Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Los Angeles

Region: California

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: DirecTV Operations

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:

; <<>> DiG 9.10.3-P4-Ubuntu <<>> 147.21.64.112
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 51819
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;147.21.64.112.			IN	A

;; AUTHORITY SECTION:
.			3600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019061201 1800 900 604800 86400

;; Query time: 3 msec
;; SERVER: 67.207.67.2#53(67.207.67.2)
;; WHEN: Thu Jun 13 12:09:08 CST 2019
;; MSG SIZE  rcvd: 117

Host info
Host 112.64.21.147.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		67.207.67.2
Address:	67.207.67.2#53

** server can't find 112.64.21.147.in-addr.arpa: NXDOMAIN

Related IP info:
Related comments:
IP Type Details Datetime
45.228.253.210 attack
Automatic report - Port Scan Attack
2019-12-01 02:27:55
49.207.100.177 attackspambots
Brute force SMTP login attempted.
...
2019-12-01 02:49:49
51.255.174.164 attackbotsspam
Nov 30 16:30:39 venus sshd\[10569\]: Invalid user ggggggg from 51.255.174.164 port 42188
Nov 30 16:30:39 venus sshd\[10569\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.255.174.164
Nov 30 16:30:41 venus sshd\[10569\]: Failed password for invalid user ggggggg from 51.255.174.164 port 42188 ssh2
...
2019-12-01 02:39:43
91.215.244.12 attackbotsspam
Nov 30 08:14:58 kapalua sshd\[20718\]: Invalid user zhongmin from 91.215.244.12
Nov 30 08:14:58 kapalua sshd\[20718\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=91.215.244.12
Nov 30 08:15:00 kapalua sshd\[20718\]: Failed password for invalid user zhongmin from 91.215.244.12 port 59564 ssh2
Nov 30 08:18:06 kapalua sshd\[20917\]: Invalid user gggggggggg from 91.215.244.12
Nov 30 08:18:06 kapalua sshd\[20917\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=91.215.244.12
2019-12-01 02:28:52
112.85.42.177 attackbots
Nov 30 19:25:12 dedicated sshd[19160]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.85.42.177  user=root
Nov 30 19:25:14 dedicated sshd[19160]: Failed password for root from 112.85.42.177 port 30467 ssh2
2019-12-01 02:34:44
64.53.14.211 attackspambots
Nov 30 14:33:14 *** sshd[14722]: Invalid user leslee from 64.53.14.211
2019-12-01 02:39:31
191.250.215.132 attackbots
Nov 30 14:48:08 *** sshd[10754]: Address 191.250.215.132 maps to 191.250.215.132.dynamic.adsl.gvt.net.br, but this does not map back to the address - POSSIBLE BREAK-IN ATTEMPT!
Nov 30 14:48:08 *** sshd[10754]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=191.250.215.132  user=daemon
Nov 30 14:48:11 *** sshd[10754]: Failed password for daemon from 191.250.215.132 port 39257 ssh2
Nov 30 14:48:11 *** sshd[10754]: Received disconnect from 191.250.215.132: 11: Bye Bye [preauth]
Nov 30 15:10:40 *** sshd[14624]: Address 191.250.215.132 maps to 191.250.215.132.dynamic.adsl.gvt.net.br, but this does not map back to the address - POSSIBLE BREAK-IN ATTEMPT!
Nov 30 15:10:40 *** sshd[14624]: Invalid user baur from 191.250.215.132
Nov 30 15:10:40 *** sshd[14624]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=191.250.215.132 
Nov 30 15:10:42 *** sshd[14624]: Failed password for invalid user baur from ........
-------------------------------
2019-12-01 02:37:56
152.249.245.68 attackbots
fail2ban
2019-12-01 02:44:28
60.26.201.78 attackspam
Lines containing failures of 60.26.201.78
Nov 30 12:38:31 nxxxxxxx sshd[32310]: Invalid user Immo from 60.26.201.78 port 47728
Nov 30 12:38:31 nxxxxxxx sshd[32310]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=60.26.201.78
Nov 30 12:38:33 nxxxxxxx sshd[32310]: Failed password for invalid user Immo from 60.26.201.78 port 47728 ssh2
Nov 30 12:38:33 nxxxxxxx sshd[32310]: Received disconnect from 60.26.201.78 port 47728:11: Bye Bye [preauth]
Nov 30 12:38:33 nxxxxxxx sshd[32310]: Disconnected from invalid user Immo 60.26.201.78 port 47728 [preauth]
Nov 30 13:09:57 nxxxxxxx sshd[4011]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=60.26.201.78  user=uucp
Nov 30 13:09:59 nxxxxxxx sshd[4011]: Failed password for uucp from 60.26.201.78 port 59788 ssh2
Nov 30 13:09:59 nxxxxxxx sshd[4011]: Received disconnect from 60.26.201.78 port 59788:11: Bye Bye [preauth]
Nov 30 13:09:59 nxxxxxxx sshd[4011]: Di........
------------------------------
2019-12-01 02:31:02
51.77.156.223 attackspam
(sshd) Failed SSH login from 51.77.156.223 (FR/France/223.ip-51-77-156.eu): 3 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: Nov 30 17:28:22 andromeda sshd[30100]: Invalid user operator from 51.77.156.223 port 35732
Nov 30 17:28:25 andromeda sshd[30100]: Failed password for invalid user operator from 51.77.156.223 port 35732 ssh2
Nov 30 17:45:23 andromeda sshd[31923]: Invalid user beverly from 51.77.156.223 port 42626
2019-12-01 02:32:01
41.232.79.90 attackspambots
Nov 30 15:22:01 iago sshd[3303]: Address 41.232.79.90 maps to host-41.232.79.90.tedata.net, but this does not map back to the address - POSSIBLE BREAK-IN ATTEMPT!
Nov 30 15:22:01 iago sshd[3303]: Invalid user admin from 41.232.79.90
Nov 30 15:22:01 iago sshd[3303]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=41.232.79.90 


