Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: South Africa

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 164.149.241.147
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 43714
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;164.149.241.147.		IN	A

;; AUTHORITY SECTION:
.			360	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2020011100 1800 900 604800 86400

;; Query time: 117 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Jan 12 00:08:27 CST 2020
;; MSG SIZE  rcvd: 119
Host info
Host 147.241.149.164.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 147.241.149.164.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
68.183.160.63 attackbotsspam
2019-11-27T12:52:42.547743shield sshd\[24458\]: Invalid user hongqi from 68.183.160.63 port 48870
2019-11-27T12:52:42.551913shield sshd\[24458\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=68.183.160.63
2019-11-27T12:52:44.021541shield sshd\[24458\]: Failed password for invalid user hongqi from 68.183.160.63 port 48870 ssh2
2019-11-27T12:58:18.341734shield sshd\[24943\]: Invalid user cloudtest from 68.183.160.63 port 36688
2019-11-27T12:58:18.345707shield sshd\[24943\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=68.183.160.63
2019-11-27 21:04:17
91.121.7.155 attack
Nov 27 08:46:19 lnxweb61 sshd[12782]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=91.121.7.155
2019-11-27 20:59:28
147.135.119.51 attackbotsspam
Nov 27 03:30:32 TORMINT sshd\[866\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=147.135.119.51  user=root
Nov 27 03:30:34 TORMINT sshd\[866\]: Failed password for root from 147.135.119.51 port 38982 ssh2
Nov 27 03:34:27 TORMINT sshd\[1131\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=147.135.119.51  user=uucp
...
2019-11-27 21:25:09
36.66.249.242 attack
Port Scan 1433
2019-11-27 21:24:07
58.254.132.41 attackspam
Invalid user admin from 58.254.132.41 port 59742
2019-11-27 20:46:28
185.143.223.185 attackspam
2019-11-27T13:30:22.366037+01:00 lumpi kernel: [147788.562182] INPUT:DROP:SPAMHAUS_EDROP:IN=eth0 OUT= MAC=52:54:a2:01:a5:04:d2:74:7f:6e:37:e3:08:00 SRC=185.143.223.185 DST=78.46.199.189 LEN=40 TOS=0x00 PREC=0x00 TTL=246 ID=18370 PROTO=TCP SPT=54950 DPT=13771 WINDOW=1024 RES=0x00 SYN URGP=0 
...
2019-11-27 21:12:32
216.218.206.97 attack
5555/tcp 50075/tcp 11211/tcp...
[2019-10-02/11-27]41pkt,10pt.(tcp),2pt.(udp)
2019-11-27 21:05:15
188.254.0.160 attackspam
2019-11-27T06:51:25.854532abusebot-4.cloudsearch.cf sshd\[24416\]: Invalid user weatherholt from 188.254.0.160 port 41784
2019-11-27 21:23:15
218.90.180.110 attack
Autoban   218.90.180.110 ABORTED AUTH
2019-11-27 20:57:22
103.220.37.29 attack
Port 1433 Scan
2019-11-27 21:07:12
104.131.199.240 attackbotsspam
#Blacklisted DigitalOcean Botnet Host Attacks WordPress Again: xmlrpc.php & wlwmanifest.xml  

#Blacklisted DigitalOcean Botnet UA: 
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/63.0.3239.132 Safari/537.36  
  
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_11_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/53.0.2785.143 Safari/537.36
  
Mozilla 
 
Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; Trident/5.0; Trident/5.0)
2019-11-27 21:01:03
60.222.233.208 attack
Nov 27 02:33:10 auw2 sshd\[32480\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=60.222.233.208  user=daemon
Nov 27 02:33:12 auw2 sshd\[32480\]: Failed password for daemon from 60.222.233.208 port 4902 ssh2
Nov 27 02:37:27 auw2 sshd\[376\]: Invalid user aarsheim from 60.222.233.208
Nov 27 02:37:27 auw2 sshd\[376\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=60.222.233.208
Nov 27 02:37:29 auw2 sshd\[376\]: Failed password for invalid user aarsheim from 60.222.233.208 port 31143 ssh2
2019-11-27 21:20:09
222.186.31.204 attackspambots
SSH Brute force attack.
2019-11-27 21:00:41
27.198.80.39 attackspam
Honeypot attack, port: 23, PTR: PTR record not found
2019-11-27 21:12:11
197.155.234.157 attackbotsspam
2019-11-27T06:52:14.603565shield sshd\[18574\]: Invalid user ml from 197.155.234.157 port 34818
2019-11-27T06:52:14.608647shield sshd\[18574\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=197.155.234.157
2019-11-27T06:52:16.934085shield sshd\[18574\]: Failed password for invalid user ml from 197.155.234.157 port 34818 ssh2
2019-11-27T06:56:52.355933shield sshd\[19100\]: Invalid user hawkin from 197.155.234.157 port 41786
2019-11-27T06:56:52.358552shield sshd\[19100\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=197.155.234.157
2019-11-27 20:52:58

Recently Reported IPs

114.9.69.186 136.1.110.51 120.190.158.129 33.7.12.12
45.134.144.94 176.119.162.97 175.236.218.107 107.174.33.167
147.131.154.214 113.190.48.31 122.58.28.165 183.82.37.78
122.51.167.130 93.8.60.251 249.57.28.227 168.44.59.86
22.244.109.34 77.70.94.43 134.209.226.157 87.9.217.28