Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Hong Kong

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 20.2.143.247
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 65449
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;20.2.143.247.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025013100 1800 900 604800 86400

;; Query time: 18 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Jan 31 13:50:55 CST 2025
;; MSG SIZE  rcvd: 105
Host info
Host 247.143.2.20.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 247.143.2.20.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
80.82.78.39 attackspambots
ET CINS Active Threat Intelligence Poor Reputation IP group 68 - port: 8089 proto: tcp cat: Misc Attackbytes: 60
2020-09-30 23:43:43
93.174.93.195 attackspambots
ET CINS Active Threat Intelligence Poor Reputation IP group 81 - port: 10003 proto: udp cat: Misc Attackbytes: 71
2020-09-30 23:36:49
170.130.187.2 attack
 TCP (SYN) 170.130.187.2:62860 -> port 21, len 44
2020-10-01 00:01:04
104.206.128.38 attack
Telnet/23 MH Probe, Scan, BF, Hack -
2020-09-30 23:33:58
36.103.222.105 attack
ET CINS Active Threat Intelligence Poor Reputation IP group 16 - port: 2375 proto: tcp cat: Misc Attackbytes: 60
2020-09-30 23:52:23
45.129.33.15 attackspambots
 TCP (SYN) 45.129.33.15:49148 -> port 2888, len 44
2020-09-30 23:50:36
104.206.128.26 attack
ET CINS Active Threat Intelligence Poor Reputation IP group 94 - port: 23 proto: tcp cat: Misc Attackbytes: 60
2020-09-30 23:34:17
104.236.55.217 attack
 TCP (SYN) 104.236.55.217:56414 -> port 24410, len 44
2020-09-30 23:33:00
92.118.161.53 attackspam
" "
2020-09-30 23:37:19
103.219.112.31 attackspam
[N10.H2.VM2] Port Scanner Detected Blocked by UFW
2020-09-30 23:34:48
82.202.197.233 attack
ET CINS Active Threat Intelligence Poor Reputation IP group 70 - port: 50061 proto: tcp cat: Misc Attackbytes: 60
2020-09-30 23:43:08
103.253.145.89 attackspam
2020-09-30T18:01:06.786544ks3355764 sshd[15550]: Failed password for root from 103.253.145.89 port 56834 ssh2
2020-09-30T18:05:10.921620ks3355764 sshd[15581]: Invalid user sistema from 103.253.145.89 port 59584
...
2020-10-01 00:08:09
45.143.221.92 attackbots
[N3.H3.VM3] Port Scanner Detected Blocked by UFW
2020-09-30 23:47:03
106.75.105.110 attackbotsspam
Invalid user dropbox from 106.75.105.110 port 45254
2020-10-01 00:06:41
170.130.187.38 attackspam
Icarus honeypot on github
2020-10-01 00:00:42

Recently Reported IPs

131.216.114.4 211.134.150.14 186.214.82.229 116.33.56.246
151.137.191.49 8.65.141.31 122.234.238.250 98.198.219.22
119.23.18.188 167.143.164.25 97.66.205.210 115.102.116.122
22.5.10.71 30.26.229.17 164.152.239.121 214.155.210.224
199.21.177.101 122.17.61.170 133.185.249.77 109.139.199.57