Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Heidelberg

Region: Baden-Württemberg

Country: Germany

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 161.42.198.147
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 20711
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;161.42.198.147.			IN	A

;; AUTHORITY SECTION:
.			457	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019121001 1800 900 604800 86400

;; Query time: 51 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Dec 11 05:07:36 CST 2019
;; MSG SIZE  rcvd: 118
Host info
Host 147.198.42.161.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 147.198.42.161.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
119.203.240.76 attack
Dec  8 19:53:37 microserver sshd[4015]: Invalid user mcninch from 119.203.240.76 port 36352
Dec  8 19:53:37 microserver sshd[4015]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=119.203.240.76
Dec  8 19:53:38 microserver sshd[4015]: Failed password for invalid user mcninch from 119.203.240.76 port 36352 ssh2
Dec  8 20:00:48 microserver sshd[5374]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=119.203.240.76  user=root
Dec  8 20:00:50 microserver sshd[5374]: Failed password for root from 119.203.240.76 port 50795 ssh2
Dec  8 20:12:16 microserver sshd[7013]: Invalid user francoise from 119.203.240.76 port 48123
Dec  8 20:12:16 microserver sshd[7013]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=119.203.240.76
Dec  8 20:12:18 microserver sshd[7013]: Failed password for invalid user francoise from 119.203.240.76 port 48123 ssh2
Dec  8 20:18:05 microserver sshd[7868]: Invalid user wwwrun f
2019-12-17 01:19:23
175.204.91.168 attackspam
Dec 16 07:05:30 php1 sshd\[31613\]: Invalid user Billing from 175.204.91.168
Dec 16 07:05:30 php1 sshd\[31613\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=175.204.91.168
Dec 16 07:05:31 php1 sshd\[31613\]: Failed password for invalid user Billing from 175.204.91.168 port 35784 ssh2
Dec 16 07:11:52 php1 sshd\[32601\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=175.204.91.168  user=root
Dec 16 07:11:55 php1 sshd\[32601\]: Failed password for root from 175.204.91.168 port 48222 ssh2
2019-12-17 01:23:57
45.71.136.143 attackbotsspam
Unauthorized connection attempt detected from IP address 45.71.136.143 to port 445
2019-12-17 00:57:25
134.175.49.215 attack
Dec 16 17:34:17 MK-Soft-VM6 sshd[28178]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.175.49.215 
Dec 16 17:34:19 MK-Soft-VM6 sshd[28178]: Failed password for invalid user ursala from 134.175.49.215 port 55254 ssh2
...
2019-12-17 00:42:50
51.77.201.36 attack
2019-12-16T15:46:48.145083shield sshd\[20050\]: Invalid user news from 51.77.201.36 port 46820
2019-12-16T15:46:48.149310shield sshd\[20050\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=36.ip-51-77-201.eu
2019-12-16T15:46:49.766810shield sshd\[20050\]: Failed password for invalid user news from 51.77.201.36 port 46820 ssh2
2019-12-16T15:52:38.543638shield sshd\[21503\]: Invalid user djarraya from 51.77.201.36 port 53604
2019-12-16T15:52:38.547610shield sshd\[21503\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=36.ip-51-77-201.eu
2019-12-17 00:55:13
1.172.187.62 attackbots
Fail2Ban Ban Triggered
2019-12-17 00:50:41
80.211.171.78 attack
Dec 16 06:50:25 sachi sshd\[12856\]: Invalid user operator12 from 80.211.171.78
Dec 16 06:50:25 sachi sshd\[12856\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=80.211.171.78
Dec 16 06:50:28 sachi sshd\[12856\]: Failed password for invalid user operator12 from 80.211.171.78 port 34832 ssh2
Dec 16 06:56:15 sachi sshd\[13405\]: Invalid user dillemuth from 80.211.171.78
Dec 16 06:56:15 sachi sshd\[13405\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=80.211.171.78
2019-12-17 01:07:00
106.12.178.82 attackbotsspam
Dec 16 18:31:03 server sshd\[24647\]: Invalid user supri from 106.12.178.82
