Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States of America (the)

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 149.1.147.100
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 33942
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;149.1.147.100.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025020301 1800 900 604800 86400

;; Query time: 39 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Feb 04 03:17:50 CST 2025
;; MSG SIZE  rcvd: 106
Host info
Host 100.147.1.149.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 100.147.1.149.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
223.130.31.207 attackbots
firewall-block, port(s): 23/tcp
2020-09-29 15:55:09
106.13.184.234 attack
Sep 28 19:06:00 php1 sshd\[3681\]: Invalid user nagios from 106.13.184.234
Sep 28 19:06:00 php1 sshd\[3681\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.184.234
Sep 28 19:06:02 php1 sshd\[3681\]: Failed password for invalid user nagios from 106.13.184.234 port 44850 ssh2
Sep 28 19:10:14 php1 sshd\[4332\]: Invalid user bill from 106.13.184.234
Sep 28 19:10:14 php1 sshd\[4332\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.184.234
2020-09-29 15:58:45
171.243.127.144 attackspam
fail2ban
2020-09-29 16:55:47
68.183.66.73 attackspam
Port Scan/VNC login attempt
...
2020-09-29 16:32:36
117.50.110.19 attackspambots
2020-09-29T09:16:55.281116mail.standpoint.com.ua sshd[27270]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=117.50.110.19
2020-09-29T09:16:55.278386mail.standpoint.com.ua sshd[27270]: Invalid user redmine from 117.50.110.19 port 37068
2020-09-29T09:16:57.105867mail.standpoint.com.ua sshd[27270]: Failed password for invalid user redmine from 117.50.110.19 port 37068 ssh2
2020-09-29T09:19:09.320322mail.standpoint.com.ua sshd[27587]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=117.50.110.19  user=root
2020-09-29T09:19:11.205427mail.standpoint.com.ua sshd[27587]: Failed password for root from 117.50.110.19 port 39062 ssh2
...
2020-09-29 15:57:31
92.184.97.161 attack
Automatic report - Banned IP Access
2020-09-29 16:54:40
179.145.62.63 attackbots
Port Scan: TCP/443
2020-09-29 15:47:48
187.33.82.34 attack
20/9/28@16:36:09: FAIL: Alarm-Network address from=187.33.82.34
...
2020-09-29 16:31:51
165.232.47.127 attack
Lines containing failures of 165.232.47.127
Sep 28 22:21:28 new sshd[6217]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.232.47.127  user=r.r
Sep 28 22:21:31 new sshd[6217]: Failed password for r.r from 165.232.47.127 port 43894 ssh2
Sep 28 22:21:31 new sshd[6217]: Received disconnect from 165.232.47.127 port 43894:11: Bye Bye [preauth]
Sep 28 22:21:31 new sshd[6217]: Disconnected from authenticating user r.r 165.232.47.127 port 43894 [preauth]
Sep 28 22:25:11 new sshd[7222]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.232.47.127  user=nagios


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=165.232.47.127
2020-09-29 15:50:27
45.144.177.107 attackbots
 UDP 45.144.177.107:50875 -> port 1900, len 119
2020-09-29 16:12:02
92.38.136.69 attackbotsspam
0,33-03/28 [bc01/m20] PostRequest-Spammer scoring: harare01_holz
2020-09-29 15:41:00
182.124.43.165 attackspam
From CCTV User Interface Log
...::ffff:182.124.43.165 - - [28/Sep/2020:16:37:08 +0000] "POST /HNAP1/ HTTP/1.0" 501 188
...
2020-09-29 15:47:00
111.231.82.143 attackspam
SSH / Telnet Brute Force Attempts on Honeypot
2020-09-29 15:39:09
42.194.211.37 attackbots
Sep 29 09:02:54 marvibiene sshd[32013]: Failed password for root from 42.194.211.37 port 41748 ssh2
Sep 29 09:09:04 marvibiene sshd[32370]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=42.194.211.37 
Sep 29 09:09:06 marvibiene sshd[32370]: Failed password for invalid user tomcat from 42.194.211.37 port 42128 ssh2
2020-09-29 15:45:19
31.173.246.95 attackspambots
Automatic report - Banned IP Access
2020-09-29 15:37:55

Recently Reported IPs

167.200.147.187 59.113.204.61 30.119.150.3 5.9.58.23
33.204.109.147 252.132.187.100 24.0.187.181 118.200.1.94
34.133.104.251 150.12.94.97 80.138.0.94 33.135.17.105
169.154.3.139 119.147.191.16 30.37.187.184 95.155.12.92
30.191.7.103 166.253.5.10 132.161.109.159 59.94.251.174