Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2026, American Registry for Internet Numbers, Ltd.
#


NetRange:       147.53.0.0 - 147.53.95.255
CIDR:           147.53.0.0/18, 147.53.64.0/19
NetName:        SAINT-MARYS
NetHandle:      NET-147-53-0-0-1
Parent:         NET147 (NET-147-0-0-0-0)
NetType:        Direct Allocation
OriginAS:       
Organization:   Saint Mary's College (SMC-6)
RegDate:        1991-06-27
Updated:        2021-12-14
Ref:            https://rdap.arin.net/registry/ip/147.53.0.0


OrgName:        Saint Mary's College
OrgId:          SMC-6
Address:        Information Technology
Address:        LeMans Hall
City:           Notre Dame
StateProv:      IN
PostalCode:     46556
Country:        US
RegDate:        1991-06-27
Updated:        2020-04-06
Ref:            https://rdap.arin.net/registry/entity/SMC-6


OrgDNSHandle: SYSTE335-ARIN
OrgDNSName:   Systems and Networking
OrgDNSPhone:  +1-574-284-4754 
OrgDNSEmail:  networkadmin@saintmarys.edu
OrgDNSRef:    https://rdap.arin.net/registry/entity/SYSTE335-ARIN

OrgNOCHandle: SYSTE335-ARIN
OrgNOCName:   Systems and Networking
OrgNOCPhone:  +1-574-284-4754 
OrgNOCEmail:  networkadmin@saintmarys.edu
OrgNOCRef:    https://rdap.arin.net/registry/entity/SYSTE335-ARIN

OrgRoutingHandle: SYSTE335-ARIN
OrgRoutingName:   Systems and Networking
OrgRoutingPhone:  +1-574-284-4754 
OrgRoutingEmail:  networkadmin@saintmarys.edu
OrgRoutingRef:    https://rdap.arin.net/registry/entity/SYSTE335-ARIN

OrgTechHandle: SYSTE335-ARIN
OrgTechName:   Systems and Networking
OrgTechPhone:  +1-574-284-4754 
OrgTechEmail:  networkadmin@saintmarys.edu
OrgTechRef:    https://rdap.arin.net/registry/entity/SYSTE335-ARIN

OrgAbuseHandle: SYSTE335-ARIN
OrgAbuseName:   Systems and Networking
OrgAbusePhone:  +1-574-284-4754 
OrgAbuseEmail:  networkadmin@saintmarys.edu
OrgAbuseRef:    https://rdap.arin.net/registry/entity/SYSTE335-ARIN

RNOCHandle: DMM67-ARIN
RNOCName:   McKeown, Douglas Michael
RNOCPhone:  +1-574-284-4737 
RNOCEmail:  dmckeown@saintmarys.edu
RNOCRef:    https://rdap.arin.net/registry/entity/DMM67-ARIN

RTechHandle: DMM67-ARIN
RTechName:   McKeown, Douglas Michael
RTechPhone:  +1-574-284-4737 
RTechEmail:  dmckeown@saintmarys.edu
RTechRef:    https://rdap.arin.net/registry/entity/DMM67-ARIN

RAbuseHandle: DMM67-ARIN
RAbuseName:   McKeown, Douglas Michael
RAbusePhone:  +1-574-284-4737 
RAbuseEmail:  dmckeown@saintmarys.edu
RAbuseRef:    https://rdap.arin.net/registry/entity/DMM67-ARIN


#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2026, American Registry for Internet Numbers, Ltd.
#
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 147.53.78.1
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 21591
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;147.53.78.1.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2026040100 1800 900 604800 86400

