:21:45 CST 2025
;; MSG SIZE  rcvd: 108
Host info
Host 104.130.164.147.in-addr.arpa not found: 2(SERVFAIL)
Nslookup info:
server can't find 147.164.130.104.in-addr.arpa: SERVFAIL
Related IP info:
Related comments:
IP Type Details Datetime
106.51.37.107 attackbotsspam
(sshd) Failed SSH login from 106.51.37.107 (IN/India/Karnataka/Bengaluru/broadband.actcorp.in/[AS24309 Atria Convergence Technologies Pvt. Ltd. Broadband Internet Service Provider INDIA]): 1 in the last 3600 secs
2019-11-22 14:45:35
197.45.155.12 attack
Invalid user vasselin from 197.45.155.12 port 37827
pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=197.45.155.12
Failed password for invalid user vasselin from 197.45.155.12 port 37827 ssh2
Invalid user rollans from 197.45.155.12 port 55682
pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=197.45.155.12
2019-11-22 14:20:24
51.255.35.41 attackbots
Nov 22 07:54:12 server sshd\[10668\]: Invalid user drolet from 51.255.35.41 port 46589
Nov 22 07:54:12 server sshd\[10668\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.255.35.41
Nov 22 07:54:14 server sshd\[10668\]: Failed password for invalid user drolet from 51.255.35.41 port 46589 ssh2
Nov 22 07:57:37 server sshd\[31568\]: Invalid user changeme from 51.255.35.41 port 36134
Nov 22 07:57:37 server sshd\[31568\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.255.35.41
2019-11-22 14:14:21
194.67.214.197 attackspambots
Nov 22 06:04:09 raspberrypi sshd\[29280\]: Invalid user testuser from 194.67.214.197 port 32796
Nov 22 06:04:10 raspberrypi sshd\[29284\]: Invalid user timemachine from 194.67.214.197 port 32854
Nov 22 06:04:10 raspberrypi sshd\[29288\]: Invalid user ubnt from 194.67.214.197 port 32874
...
2019-11-22 14:18:22
160.116.0.26 attackbots
Automatic report - Banned IP Access
2019-11-22 14:11:55
222.186.175.215 attackbots
Nov 22 07:43:19 MK-Soft-Root1 sshd[15455]: Failed password for root from 222.186.175.215 port 26352 ssh2
Nov 22 07:43:23 MK-Soft-Root1 sshd[15455]: Failed password for root from 222.186.175.215 port 26352 ssh2
...
2019-11-22 14:46:35
138.197.143.221 attack
2019-11-22T05:58:29.430777abusebot-4.cloudsearch.cf sshd\[2717\]: Invalid user omc123 from 138.197.143.221 port 49392
2019-11-22 14:03:56
177.43.59.241 attack
Nov 22 06:05:27 vtv3 sshd[23114]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=177.43.59.241 
Nov 22 06:05:29 vtv3 sshd[23114]: Failed password for invalid user sandmel from 177.43.59.241 port 59218 ssh2
Nov 22 06:11:31 vtv3 sshd[25275]: Failed password for root from 177.43.59.241 port 48950 ssh2
Nov 22 06:22:23 vtv3 sshd[29304]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=177.43.59.241 
Nov 22 06:22:25 vtv3 sshd[29304]: Failed password for invalid user named from 177.43.59.241 port 56634 ssh2
Nov 22 06:27:28 vtv3 sshd[31276]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=177.43.59.241 
Nov 22 06:37:53 vtv3 sshd[2787]: Failed password for root from 177.43.59.241 port 54041 ssh2
Nov 22 06:42:54 vtv3 sshd[4616]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=177.43.59.241 
Nov 22 06:42:56 vtv3 sshd[4616]: Failed password for invalid user nfs fr
2019-11-22 14:49:45
159.203.201.145 attack
scan z
2019-11-22 14:26:42
117.83.54.27 attackspambots
Nov 22 13:54:57 mx1 postfix/smtpd\[6734\]: warning: unknown\[117.83.54.27\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6Nov 22 13:55:11 mx1 postfix/smtpd\[6710\]: warning: unknown\[117.83.54.27\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6Nov 22 13:55:23 mx1 postfix/smtpd\[6705\]: warning: unknown\[117.83.54.27\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
...
2019-11-22 14:08:53
193.93.192.49 attackbotsspam
B: Magento admin pass test (wrong country)
2019-11-22 14:10:55
85.172.13.206 attack
Nov 22 07:41:28 vps691689 sshd[12282]: Failed password for root from 85.172.13.206 port 37091 ssh2
Nov 22 07:45:19 vps691689 sshd[12359]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=85.172.13.206
...
2019-11-22 14:47:55
187.167.203.162 attackbots
MultiHost/MultiPort Probe, Scan, Hack -
2019-11-22 14:05:50
129.204.95.39 attackbots
SSH bruteforce
2019-11-22 14:23:18
60.250.149.19 attackbotsspam
2019-11-22T06:55:32.838242  sshd[32101]: Invalid user Dennis from 60.250.149.19 port 52243
2019-11-22T06:55:32.852988  sshd[32101]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=60.250.149.19
2019-11-22T06:55:32.838242  sshd[32101]: Invalid user Dennis from 60.250.149.19 port 52243
2019-11-22T06:55:34.399366  sshd[32101]: Failed password for invalid user Dennis from 60.250.149.19 port 52243 ssh2
2019-11-22T07:00:08.856949  sshd[32207]: Invalid user miyazawa from 60.250.149.19 port 37422
...
2019-11-22 14:28:49

Recently Reported IPs

144.54.107.149 25.63.39.111 163.229.55.163 201.28.23.61
65.13.103.243 26.239.112.233 120.21.255.246 205.242.111.82
52.213.138.130 78.181.135.151 50.217.233.192 153.71.94.96
42.39.32.248 217.11.121.80 210.207.26.60 176.204.65.242
180.65.243.233 137.80.242.182 172.171.4.143 210.161.119.64