Dec 16 18:31:03 server sshd\[24647\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.178.82 
Dec 16 18:31:05 server sshd\[24647\]: Failed password for invalid user supri from 106.12.178.82 port 40972 ssh2
Dec 16 19:00:46 server sshd\[2206\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.178.82  user=root
Dec 16 19:00:48 server sshd\[2206\]: Failed password for root from 106.12.178.82 port 42438 ssh2
...
2019-12-17 01:21:46
177.62.169.18 attack
Dec 16 06:24:53 kapalua sshd\[11359\]: Invalid user beisekeralbertarose from 177.62.169.18
Dec 16 06:24:53 kapalua sshd\[11359\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=177.62.169.18
Dec 16 06:24:55 kapalua sshd\[11359\]: Failed password for invalid user beisekeralbertarose from 177.62.169.18 port 37713 ssh2
Dec 16 06:32:16 kapalua sshd\[12883\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=177.62.169.18  user=backup
Dec 16 06:32:18 kapalua sshd\[12883\]: Failed password for backup from 177.62.169.18 port 41874 ssh2
2019-12-17 00:51:20
121.182.166.82 attackspambots
2019-12-16T14:36:57.525020abusebot-5.cloudsearch.cf sshd\[5424\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.182.166.82  user=root
2019-12-16T14:36:59.455398abusebot-5.cloudsearch.cf sshd\[5424\]: Failed password for root from 121.182.166.82 port 61915 ssh2
2019-12-16T14:44:24.808880abusebot-5.cloudsearch.cf sshd\[5512\]: Invalid user admin from 121.182.166.82 port 13141
2019-12-16T14:44:24.814949abusebot-5.cloudsearch.cf sshd\[5512\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.182.166.82
2019-12-17 01:11:36
81.17.30.198 attackbots
Dec 16 15:22:11 mxgate1 postfix/postscreen[13181]: CONNECT from [81.17.30.198]:41296 to [176.31.12.44]:25
Dec 16 15:22:13 mxgate1 postfix/postscreen[13181]: CONNECT from [81.17.30.198]:50448 to [176.31.12.44]:25
Dec 16 15:22:17 mxgate1 postfix/postscreen[13181]: PASS OLD [81.17.30.198]:41296
Dec 16 15:22:19 mxgate1 postfix/smtpd[13384]: warning: hostname cabinetstogo.com does not resolve to address 81.17.30.198
Dec 16 15:22:19 mxgate1 postfix/smtpd[13384]: connect from unknown[81.17.30.198]
Dec 16 15:22:19 mxgate1 postfix/postscreen[13181]: PASS OLD [81.17.30.198]:50448
Dec 16 15:22:19 mxgate1 postfix/smtpd[13451]: warning: hostname cabinetstogo.com does not resolve to address 81.17.30.198
Dec 16 15:22:19 mxgate1 postfix/smtpd[13451]: connect from unknown[81.17.30.198]
Dec x@x
Dec x@x
Dec 16 15:22:20 mxgate1 postfix/smtpd[13451]: disconnect from unknown[81.17.30.198] ehlo=1 mail=1 rcpt=0/1 data=0/1 quhostname=1 commands=3/5
Dec 16 15:22:21 mxgate1 postfix/smtpd[13384]: ........
-------------------------------
2019-12-17 01:11:59
46.101.17.215 attackbotsspam
Dec 16 11:58:13 linuxvps sshd\[47395\]: Invalid user bottger from 46.101.17.215
Dec 16 11:58:13 linuxvps sshd\[47395\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=46.101.17.215
Dec 16 11:58:15 linuxvps sshd\[47395\]: Failed password for invalid user bottger from 46.101.17.215 port 49982 ssh2
Dec 16 12:03:28 linuxvps sshd\[50809\]: Invalid user admin888 from 46.101.17.215
Dec 16 12:03:28 linuxvps sshd\[50809\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=46.101.17.215
2019-12-17 01:04:17
138.99.216.221 attackbots
CloudCIX Reconnaissance Scan Detected, PTR: PTR record not found
2019-12-17 01:18:29
198.211.110.116 attackbots
Fail2Ban - SSH Bruteforce Attempt
2019-12-17 01:17:17
94.191.76.19 attackbotsspam
Dec 16 16:57:42 icinga sshd[12277]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=94.191.76.19
Dec 16 16:57:44 icinga sshd[12277]: Failed password for invalid user root6666 from 94.191.76.19 port 39482 ssh2
...
2019-12-17 00:56:45

Recently Reported IPs

63.248.65.207 65.218.91.154 137.205.178.114 208.36.148.190
168.200.241.108 14.98.215.178 45.145.225.148 13.76.129.216
163.140.94.124 52.91.48.203 6.18.210.143 129.32.131.130
3.93.225.180 163.5.17.213 174.198.102.141 215.159.152.19
221.207.182.147 187.51.119.43 75.240.58.33 191.78.219.151