Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States of America (the)

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 204.108.49.147
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 56523
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;204.108.49.147.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025021500 1800 900 604800 86400

;; Query time: 34 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Feb 15 23:23:23 CST 2025
;; MSG SIZE  rcvd: 107
Host info
Host 147.49.108.204.in-addr.arpa not found: 2(SERVFAIL)
Nslookup info:
server can't find 204.108.49.147.in-addr.arpa: SERVFAIL
Related IP info:
Related comments:
IP Type Details Datetime
77.103.207.152 attack
Aug 28 14:28:27 XXXXXX sshd[22930]: Invalid user hynexus from 77.103.207.152 port 35440
2020-08-29 02:31:32
189.240.225.205 attackbots
2020-08-28T19:30:42.390074mail.broermann.family sshd[9237]: Invalid user aaaaa from 189.240.225.205 port 37212
2020-08-28T19:30:42.394506mail.broermann.family sshd[9237]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=189.240.225.205
2020-08-28T19:30:42.390074mail.broermann.family sshd[9237]: Invalid user aaaaa from 189.240.225.205 port 37212
2020-08-28T19:30:43.920991mail.broermann.family sshd[9237]: Failed password for invalid user aaaaa from 189.240.225.205 port 37212 ssh2
2020-08-28T19:34:19.304367mail.broermann.family sshd[9360]: Invalid user cs from 189.240.225.205 port 44342
...
2020-08-29 02:16:45
123.30.149.34 attackspam
Aug 28 17:10:41 XXX sshd[51775]: Invalid user admin from 123.30.149.34 port 33200
2020-08-29 02:26:18
218.186.168.135 attackbots
Lines containing failures of 218.186.168.135
/var/log/mail.err:Aug 28 13:56:30 server01 postfix/smtpd[5376]: warning: hostname 135.168.186.218.starhub.net.sg does not resolve to address 218.186.168.135: Name or service not known
/var/log/apache/pucorp.org.log:Aug 28 13:56:30 server01 postfix/smtpd[5376]: warning: hostname 135.168.186.218.starhub.net.sg does not resolve to address 218.186.168.135: Name or service not known
/var/log/apache/pucorp.org.log:Aug 28 13:56:30 server01 postfix/smtpd[5376]: connect from unknown[218.186.168.135]
/var/log/apache/pucorp.org.log:Aug x@x
/var/log/apache/pucorp.org.log:Aug x@x
/var/log/apache/pucorp.org.log:Aug 28 13:56:32 server01 postfix/policy-spf[5450]: : Policy action=550 Please see hxxp://www.openspf.org/Why?s=mfrom;id=robert_turner22%40johnlewis.com;ip=218.186.168.135;r=server01.2800km.de
/var/log/apache/pucorp.org.log:Aug x@x
/var/log/apache/pucorp.org.log:Aug 28 13:56:33 server01 postfix/smtpd[5376]: disconnect from unknown[218........
------------------------------
2020-08-29 01:56:03
117.57.62.120 attackspambots
28-8-2020 13:59:46	Unauthorized connection attempt (Brute-Force).
28-8-2020 13:59:46	Connection from IP address: 117.57.62.120 on port: 587


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=117.57.62.120
2020-08-29 02:06:06
190.233.207.90 attack
Invalid user kim from 190.233.207.90 port 42393
2020-08-29 02:03:05
139.99.125.84 attackspambots
Port probing on unauthorized port 22
2020-08-29 02:11:39
141.98.10.211 attack
Aug 28 17:53:22 *** sshd[13614]: Invalid user admin from 141.98.10.211
2020-08-29 02:01:21
96.83.189.229 attack
Invalid user lily from 96.83.189.229 port 54780
2020-08-29 02:09:33
157.245.43.135 attackspam
port scan and connect, tcp 8000 (http-alt)
2020-08-29 02:00:12
123.18.209.111 attackspambots
Brute forcing RDP port 3389
2020-08-29 02:03:42
103.230.241.16 attackbots
Invalid user lf from 103.230.241.16 port 36936
2020-08-29 01:58:53
212.70.149.20 attackspambots
Aug 28 19:47:55 galaxy event: galaxy/lswi: smtp: netid@uni-potsdam.de [212.70.149.20] authentication failure using internet password
Aug 28 19:48:21 galaxy event: galaxy/lswi: smtp: m-test@uni-potsdam.de [212.70.149.20] authentication failure using internet password
Aug 28 19:48:47 galaxy event: galaxy/lswi: smtp: mtc@uni-potsdam.de [212.70.149.20] authentication failure using internet password
Aug 28 19:49:13 galaxy event: galaxy/lswi: smtp: mta4@uni-potsdam.de [212.70.149.20] authentication failure using internet password
Aug 28 19:49:39 galaxy event: galaxy/lswi: smtp: mq@uni-potsdam.de [212.70.149.20] authentication failure using internet password
...
2020-08-29 01:54:44
77.121.81.204 attackbotsspam
$f2bV_matches
2020-08-29 02:14:32
180.104.91.40 attackbotsspam
Mail/25/465/587-993/995 Probe, Reject, BadAuth, Hack, SPAM -
2020-08-29 02:05:08

Recently Reported IPs

27.136.162.126 43.118.234.236 244.147.53.119 177.122.73.224
6.222.27.46 207.190.223.30 146.225.97.135 173.169.168.139
8.17.63.197 70.232.151.166 223.48.151.97 235.18.183.170
39.178.140.27 160.64.49.231 52.97.13.11 207.159.242.158
43.75.14.85 179.241.22.153 36.98.174.182 232.180.110.126