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=41.232.79.90
2019-12-01 02:17:56
2a03:4000:2b:105f:e8e3:f3ff:fe25:b6d3 attack
11/30/2019-19:09:06.297793 2a03:4000:002b:105f:e8e3:f3ff:fe25:b6d3 Protocol: 6 SURICATA TLS invalid record/traffic
2019-12-01 02:22:28
49.235.216.174 attackspambots
Nov 30 16:44:22 prox sshd[14174]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.235.216.174 
Nov 30 16:44:25 prox sshd[14174]: Failed password for invalid user asterisk from 49.235.216.174 port 48318 ssh2
2019-12-01 02:52:03
14.116.222.170 attackspam
Nov 30 15:27:20 MainVPS sshd[28737]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=14.116.222.170  user=root
Nov 30 15:27:21 MainVPS sshd[28737]: Failed password for root from 14.116.222.170 port 40796 ssh2
Nov 30 15:33:02 MainVPS sshd[6713]: Invalid user hkouno from 14.116.222.170 port 58429
Nov 30 15:33:02 MainVPS sshd[6713]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=14.116.222.170
Nov 30 15:33:02 MainVPS sshd[6713]: Invalid user hkouno from 14.116.222.170 port 58429
Nov 30 15:33:04 MainVPS sshd[6713]: Failed password for invalid user hkouno from 14.116.222.170 port 58429 ssh2
...
2019-12-01 02:47:30
177.86.145.140 attackspambots
Telnet/23 MH Probe, BF, Hack -
2019-12-01 02:21:14

Recently Reported IPs

77.42.83.174 116.93.119.13 189.183.158.221 65.48.184.77
112.45.29.206 123.194.20.225 36.199.109.122 97.120.15.88
97.200.146.122 144.104.9.194 116.77.38.4 1.180.237.31
116.7.245.184 204.8.12.1 137.65.55.211 71.34.87.168
94.180.126.124 112.87.109.97 116.66.193.242 105.94.118.211