Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Los Angeles

Region: California

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 149.142.217.247
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 63601
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;149.142.217.247.		IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025063000 1800 900 604800 86400

;; Query time: 36 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Jun 30 19:58:46 CST 2025
;; MSG SIZE  rcvd: 108
Host info
Host 247.217.142.149.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 247.217.142.149.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
178.62.44.160 attackspam
$f2bV_matches
2020-03-19 02:21:25
61.246.6.41 attack
Honeypot attack, port: 445, PTR: abts-north-static-041.6.246.61.airtelbroadband.in.
2020-03-19 01:53:50
177.6.166.4 attack
SSH login attempts with user root.
2020-03-19 01:55:48
118.174.45.29 attackspam
-
2020-03-19 01:52:37
91.243.216.58 attackbotsspam
IP Ban Report :  
 https://help-dysk.pl/wordpress-firewall-plugins/ip/91.243.216.58/ 
 
 UA - 1H : (14)  
 Protection Against DDoS WordPress plugin :  
 "odzyskiwanie danych help-dysk" 
 IP Address Ranges by Country : UA 
 NAME ASN : ASN59567 
 
 IP : 91.243.216.58 
 
 CIDR : 91.243.192.0/19 
 
 PREFIX COUNT : 1 
 
 UNIQUE IP COUNT : 8192 
 
 
 ATTACKS DETECTED ASN59567 :  
  1H - 1 
  3H - 1 
  6H - 1 
 12H - 1 
 24H - 1 
 
 DateTime : 2020-03-18 14:08:43 
 
 INFO :  HACK ! - Looking for resource vulnerabilities Scan Detected and Blocked by ADMIN  - data recovery
2020-03-19 02:00:56
61.178.108.175 attackspambots
Honeypot attack, port: 445, PTR: PTR record not found
2020-03-19 02:04:36
222.186.175.217 attackspambots
Mar 19 01:18:24 webhost01 sshd[10989]: Failed password for root from 222.186.175.217 port 44610 ssh2
Mar 19 01:18:37 webhost01 sshd[10989]: Failed password for root from 222.186.175.217 port 44610 ssh2
Mar 19 01:18:37 webhost01 sshd[10989]: error: maximum authentication attempts exceeded for root from 222.186.175.217 port 44610 ssh2 [preauth]
...
2020-03-19 02:23:44
139.47.135.215 attackspambots
SSH login attempts with user root.
2020-03-19 02:03:01
164.132.9.199 attack
Mar 16 02:28:07 h2022099 sshd[26591]: Invalid user acoustic from 164.132.9.199
Mar 16 02:28:10 h2022099 sshd[26591]: Failed password for invalid user acoustic from 164.132.9.199 port 37868 ssh2
Mar 16 02:28:12 h2022099 sshd[26591]: Failed password for invalid user acoustic from 164.132.9.199 port 37868 ssh2


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=164.132.9.199
2020-03-19 02:29:43
222.186.42.7 attackspam
Mar 18 20:07:16 server2 sshd\[27087\]: User root from 222.186.42.7 not allowed because not listed in AllowUsers
Mar 18 20:07:16 server2 sshd\[27089\]: User root from 222.186.42.7 not allowed because not listed in AllowUsers
Mar 18 20:07:17 server2 sshd\[27091\]: User root from 222.186.42.7 not allowed because not listed in AllowUsers
Mar 18 20:10:58 server2 sshd\[27427\]: User root from 222.186.42.7 not allowed because not listed in AllowUsers
Mar 18 20:16:56 server2 sshd\[27834\]: User root from 222.186.42.7 not allowed because not listed in AllowUsers
Mar 18 20:16:56 server2 sshd\[27836\]: User root from 222.186.42.7 not allowed because not listed in AllowUsers
2020-03-19 02:18:09
206.189.98.225 attack
Mar 18 18:49:28 cp sshd[2697]: Failed password for root from 206.189.98.225 port 53786 ssh2
Mar 18 18:49:28 cp sshd[2697]: Failed password for root from 206.189.98.225 port 53786 ssh2
2020-03-19 01:50:04
83.233.155.75 attackspambots
Honeypot attack, port: 5555, PTR: 83-233-155-75.cust.bredband2.com.
2020-03-19 02:19:15
222.186.169.192 attack
Mar 18 19:11:26 vps647732 sshd[22928]: Failed password for root from 222.186.169.192 port 61072 ssh2
Mar 18 19:11:39 vps647732 sshd[22928]: error: maximum authentication attempts exceeded for root from 222.186.169.192 port 61072 ssh2 [preauth]
...
2020-03-19 02:13:20
49.233.170.133 attack
Mar 18 14:01:16 cloud sshd[10910]: Failed password for root from 49.233.170.133 port 45290 ssh2
2020-03-19 02:38:24
119.96.171.162 attack
Mar 18 12:14:14 firewall sshd[30679]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=119.96.171.162  user=root
Mar 18 12:14:16 firewall sshd[30679]: Failed password for root from 119.96.171.162 port 58506 ssh2
Mar 18 12:16:22 firewall sshd[30814]: Invalid user ishihara from 119.96.171.162
...
2020-03-19 02:28:54

Recently Reported IPs

155.176.56.62 147.17.87.85 139.86.123.53 131.53.41.121
119.7.192.133 114.74.203.82 114.191.37.129 125.47.117.220
110.9.142.230 110.13.80.144 98.67.38.78 97.140.144.115
8.48.141.118 74.19.25.115 74.17.32.181 75.211.67.67
70.77.247.232 7.44.222.86 60.18.229.253 59.234.72.147