Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Singapore

Region: Central Singapore Community Development Council

Country: Singapore

Internet Service Provider: unknown

Hostname: unknown

Organization: Amazon.com, Inc.

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:

; <<>> DiG 9.10.3-P4-Ubuntu <<>> 3.0.147.199
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 48235
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;3.0.147.199.			IN	A

;; AUTHORITY SECTION:
.			3600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019041101 1800 900 604800 86400

;; Query time: 2 msec
;; SERVER: 67.207.67.3#53(67.207.67.3)
;; WHEN: Thu Apr 11 22:53:01 +08 2019
;; MSG SIZE  rcvd: 115

Host info
199.147.0.3.in-addr.arpa domain name pointer ec2-3-0-147-199.ap-southeast-1.compute.amazonaws.com.
Nslookup info:
Server:		67.207.67.3
Address:	67.207.67.3#53

Non-authoritative answer:
199.147.0.3.in-addr.arpa	name = ec2-3-0-147-199.ap-southeast-1.compute.amazonaws.com.

Authoritative answers can be found from:

Related IP info:
Related comments:
IP Type Details Datetime
201.191.53.177 attack
Automatic report - Port Scan Attack
2020-06-27 00:52:51
206.189.210.235 attack
Jun 26 17:39:04 h1745522 sshd[14120]: Invalid user ubuntu from 206.189.210.235 port 48050
Jun 26 17:39:04 h1745522 sshd[14120]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=206.189.210.235
Jun 26 17:39:04 h1745522 sshd[14120]: Invalid user ubuntu from 206.189.210.235 port 48050
Jun 26 17:39:07 h1745522 sshd[14120]: Failed password for invalid user ubuntu from 206.189.210.235 port 48050 ssh2
Jun 26 17:42:27 h1745522 sshd[14253]: Invalid user jjq from 206.189.210.235 port 40122
Jun 26 17:42:27 h1745522 sshd[14253]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=206.189.210.235
Jun 26 17:42:27 h1745522 sshd[14253]: Invalid user jjq from 206.189.210.235 port 40122
Jun 26 17:42:29 h1745522 sshd[14253]: Failed password for invalid user jjq from 206.189.210.235 port 40122 ssh2
Jun 26 17:45:48 h1745522 sshd[14355]: Invalid user bot from 206.189.210.235 port 32202
...
2020-06-27 00:33:46
122.152.195.84 attackbotsspam
2020-06-26T12:11:33.609453xentho-1 sshd[683481]: Invalid user bernard from 122.152.195.84 port 41918
2020-06-26T12:11:35.630495xentho-1 sshd[683481]: Failed password for invalid user bernard from 122.152.195.84 port 41918 ssh2
2020-06-26T12:13:27.799262xentho-1 sshd[683500]: Invalid user dle from 122.152.195.84 port 35266
2020-06-26T12:13:27.804569xentho-1 sshd[683500]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.152.195.84
2020-06-26T12:13:27.799262xentho-1 sshd[683500]: Invalid user dle from 122.152.195.84 port 35266
2020-06-26T12:13:29.804484xentho-1 sshd[683500]: Failed password for invalid user dle from 122.152.195.84 port 35266 ssh2
2020-06-26T12:15:16.272461xentho-1 sshd[683510]: Invalid user factorio from 122.152.195.84 port 56840
2020-06-26T12:15:16.280710xentho-1 sshd[683510]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.152.195.84
2020-06-26T12:15:16.272461xentho-1 sshd[683510]: In
...
2020-06-27 00:40:53
106.243.2.244 attackspambots
Jun 26 13:22:20 pve1 sshd[1593]: Failed password for root from 106.243.2.244 port 45088 ssh2
...
2020-06-27 00:23:10
95.155.56.31 attack
 TCP (SYN) 95.155.56.31:57291 -> port 139, len 40
2020-06-27 00:32:47
103.126.247.60 attackspambots
26-6-2020 13:20:31	Unauthorized connection attempt (Brute-Force).
26-6-2020 13:20:31	Connection from IP address: 103.126.247.60 on port: 465


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=103.126.247.60
2020-06-27 00:18:22
157.230.112.34 attackspam
SSH Bruteforce attack
2020-06-27 00:12:40
164.52.106.199 attack
Jun 26 15:51:50 jumpserver sshd[227423]: Invalid user gian from 164.52.106.199 port 58612
Jun 26 15:51:51 jumpserver sshd[227423]: Failed password for invalid user gian from 164.52.106.199 port 58612 ssh2
Jun 26 15:55:47 jumpserver sshd[227471]: Invalid user martin from 164.52.106.199 port 44600
...
2020-06-27 00:10:31
141.98.81.209 attackbots
Jun 26 16:08:58 *** sshd[10957]: User root from 141.98.81.209 not allowed because not listed in AllowUsers
2020-06-27 00:15:36
51.161.12.231 attackspam
SmallBizIT.US 5 packets to tcp(8545)
2020-06-27 00:11:15
111.229.43.27 attackspambots
$f2bV_matches
2020-06-27 00:47:34
125.16.195.253 attackspam
Unauthorised access (Jun 26) SRC=125.16.195.253 LEN=52 TTL=111 ID=27321 DF TCP DPT=445 WINDOW=8192 SYN 
Unauthorised access (Jun 25) SRC=125.16.195.253 LEN=52 TTL=111 ID=2069 DF TCP DPT=445 WINDOW=8192 SYN
2020-06-27 00:49:26
69.174.91.45 attackbots
fell into ViewStateTrap:madrid
2020-06-27 00:10:17
80.231.219.134 attack
[H1] Blocked by UFW
2020-06-27 00:24:34
52.255.149.196 attackspambots
SCAN: Host Sweep CloudCIX Reconnaissance Scan Detected, PTR: PTR record not found
2020-06-27 00:17:14

Recently Reported IPs

68.183.69.73 222.127.118.201 213.238.235.21 138.197.165.56
154.125.229.242 168.205.194.143 207.148.76.33 40.107.3.87
37.239.90.75 151.33.250.195 58.247.92.2 167.99.69.43
142.44.137.157 41.47.55.206 122.152.207.30 94.23.251.149
195.201.143.46 180.254.139.248 182.91.244.134 50.63.197.197