Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Giza

Region: Al Jizah

Country: Egypt

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
% This is the AfriNIC Whois server.
% The AFRINIC whois database is subject to  the following terms of Use. See https://afrinic.net/whois/terms

% Note: this output has been filtered.
%       To receive output for a database update, use the "-B" flag.

% Information related to '197.40.0.0 - 197.47.255.255'

% No abuse contact registered for 197.40.0.0 - 197.47.255.255

inetnum:        197.40.0.0 - 197.47.255.255
netname:        All-21
descr:          TE Data
country:        EG
admin-c:        TDCR1-AFRINIC
tech-c:         TDCR2-AFRINIC
status:         ASSIGNED PA
remarks:        ====================================================
remarks:        For Internet Abuse & Spam reports : admins@tedata.net
remarks:        ====================================================
mnt-by:         TE-Data-MNT
source:         AFRINIC # Filtered
parent:         197.32.0.0 - 197.63.255.255

role:           TE Data Contact Role
address:        TE Data, Smart Village, Building A11-B90, Alex Desert Road,
address:        28 Km, 6th October 12577, Giza, Egypt
phone:          tel:+20-2-33320700
fax-no:         tel:+20-2-33320800
admin-c:        MH7-AFRINIC
tech-c:         TDCR2-AFRINIC
nic-hdl:        TDCR1-AFRINIC
abuse-mailbox:  abuse@te.eg
mnt-by:         TE-Data-MNT
source:         AFRINIC # Filtered

role:           TE Data Contact Role-2
address:        TE Data, Smart Village, Building A11-B90, Alex Desert Road,
address:        28 Km, 6th October 12577, Giza, Egypt
phone:          tel:+20-2-33320700
fax-no:         tel:+20-2-33320800
admin-c:        MH7-AFRINIC
tech-c:         TDCR1-AFRINIC
nic-hdl:        TDCR2-AFRINIC
abuse-mailbox:  abuse@te.eg
mnt-by:         TE-Data-MNT
source:         AFRINIC # Filtered

% Information related to '197.47.208.0/24AS8452'

route:          197.47.208.0/24
descr:          Telecom-Egypt-Data
origin:         AS8452
mnt-lower:      GEGA-MNT
mnt-by:         AFRINIC-HM-MNT
source:         AFRINIC # Filtered
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 197.47.208.244
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 9529
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;197.47.208.244.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025120100 1800 900 604800 86400

;; Query time: 25 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Dec 01 20:31:57 CST 2025
;; MSG SIZE  rcvd: 107
Host info
Host 244.208.47.197.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 244.208.47.197.in-addr.arpa: NXDOMAIN

Related IP info:
Related comments:
IP Type Details Datetime
104.140.188.26 attackspam
[MySQL inject/portscan] tcp/3306
*(RWIN=1024)(03171230)
2020-03-17 21:17:16
156.221.216.71 attackspambots
Unauthorized connection attempt detected from IP address 156.221.216.71 to port 23
2020-03-17 21:55:57
177.181.183.89 attackspam
Unauthorized connection attempt detected from IP address 177.181.183.89 to port 85
2020-03-17 21:50:19
185.148.84.131 attack
Unauthorized connection attempt detected from IP address 185.148.84.131 to port 445
2020-03-17 21:46:38
184.105.247.252 attackspam
Unauthorized connection attempt detected from IP address 184.105.247.252 to port 6379
2020-03-17 21:47:15
78.130.151.140 attackspam
Unauthorized connection attempt detected from IP address 78.130.151.140 to port 23
2020-03-17 21:22:43
41.45.53.142 attackspam
Unauthorized connection attempt detected from IP address 41.45.53.142 to port 23
2020-03-17 21:30:23
185.142.236.35 attack
Unauthorized connection attempt detected from IP address 185.142.236.35 to port 9042
2020-03-17 21:07:39
213.91.120.2 attackbotsspam
Unauthorized connection attempt detected from IP address 213.91.120.2 to port 23
2020-03-17 21:38:50
181.120.168.46 attackspambots
Unauthorized connection attempt detected from IP address 181.120.168.46 to port 8000
2020-03-17 21:09:50
69.165.230.239 attackbotsspam
CA_TekSavvy
Customer_<177>1584444923 [1:2403410:56045] ET CINS Active Threat Intelligence Poor Reputation IP TCP group 56 [Classification: Misc Attack] [Priority: 2]:  {TCP} 69.165.230.239:24093
2020-03-17 21:24:10
96.94.77.233 attack
Unauthorized connection attempt detected from IP address 96.94.77.233 to port 23
2020-03-17 21:18:18
82.221.105.7 attack
Unauthorized connection attempt detected from IP address 82.221.105.7 to port 9869
2020-03-17 21:21:46
1.249.31.138 attackspambots
Unauthorized connection attempt detected from IP address 1.249.31.138 to port 4567
2020-03-17 21:35:48
177.35.185.60 attackbots
Unauthorized connection attempt detected from IP address 177.35.185.60 to port 8080
2020-03-17 21:51:28

Recently Reported IPs

47.237.110.150 212.57.185.186 185.247.137.191 57.141.2.87
23.165.105.116 111.173.140.80 159.203.47.80 162.243.58.13
20.15.160.31 20.65.219.49 200.29.230.70 191.37.252.32
44.223.61.94 44.212.68.158 44.202.30.64 3.92.226.187
149.50.108.114 54.157.157.161 36.251.137.187 20.169.107.13