Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Multicast Address

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 239.130.247.148
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 9321
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;239.130.247.148.		IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025022200 1800 900 604800 86400

;; Query time: 34 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Feb 22 15:43:30 CST 2025
;; MSG SIZE  rcvd: 108
Host info
Host 148.247.130.239.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 148.247.130.239.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
201.42.217.123 attackspam
Jul 14 13:05:23 our-server-hostname sshd[31522]: Invalid user simple from 201.42.217.123
Jul 14 13:05:23 our-server-hostname sshd[31522]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=201-42-217-123.dsl.telesp.net.br 
Jul 14 13:05:25 our-server-hostname sshd[31522]: Failed password for invalid user simple from 201.42.217.123 port 47778 ssh2
Jul 14 13:06:29 our-server-hostname sshd[31645]: Invalid user mcf from 201.42.217.123
Jul 14 13:06:29 our-server-hostname sshd[31645]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=201-42-217-123.dsl.telesp.net.br 


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=201.42.217.123
2020-07-16 02:55:18
27.97.68.207 attackbots
Unauthorized connection attempt from IP address 27.97.68.207 on Port 445(SMB)
2020-07-16 02:42:12
40.79.25.254 attackbotsspam
$f2bV_matches
2020-07-16 03:11:04
52.231.97.41 attackbots
2020-07-15T14:52:39.691674sorsha.thespaminator.com sshd[12413]: Invalid user rebecca from 52.231.97.41 port 64258
2020-07-15T14:52:41.773479sorsha.thespaminator.com sshd[12413]: Failed password for invalid user rebecca from 52.231.97.41 port 64258 ssh2
...
2020-07-16 03:05:31
50.50.50.53 attackspam
Trying ports that it shouldn't be.
2020-07-16 02:57:24
104.41.59.240 attack
Brute-force attempt banned
2020-07-16 03:12:38
52.186.141.36 attackbotsspam
Jul 15 20:50:11 icecube sshd[25548]: Failed password for root from 52.186.141.36 port 31713 ssh2
2020-07-16 03:01:26
52.187.76.241 attack
Jul 15 20:59:18 icecube sshd[25737]: Failed password for root from 52.187.76.241 port 54461 ssh2
2020-07-16 03:02:46
93.38.114.55 attack
Coordinated SSH brute-force attack from different IPs. pam_unix(sshd:auth):
2020-07-16 03:16:06
218.22.36.135 attackspam
$f2bV_matches
2020-07-16 02:43:06
216.83.45.162 attackspambots
Jul 15 09:40:59 pixelmemory sshd[3032046]: Invalid user jm from 216.83.45.162 port 49534
Jul 15 09:40:59 pixelmemory sshd[3032046]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=216.83.45.162 
Jul 15 09:40:59 pixelmemory sshd[3032046]: Invalid user jm from 216.83.45.162 port 49534
Jul 15 09:41:01 pixelmemory sshd[3032046]: Failed password for invalid user jm from 216.83.45.162 port 49534 ssh2
Jul 15 09:45:29 pixelmemory sshd[3045823]: Invalid user guest from 216.83.45.162 port 55712
...
2020-07-16 03:17:29
207.46.226.112 attack
Jul 15 12:45:29 mail sshd\[57880\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=207.46.226.112  user=root
...
2020-07-16 02:51:55
159.65.11.253 attack
2020-07-15T23:35:19.918658SusPend.routelink.net.id sshd[84452]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=dev.plus.goline.id
2020-07-15T23:35:19.910939SusPend.routelink.net.id sshd[84452]: Invalid user gopi from 159.65.11.253 port 36412
2020-07-15T23:35:21.787688SusPend.routelink.net.id sshd[84452]: Failed password for invalid user gopi from 159.65.11.253 port 36412 ssh2
...
2020-07-16 03:02:21
103.124.152.208 attackspam
Unauthorized connection attempt from IP address 103.124.152.208 on Port 445(SMB)
2020-07-16 03:08:50
52.230.16.120 attackbots
Jul 15 13:05:57 mail sshd\[37692\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=52.230.16.120  user=root
...
2020-07-16 02:41:44

Recently Reported IPs

84.62.251.13 176.138.227.117 26.181.15.160 62.154.165.253
150.37.254.219 108.6.210.74 95.146.132.181 193.147.56.255
38.45.36.216 130.19.223.68 43.20.198.58 142.224.44.80
235.88.251.231 186.254.93.1 192.38.57.149 242.196.228.126
195.89.125.195 218.0.187.128 132.184.73.2 255.207.10.15