Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Berlin

Region: Berlin

Country: Germany

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2026, American Registry for Internet Numbers, Ltd.
#


NetRange:       152.233.0.0 - 152.233.127.255
CIDR:           152.233.0.0/17
NetName:        RIPE
NetHandle:      NET-152-233-0-0-1
Parent:         NET152 (NET-152-0-0-0-0)
NetType:        Early Registrations, Transferred to RIPE NCC
OriginAS:       
Organization:   RIPE Network Coordination Centre (RIPE)
RegDate:        2025-08-11
Updated:        2025-08-11
Ref:            https://rdap.arin.net/registry/ip/152.233.0.0

ResourceLink:  https://apps.db.ripe.net/db-web-ui/query
ResourceLink:  whois.ripe.net


OrgName:        RIPE Network Coordination Centre
OrgId:          RIPE
Address:        P.O. Box 10096
City:           Amsterdam
StateProv:      
PostalCode:     1001EB
Country:        NL
RegDate:        
Updated:        2013-07-29
Ref:            https://rdap.arin.net/registry/entity/RIPE

ReferralServer:  whois.ripe.net
ResourceLink:  https://apps.db.ripe.net/db-web-ui/query

OrgAbuseHandle: ABUSE3850-ARIN
OrgAbuseName:   Abuse Contact
OrgAbusePhone:  +31205354444 
OrgAbuseEmail:  abuse@ripe.net
OrgAbuseRef:    https://rdap.arin.net/registry/entity/ABUSE3850-ARIN

OrgTechHandle: RNO29-ARIN
OrgTechName:   RIPE NCC Operations
OrgTechPhone:  +31 20 535 4444 
OrgTechEmail:  hostmaster@ripe.net
OrgTechRef:    https://rdap.arin.net/registry/entity/RNO29-ARIN


#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2026, American Registry for Internet Numbers, Ltd.
#
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 152.233.20.149
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 63757
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;152.233.20.149.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2026042800 1800 900 604800 86400

;; Query time: 11 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Apr 28 21:32:13 CST 2026
;; MSG SIZE  rcvd: 107
Host info
149.20.233.152.in-addr.arpa domain name pointer unn-152-233-20-149.datapacket.com.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
149.20.233.152.in-addr.arpa	name = unn-152-233-20-149.datapacket.com.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
117.247.238.10 attackbots
SSH bruteforce
2020-08-10 04:12:14
39.109.116.129 attack
Failed password for root from 39.109.116.129 port 53834 ssh2
2020-08-10 04:02:17
103.114.107.149 attackbotsspam
Aug  9 17:26:37 firewall sshd[6230]: Invalid user admin from 103.114.107.149
Aug  9 17:26:39 firewall sshd[6230]: Failed password for invalid user admin from 103.114.107.149 port 64286 ssh2
Aug  9 17:26:40 firewall sshd[6230]: error: Received disconnect from 103.114.107.149 port 64286:3: com.jcraft.jsch.JSchException: Auth fail [preauth]
...
2020-08-10 04:28:06
188.165.42.223 attackbotsspam
Aug  9 16:28:01 amit sshd\[21430\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.165.42.223  user=root
Aug  9 16:28:03 amit sshd\[21430\]: Failed password for root from 188.165.42.223 port 45538 ssh2
Aug  9 16:31:54 amit sshd\[25585\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.165.42.223  user=root
...
2020-08-10 04:19:41
152.136.36.250 attack
$f2bV_matches
2020-08-10 04:22:10
203.147.86.210 attackspam
(imapd) Failed IMAP login from 203.147.86.210 (NC/New Caledonia/host-203-147-86-210.h39.canl.nc): 1 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_TRIGGER; Logs: Aug  9 21:09:58 ir1 dovecot[3110802]: imap-login: Disconnected (auth failed, 1 attempts in 9 secs): user=, method=PLAIN, rip=203.147.86.210, lip=5.63.12.44, TLS, session=
2020-08-10 03:56:38
91.72.171.138 attackspambots
Aug  9 22:22:31 jane sshd[6990]: Failed password for root from 91.72.171.138 port 36464 ssh2
...
2020-08-10 04:30:44
64.227.97.122 attackbotsspam
*Port Scan* detected from 64.227.97.122 (US/United States/California/Santa Clara/-). 4 hits in the last 70 seconds
2020-08-10 04:13:08
92.63.71.27 attackbots
rdp
2020-08-10 03:59:35
43.226.145.36 attackspambots
Aug  9 22:26:36 fhem-rasp sshd[2941]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.226.145.36  user=root
Aug  9 22:26:38 fhem-rasp sshd[2941]: Failed password for root from 43.226.145.36 port 60284 ssh2
...
2020-08-10 04:30:14
88.84.193.158 attack
Attempting to access Wordpress login on a honeypot or private system.
2020-08-10 04:05:02
192.35.169.34 attackspambots
 TCP (SYN) 192.35.169.34:25561 -> port 9048, len 44
2020-08-10 04:08:59
178.137.208.162 attack
fail2ban - Attack against WordPress
2020-08-10 03:54:03
112.255.2.115 attackbotsspam
37215/tcp
[2020-08-09]1pkt
2020-08-10 04:24:16
27.111.38.35 attackbotsspam
20/8/9@16:26:37: FAIL: Alarm-Network address from=27.111.38.35
20/8/9@16:26:37: FAIL: Alarm-Network address from=27.111.38.35
...
2020-08-10 04:31:42

Recently Reported IPs

8.242.204.70 62.138.190.184 165.232.130.247 159.223.64.101
89.116.210.48 113.215.189.163 2606:4700:10::6816:2385 2606:4700:10::ac43:1381
2606:4700:10::6814:5662 2606:4700:10::6814:7503 120.52.12.66 120.52.12.86
120.52.12.84 120.52.12.73 120.52.12.81 143.64.153.188
180.93.252.253 110.78.156.122 2606:4700:10::6814:9825 2606:4700:10::6814:5161