Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Austria

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 152.53.209.147
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 56470
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;152.53.209.147.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025081201 1800 900 604800 86400

;; Query time: 76 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Aug 13 12:00:46 CST 2025
;; MSG SIZE  rcvd: 107
Host info
147.209.53.152.in-addr.arpa domain name pointer v2202507289248365122.bestsrv.de.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
147.209.53.152.in-addr.arpa	name = v2202507289248365122.bestsrv.de.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
217.113.28.7 attack
Oct 16 01:56:58 master sshd[28224]: Failed password for root from 217.113.28.7 port 54613 ssh2
Oct 16 02:16:37 master sshd[28539]: Failed password for invalid user luca from 217.113.28.7 port 58696 ssh2
Oct 16 02:20:34 master sshd[28544]: Failed password for root from 217.113.28.7 port 49818 ssh2
Oct 16 02:24:26 master sshd[28546]: Failed password for invalid user admin from 217.113.28.7 port 40938 ssh2
Oct 16 02:28:24 master sshd[28550]: Failed password for root from 217.113.28.7 port 60296 ssh2
2019-10-16 08:35:45
41.84.228.65 attackspambots
fraudulent SSH attempt
2019-10-16 08:25:30
107.180.122.15 attackspambots
Probing for vulnerable PHP code /wp-includes/js/codemirror/kaoytpqx.php
2019-10-16 08:28:07
185.93.69.14 attackbotsspam
miraniessen.de 185.93.69.14 \[15/Oct/2019:21:51:43 +0200\] "POST /wp-login.php HTTP/1.1" 200 5974 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0"
miraniessen.de 185.93.69.14 \[15/Oct/2019:21:51:43 +0200\] "POST /wp-login.php HTTP/1.1" 200 5974 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0"
2019-10-16 08:48:25
104.40.8.62 attackbotsspam
Unauthorised access (Oct 15) SRC=104.40.8.62 LEN=40 TTL=39 ID=36499 TCP DPT=23 WINDOW=43261 SYN
2019-10-16 09:00:32
211.147.216.19 attackbotsspam
Oct 15 16:46:17 ny01 sshd[28365]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=211.147.216.19
Oct 15 16:46:19 ny01 sshd[28365]: Failed password for invalid user rl from 211.147.216.19 port 58636 ssh2
Oct 15 16:50:34 ny01 sshd[28728]: Failed password for root from 211.147.216.19 port 38156 ssh2
2019-10-16 08:57:54
198.20.99.130 attack
Port scan: Attack repeated for 24 hours
2019-10-16 08:51:13
187.163.92.154 attackspambots
firewall-block, port(s): 9000/tcp
2019-10-16 08:40:00
106.12.108.32 attack
Oct 15 01:37:02 newdogma sshd[13147]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.108.32  user=r.r
Oct 15 01:37:04 newdogma sshd[13147]: Failed password for r.r from 106.12.108.32 port 40304 ssh2
Oct 15 01:37:05 newdogma sshd[13147]: Received disconnect from 106.12.108.32 port 40304:11: Bye Bye [preauth]
Oct 15 01:37:05 newdogma sshd[13147]: Disconnected from 106.12.108.32 port 40304 [preauth]
Oct 15 01:44:59 newdogma sshd[13276]: Invalid user oswald from 106.12.108.32 port 33336
Oct 15 01:44:59 newdogma sshd[13276]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.108.32
Oct 15 01:45:01 newdogma sshd[13276]: Failed password for invalid user oswald from 106.12.108.32 port 33336 ssh2
Oct 15 01:45:01 newdogma sshd[13276]: Received disconnect from 106.12.108.32 port 33336:11: Bye Bye [preauth]
Oct 15 01:45:01 newdogma sshd[13276]: Disconnected from 106.12.108.32 port 33336 [pre........
-------------------------------
2019-10-16 08:48:03
118.25.150.90 attackbots
Oct 14 18:21:02 euve59663 sshd[7756]: pam_unix(sshd:auth): authenticati=
on failure; logname=3D uid=3D0 euid=3D0 tty=3Dssh ruser=3D rhost=3D118.=
25.150.90  user=3Duucp
Oct 14 18:21:04 euve59663 sshd[7756]: Failed password for uucp from 118=
.25.150.90 port 43493 ssh2
Oct 14 18:21:04 euve59663 sshd[7756]: Received disconnect from 118.25.1=
50.90: 11: Bye Bye [preauth]
Oct 14 18:33:25 euve59663 sshd[2649]: pam_unix(sshd:auth): authenticati=
on failure; logname=3D uid=3D0 euid=3D0 tty=3Dssh ruser=3D rhost=3D118.=
25.150.90  user=3Dr.r
Oct 14 18:33:27 euve59663 sshd[2649]: Failed password for r.r from 118=
.25.150.90 port 55810 ssh2
Oct 14 18:33:28 euve59663 sshd[2649]: Received disconnect from 118.25.1=
50.90: 11: Bye Bye [preauth]
Oct 14 18:38:00 euve59663 sshd[2692]: Invalid user ftp_boot from 118.25=
.150.90
Oct 14 18:38:00 euve59663 sshd[2692]: pam_unix(sshd:auth): authenticati=
on failure; logname=3D uid=3D0 euid=3D0 tty=3Dssh ruser=3D rhost=3D118.=
25.150.90=20
Oct ........
-------------------------------
2019-10-16 09:00:08
185.216.140.252 attackbotsspam
10/15/2019-19:41:00.212954 185.216.140.252 Protocol: 6 ET DROP Dshield Block Listed Source group 1
2019-10-16 08:45:09
139.219.14.12 attackspam
Oct 16 02:27:54 master sshd[28548]: Failed password for invalid user rt from 139.219.14.12 port 60300 ssh2
2019-10-16 08:55:12
119.200.186.168 attackspam
Oct 15 21:30:39 vps sshd[10113]: Failed password for root from 119.200.186.168 port 35038 ssh2
Oct 15 21:51:52 vps sshd[11107]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=119.200.186.168 
Oct 15 21:51:54 vps sshd[11107]: Failed password for invalid user zk from 119.200.186.168 port 47260 ssh2
...
2019-10-16 08:40:54
41.214.139.226 attack
fraudulent SSH attempt
2019-10-16 08:39:07
37.59.37.201 attackbots
fraudulent SSH attempt
2019-10-16 08:54:15

Recently Reported IPs

185.247.137.225 152.220.34.225 44.201.129.13 59.215.188.49
59.215.188.195 218.56.98.96 20.65.193.198 218.56.96.100
216.132.99.119 216.132.98.68 182.241.104.102 182.241.104.44
117.90.100.7 103.83.145.70 59.39.203.248 117.156.37.2
205.142.4.161 205.142.4.183 205.142.4.159 162.216.149.55