Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Germany

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 2.247.254.159
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 60467
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;2.247.254.159.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025020600 1800 900 604800 86400

;; Query time: 16 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Feb 06 23:23:58 CST 2025
;; MSG SIZE  rcvd: 106
Host info
159.254.247.2.in-addr.arpa domain name pointer dynamic-002-247-254-159.2.247.pool.telefonica.de.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
159.254.247.2.in-addr.arpa	name = dynamic-002-247-254-159.2.247.pool.telefonica.de.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
51.77.226.68 attack
Invalid user virgilio from 51.77.226.68 port 32920
2020-09-01 05:10:06
85.206.26.249 attackbotsspam
31.08.2020 23:14:14 - RDP Login Fail Detected by 
https://www.elinox.de/RDP-Wächter
2020-09-01 05:15:24
217.163.30.51 spam
wear is my gift am not anderstand
2020-09-01 04:45:39
14.168.144.191 attackspam
Brute forcing RDP port 3389
2020-09-01 05:17:50
113.160.54.78 attackbots
Automatic report - Banned IP Access
2020-09-01 05:11:25
31.28.8.163 attackbots
Invalid user ubnt from 31.28.8.163 port 40344
2020-09-01 04:43:34
187.149.81.107 attackspambots
1598876888 - 08/31/2020 14:28:08 Host: 187.149.81.107/187.149.81.107 Port: 445 TCP Blocked
2020-09-01 04:51:32
95.163.255.138 attackspambots
Automated report (2020-09-01T05:14:07+08:00). Spambot detected.
2020-09-01 05:18:34
195.181.166.148 attackbotsspam
PHI,DEF GET /phpmyadmin/
2020-09-01 05:05:54
31.207.33.100 attackbotsspam
$f2bV_matches
2020-09-01 05:14:26
115.236.67.42 attackspam
Invalid user thor from 115.236.67.42 port 7097
2020-09-01 04:58:13
142.93.97.13 attack
142.93.97.13 - - [31/Aug/2020:15:09:47 +0200] "GET /wp-login.php HTTP/1.1" 200 9040 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
142.93.97.13 - - [31/Aug/2020:15:09:49 +0200] "POST /wp-login.php HTTP/1.1" 200 9291 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
142.93.97.13 - - [31/Aug/2020:15:09:54 +0200] "POST /xmlrpc.php HTTP/1.1" 200 427 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
2020-09-01 05:07:57
181.48.138.242 attack
Aug 31 23:10:48 inter-technics sshd[12220]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=181.48.138.242  user=root
Aug 31 23:10:50 inter-technics sshd[12220]: Failed password for root from 181.48.138.242 port 41402 ssh2
Aug 31 23:14:44 inter-technics sshd[12386]: Invalid user bruno from 181.48.138.242 port 45306
Aug 31 23:14:44 inter-technics sshd[12386]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=181.48.138.242
Aug 31 23:14:44 inter-technics sshd[12386]: Invalid user bruno from 181.48.138.242 port 45306
Aug 31 23:14:46 inter-technics sshd[12386]: Failed password for invalid user bruno from 181.48.138.242 port 45306 ssh2
...
2020-09-01 05:21:01
82.99.171.211 attack
82.99.171.211 - - [31/Aug/2020:22:37:18 +0200] "GET /wp-login.php HTTP/1.1" 200 1689 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
82.99.171.211 - - [31/Aug/2020:22:37:23 +0200] "POST /wp-login.php HTTP/1.1" 200 1811 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
82.99.171.211 - - [31/Aug/2020:22:37:23 +0200] "GET /wp-login.php HTTP/1.1" 200 1689 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
82.99.171.211 - - [31/Aug/2020:22:37:23 +0200] "POST /wp-login.php HTTP/1.1" 200 1790 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
82.99.171.211 - - [31/Aug/2020:22:37:23 +0200] "GET /wp-login.php HTTP/1.1" 200 1689 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
82.99.171.211 - - [31/Aug/2020:22:37:23 +0200] "POST /wp-login.php HTTP/1.1" 200 1790 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Fir
...
2020-09-01 04:59:58
179.184.57.194 attackbots
2020-08-31T14:24:25.704355amanda2.illicoweb.com sshd\[27413\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=179.184.57.194  user=ftp
2020-08-31T14:24:28.365797amanda2.illicoweb.com sshd\[27413\]: Failed password for ftp from 179.184.57.194 port 31225 ssh2
2020-08-31T14:27:55.322918amanda2.illicoweb.com sshd\[27600\]: Invalid user cactiuser from 179.184.57.194 port 46843
2020-08-31T14:27:55.328634amanda2.illicoweb.com sshd\[27600\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=179.184.57.194
2020-08-31T14:27:57.152038amanda2.illicoweb.com sshd\[27600\]: Failed password for invalid user cactiuser from 179.184.57.194 port 46843 ssh2
...
2020-09-01 04:57:43

Recently Reported IPs

79.172.25.28 130.201.143.180 222.204.178.143 202.144.197.1
248.220.51.216 241.88.220.129 201.90.163.172 160.24.203.93
178.79.230.110 145.5.139.19 225.185.182.113 119.74.4.26
46.87.254.22 97.221.121.97 194.46.116.246 253.79.111.206
205.151.245.70 128.159.31.133 248.188.145.167 185.225.184.89