;; Query time: 7 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Apr 01 23:59:53 CST 2026
;; MSG SIZE  rcvd: 104
Host info
b'Host 1.78.53.147.in-addr.arpa. not found: 3(NXDOMAIN)
'
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 1.78.53.147.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
211.43.1.60 attackbotsspam
port scan and connect, tcp 80 (http)
2019-09-26 12:17:05
222.186.52.89 attack
Sep 26 06:07:21 MK-Soft-VM4 sshd[14739]: Failed password for root from 222.186.52.89 port 54592 ssh2
Sep 26 06:07:23 MK-Soft-VM4 sshd[14739]: Failed password for root from 222.186.52.89 port 54592 ssh2
...
2019-09-26 12:12:39
116.26.70.1 attackbots
Automatic report - Port Scan Attack
2019-09-26 12:23:20
176.31.127.152 attackbotsspam
Sep 26 05:40:50 microserver sshd[23759]: Invalid user rebecca from 176.31.127.152 port 44650
Sep 26 05:40:50 microserver sshd[23759]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=176.31.127.152
Sep 26 05:40:52 microserver sshd[23759]: Failed password for invalid user rebecca from 176.31.127.152 port 44650 ssh2
Sep 26 05:45:40 microserver sshd[24361]: Invalid user cassidy from 176.31.127.152 port 57948
Sep 26 05:45:40 microserver sshd[24361]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=176.31.127.152
Sep 26 05:59:57 microserver sshd[25776]: Invalid user prateek from 176.31.127.152 port 41366
Sep 26 05:59:57 microserver sshd[25776]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=176.31.127.152
Sep 26 06:00:00 microserver sshd[25776]: Failed password for invalid user prateek from 176.31.127.152 port 41366 ssh2
Sep 26 06:04:44 microserver sshd[26412]: Invalid user ny from 176.31.127.152
2019-09-26 12:36:31
222.186.175.148 attackbots
Sep 26 06:30:06 mail sshd\[30065\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.175.148  user=root
Sep 26 06:30:08 mail sshd\[30065\]: Failed password for root from 222.186.175.148 port 27326 ssh2
Sep 26 06:30:12 mail sshd\[30065\]: Failed password for root from 222.186.175.148 port 27326 ssh2
Sep 26 06:30:17 mail sshd\[30065\]: Failed password for root from 222.186.175.148 port 27326 ssh2
Sep 26 06:30:21 mail sshd\[30065\]: Failed password for root from 222.186.175.148 port 27326 ssh2
2019-09-26 12:42:11
178.128.112.98 attack
Sep 25 18:15:18 tdfoods sshd\[21616\]: Invalid user cmxi from 178.128.112.98
Sep 25 18:15:18 tdfoods sshd\[21616\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.128.112.98
Sep 25 18:15:19 tdfoods sshd\[21616\]: Failed password for invalid user cmxi from 178.128.112.98 port 39407 ssh2
Sep 25 18:22:38 tdfoods sshd\[22164\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.128.112.98  user=root
Sep 25 18:22:41 tdfoods sshd\[22164\]: Failed password for root from 178.128.112.98 port 60628 ssh2
2019-09-26 12:39:27
222.186.173.180 attack
Sep2605:18:22server6sshd[12169]:refusedconnectfrom222.186.173.180\(222.186.173.180\)Sep2605:18:23server6sshd[12170]:refusedconnectfrom222.186.173.180\(222.186.173.180\)Sep2605:18:24server6sshd[12171]:refusedconnectfrom222.186.173.180\(222.186.173.180\)Sep2605:18:24server6sshd[12172]:refusedconnectfrom222.186.173.180\(222.186.173.180\)Sep2605:58:41server6sshd[14890]:refusedconnectfrom222.186.173.180\(222.186.173.180\)
2019-09-26 12:00:22
148.70.23.121 attackbotsspam
Sep 25 17:52:09 lcdev sshd\[27093\]: Invalid user michele from 148.70.23.121
Sep 25 17:52:09 lcdev sshd\[27093\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=148.70.23.121
Sep 25 17:52:11 lcdev sshd\[27093\]: Failed password for invalid user michele from 148.70.23.121 port 34740 ssh2
Sep 25 17:58:42 lcdev sshd\[27550\]: Invalid user oracle from 148.70.23.121
Sep 25 17:58:42 lcdev sshd\[27550\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=148.70.23.121
2019-09-26 12:01:18
202.109.132.200 attackspambots
Sep 26 00:17:12 plusreed sshd[23030]: Invalid user cyyang from 202.109.132.200
...
2019-09-26 12:18:38
49.174.91.236 attackbotsspam
port scan and connect, tcp 80 (http)
2019-09-26 12:31:31
51.254.199.97 attackbots
Sep 25 17:54:09 sachi sshd\[31970\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=ns3022614.ip-51-254-199.eu  user=root
Sep 25 17:54:11 sachi sshd\[31970\]: Failed password for root from 51.254.199.97 port 48850 ssh2
Sep 25 17:57:31 sachi sshd\[32203\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=ns3022614.ip-51-254-199.eu  user=root
Sep 25 17:57:33 sachi sshd\[32203\]: Failed password for root from 51.254.199.97 port 48163 ssh2
Sep 25 18:00:55 sachi sshd\[32476\]: Invalid user oracle from 51.254.199.97
Sep 25 18:00:55 sachi sshd\[32476\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=ns3022614.ip-51-254-199.eu
2019-09-26 12:24:10
51.77.146.153 attackbots
Automated report - ssh fail2ban:
Sep 26 05:54:05 authentication failure 
Sep 26 05:54:07 wrong password, user=nfsnobody, port=43570, ssh2
Sep 26 05:58:12 authentication failure
2019-09-26 12:21:58
61.219.126.133 attackspam
port scan and connect, tcp 80 (http)
2019-09-26 12:26:22
188.131.228.31 attack
detected by Fail2Ban
2019-09-26 12:00:53
141.98.81.111 attackbotsspam
Sep 26 06:33:30 saschabauer sshd[16139]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=141.98.81.111
Sep 26 06:33:32 saschabauer sshd[16139]: Failed password for invalid user admin from 141.98.81.111 port 48288 ssh2
2019-09-26 12:34:31

Recently Reported IPs

20.104.69.172 213.180.193.135 2606:4700:10::6814:8867 2606:4700:10::ac43:705
2606:4700:10::6814:5347 2606:4700:10::6814:8778 2606:4700:10::6816:2663 2606:4700:10::6816:3503
2606:4700:10::ac43:2538 110.77.248.49 110.78.158.121 134.147.62.201
133.35.149.178 13.71.195.159 109.158.144.83 80.94.95.169
107.189.30.132 100.41.161.169 71.117.103.31 2606:4700:10::6814:7681