Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Austria

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 152.53.209.147
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 56470
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;152.53.209.147.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025081201 1800 900 604800 86400

;; Query time: 76 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Aug 13 12:00:46 CST 2025
;; MSG SIZE  rcvd: 107
Host info
147.209.53.152.in-addr.arpa domain name pointer v2202507289248365122.bestsrv.de.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
147.209.53.152.in-addr.arpa	name = v2202507289248365122.bestsrv.de.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
118.71.153.165 attack
81/tcp
[2020-02-17]1pkt
2020-02-17 23:32:51
213.59.206.128 attackbotsspam
MultiHost/MultiPort Probe, Scan, Hack -
2020-02-17 23:39:54
125.25.46.120 attackbots
1581946695 - 02/17/2020 14:38:15 Host: 125.25.46.120/125.25.46.120 Port: 445 TCP Blocked
2020-02-17 23:38:32
106.12.30.229 attackspam
Feb 17 16:17:13 silence02 sshd[1527]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.30.229
Feb 17 16:17:15 silence02 sshd[1527]: Failed password for invalid user www from 106.12.30.229 port 42954 ssh2
Feb 17 16:21:56 silence02 sshd[1783]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.30.229
2020-02-17 23:30:08
54.84.234.42 attackbotsspam
STOP! Access denied to minors: 🔞 
I wanna jump on you!
2020-02-17 23:34:37
113.107.244.124 attack
Feb 17 14:38:31 pornomens sshd\[22840\]: Invalid user michael from 113.107.244.124 port 45058
Feb 17 14:38:31 pornomens sshd\[22840\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=113.107.244.124
Feb 17 14:38:34 pornomens sshd\[22840\]: Failed password for invalid user michael from 113.107.244.124 port 45058 ssh2
...
2020-02-17 23:15:43
115.73.238.52 attackspambots
23/tcp
[2020-02-17]1pkt
2020-02-17 23:34:06
209.146.19.11 attackbotsspam
1581946719 - 02/17/2020 14:38:39 Host: 209.146.19.11/209.146.19.11 Port: 445 TCP Blocked
2020-02-17 23:09:52
104.248.31.169 attackbotsspam
2626/tcp
[2020-02-17]1pkt
2020-02-17 23:39:19
138.94.190.33 attackspam
23/tcp
[2020-02-17]1pkt
2020-02-17 23:29:35
200.117.1.163 attackspam
23/tcp 5555/tcp 5555/tcp
[2020-01-05/02-17]3pkt
2020-02-17 23:14:14
107.6.169.252 attack
143/tcp 26/tcp 123/udp...
[2019-12-23/2020-02-17]10pkt,7pt.(tcp),2pt.(udp)
2020-02-17 23:12:38
213.6.162.106 attackbots
MultiHost/MultiPort Probe, Scan, Hack -
2020-02-17 23:02:02
95.172.58.193 attack
445/tcp
[2020-02-17]1pkt
2020-02-17 23:44:40
167.249.104.48 attackbotsspam
Automatic report - Port Scan Attack
2020-02-17 23:28:13

Recently Reported IPs

185.247.137.225 152.220.34.225 44.201.129.13 59.215.188.49
59.215.188.195 218.56.98.96 20.65.193.198 218.56.96.100
216.132.99.119 216.132.98.68 182.241.104.102 182.241.104.44
117.90.100.7 103.83.145.70 59.39.203.248 117.156.37.2
205.142.4.161 205.142.4.183 205.142.4.159 162.216.149.55