Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: IANA Special-Purpose Address

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 247.53.166.242
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 48981
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;247.53.166.242.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025022400 1800 900 604800 86400

;; Query time: 38 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Feb 24 16:34:11 CST 2025
;; MSG SIZE  rcvd: 107
Host info
Host 242.166.53.247.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 242.166.53.247.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
178.128.213.91 attackspambots
Oct  7 01:50:39 legacy sshd[31504]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.128.213.91
Oct  7 01:50:41 legacy sshd[31504]: Failed password for invalid user Qwerty!@# from 178.128.213.91 port 38584 ssh2
Oct  7 01:55:21 legacy sshd[31618]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.128.213.91
...
2019-10-07 07:57:51
106.12.113.223 attack
Oct  7 04:12:40 www_kotimaassa_fi sshd[22108]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.113.223
Oct  7 04:12:42 www_kotimaassa_fi sshd[22108]: Failed password for invalid user P4ssw0rt@2017 from 106.12.113.223 port 44786 ssh2
...
2019-10-07 12:23:50
192.99.244.145 attackspambots
2019-10-06T23:46:16.606916abusebot-5.cloudsearch.cf sshd\[16724\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=145.ip-192-99-244.net  user=root
2019-10-07 07:56:14
222.186.190.17 attackbots
Oct  7 01:36:39 localhost sshd\[28310\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.190.17  user=root
Oct  7 01:36:42 localhost sshd\[28310\]: Failed password for root from 222.186.190.17 port 13997 ssh2
Oct  7 01:36:44 localhost sshd\[28310\]: Failed password for root from 222.186.190.17 port 13997 ssh2
2019-10-07 07:50:42
77.40.11.88 attackspambots
10/07/2019-01:53:29.334910 77.40.11.88 Protocol: 6 SURICATA SMTP tls rejected
2019-10-07 07:56:38
138.68.218.135 attack
MultiHost/MultiPort Probe, Scan, Hack -
2019-10-07 12:11:46
95.90.142.55 attackbots
2019-10-07T03:54:28.223107abusebot-5.cloudsearch.cf sshd\[18277\]: Invalid user desmond from 95.90.142.55 port 43216
2019-10-07 12:22:25
106.12.48.30 attackspambots
Oct  7 04:12:46 localhost sshd\[94016\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.48.30  user=root
Oct  7 04:12:48 localhost sshd\[94016\]: Failed password for root from 106.12.48.30 port 50250 ssh2
Oct  7 04:17:24 localhost sshd\[94132\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.48.30  user=root
Oct  7 04:17:26 localhost sshd\[94132\]: Failed password for root from 106.12.48.30 port 57898 ssh2
Oct  7 04:21:58 localhost sshd\[94268\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.48.30  user=root
...
2019-10-07 12:22:37
103.228.112.39 attackbots
Automatic report - XMLRPC Attack
2019-10-07 07:54:25
94.83.227.81 attackbots
DATE:2019-10-07 05:54:22, IP:94.83.227.81, PORT:telnet Telnet brute force auth on honeypot server (honey-neo-dc)
2019-10-07 12:25:57
88.88.193.230 attackbots
Oct  6 23:52:01 legacy sshd[28788]: Failed password for root from 88.88.193.230 port 40042 ssh2
Oct  6 23:56:06 legacy sshd[28876]: Failed password for root from 88.88.193.230 port 60310 ssh2
...
2019-10-07 07:59:22
218.92.0.173 attackspam
Oct  6 15:47:00 123flo sshd[50734]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.173  user=root
Oct  6 15:47:02 123flo sshd[50734]: Failed password for root from 218.92.0.173 port 5852 ssh2
2019-10-07 07:49:18
80.211.172.148 attackbotsspam
SSH Brute-Forcing (ownc)
2019-10-07 07:54:44
139.199.133.160 attackspam
Oct  6 18:11:59 eddieflores sshd\[2228\]: Invalid user 111@abcd from 139.199.133.160
Oct  6 18:11:59 eddieflores sshd\[2228\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.199.133.160
Oct  6 18:12:01 eddieflores sshd\[2228\]: Failed password for invalid user 111@abcd from 139.199.133.160 port 46366 ssh2
Oct  6 18:16:37 eddieflores sshd\[2656\]: Invalid user Admin@005 from 139.199.133.160
Oct  6 18:16:37 eddieflores sshd\[2656\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.199.133.160
2019-10-07 12:17:29
183.61.109.23 attackspam
Oct  7 05:58:21 legacy sshd[7170]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=183.61.109.23
Oct  7 05:58:23 legacy sshd[7170]: Failed password for invalid user Qwer@2018 from 183.61.109.23 port 37593 ssh2
Oct  7 06:03:22 legacy sshd[7343]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=183.61.109.23
...
2019-10-07 12:13:08

Recently Reported IPs

97.141.85.101 51.222.11.60 171.48.106.212 224.214.42.115
47.144.173.231 204.134.49.143 252.5.133.201 201.79.228.108
161.16.148.16 186.170.188.211 35.107.13.204 202.60.189.103
114.34.172.2 65.255.53.13 114.215.97.13 181.35.159.151
87.91.85.88 51.215.213.34 36.55.74.8 24.30.10.239