Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: South Africa

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 165.49.147.7
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 64537
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;165.49.147.7.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025022800 1800 900 604800 86400

;; Query time: 43 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 28 17:36:20 CST 2025
;; MSG SIZE  rcvd: 105
Host info
Host 7.147.49.165.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 7.147.49.165.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
166.111.68.25 attackspam
Aug  5 19:14:13 gw1 sshd[21454]: Failed password for root from 166.111.68.25 port 36224 ssh2
...
2020-08-06 00:15:30
136.232.239.130 attackbotsspam
Unauthorized connection attempt from IP address 136.232.239.130 on Port 445(SMB)
2020-08-05 23:46:59
193.176.86.170 attack
0,22-13/23 [bc05/m73] PostRequest-Spammer scoring: zurich
2020-08-06 00:03:18
176.92.181.202 attack
Telnet Server BruteForce Attack
2020-08-05 23:40:00
106.13.224.130 attackspambots
Aug  5 19:04:01 gw1 sshd[21126]: Failed password for root from 106.13.224.130 port 45210 ssh2
...
2020-08-05 23:43:55
123.132.237.18 attackspambots
Aug  5 13:12:47 rocket sshd[20976]: Failed password for root from 123.132.237.18 port 55750 ssh2
Aug  5 13:16:37 rocket sshd[21615]: Failed password for root from 123.132.237.18 port 47236 ssh2
...
2020-08-05 23:54:53
187.94.99.242 attackbots
Unauthorized connection attempt from IP address 187.94.99.242 on Port 445(SMB)
2020-08-06 00:17:52
120.70.99.15 attack
Aug  5 15:55:25 eventyay sshd[32440]: Failed password for root from 120.70.99.15 port 34281 ssh2
Aug  5 16:00:18 eventyay sshd[32583]: Failed password for root from 120.70.99.15 port 56169 ssh2
...
2020-08-05 23:42:50
201.208.228.1 attack
Unauthorized connection attempt from IP address 201.208.228.1 on Port 445(SMB)
2020-08-05 23:48:56
45.141.84.124 attack
Fail2Ban Ban Triggered
2020-08-05 23:59:55
42.113.229.229 attackspambots
1596629794 - 08/05/2020 19:16:34 Host: 42.113.229.229/42.113.229.229 Port: 23 TCP Blocked
...
2020-08-05 23:59:09
192.116.190.142 attackspambots
Automatic report - Port Scan Attack
2020-08-06 00:05:12
112.19.94.19 attackbots
Coordinated SSH brute-force attack from different IPs. pam_unix(sshd:auth): user=root
2020-08-06 00:14:06
167.71.72.70 attackspam
Aug  5 17:59:28 PorscheCustomer sshd[21078]: Failed password for root from 167.71.72.70 port 48054 ssh2
Aug  5 18:03:28 PorscheCustomer sshd[21199]: Failed password for root from 167.71.72.70 port 59482 ssh2
...
2020-08-06 00:10:58
110.139.117.195 attack
Automatic report - Port Scan Attack
2020-08-06 00:09:48

Recently Reported IPs

131.233.140.221 99.149.1.40 161.73.21.233 71.190.68.31
219.134.238.197 139.227.202.157 199.150.233.61 252.202.112.82
224.136.168.237 176.19.127.230 91.48.121.166 199.168.115.239
192.116.241.118 143.116.145.115 128.177.134.68 151.6.239.220
233.125.219.3 164.90.17.3 140.117.152.202 228.139.89.108