Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Shanghai

Region: Shanghai

Country: China

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 47.123.2.2
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 58979
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;47.123.2.2.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025060300 1800 900 604800 86400

;; Query time: 36 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Jun 03 16:30:17 CST 2025
;; MSG SIZE  rcvd: 103
Host info
Host 2.2.123.47.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 2.2.123.47.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
58.87.72.42 attackbotsspam
Time:     Thu Sep 24 21:17:17 2020 +0000
IP:       58.87.72.42 (CN/China/-)
Failures: 5 (sshd)
Interval: 3600 seconds
Blocked:  Permanent Block [LF_SSHD]

Log entries:

Sep 24 21:08:59 activeserver sshd[17470]: Failed password for invalid user deployment from 58.87.72.42 port 36309 ssh2
Sep 24 21:12:50 activeserver sshd[31360]: Invalid user ops from 58.87.72.42 port 20597
Sep 24 21:12:52 activeserver sshd[31360]: Failed password for invalid user ops from 58.87.72.42 port 20597 ssh2
Sep 24 21:17:12 activeserver sshd[9818]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=58.87.72.42  user=postgres
Sep 24 21:17:14 activeserver sshd[9818]: Failed password for postgres from 58.87.72.42 port 61422 ssh2
2020-09-25 08:17:28
137.74.206.80 attackspambots
CMS (WordPress or Joomla) login attempt.
2020-09-25 08:06:35
52.242.26.112 attack
Sep 25 09:58:50 localhost sshd[1352634]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=52.242.26.112  user=root
Sep 25 09:58:52 localhost sshd[1352634]: Failed password for root from 52.242.26.112 port 46035 ssh2
...
2020-09-25 08:05:28
46.101.165.62 attack
firewall-block, port(s): 12377/tcp
2020-09-25 08:43:35
46.101.224.184 attackbotsspam
4x Failed Password
2020-09-25 08:13:14
222.186.175.183 attackspam
Scanned 49 times in the last 24 hours on port 22
2020-09-25 08:06:09
185.39.10.25 attackbots
ET DROP Spamhaus DROP Listed Traffic Inbound group 23 - port: 5901 proto: tcp cat: Misc Attackbytes: 60
2020-09-25 08:35:03
122.51.41.44 attackspambots
Sep 24 13:45:45 php1 sshd\[31264\]: Invalid user admin1 from 122.51.41.44
Sep 24 13:45:45 php1 sshd\[31264\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.51.41.44
Sep 24 13:45:47 php1 sshd\[31264\]: Failed password for invalid user admin1 from 122.51.41.44 port 59856 ssh2
Sep 24 13:51:15 php1 sshd\[31737\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.51.41.44  user=root
Sep 24 13:51:16 php1 sshd\[31737\]: Failed password for root from 122.51.41.44 port 44816 ssh2
2020-09-25 08:39:58
88.99.213.228 attack
Blocked by Sophos UTM Network Protection . /    / proto=6  .  srcport=443  .  dstport=50882  .     (3327)
2020-09-25 08:22:42
137.116.145.16 attack
SSH bruteforce
2020-09-25 08:20:26
149.56.13.111 attackspam
SSH bruteforce attack
2020-09-25 08:16:40
20.55.201.39 attackspam
Sep 25 02:24:34 fhem-rasp sshd[28865]: Invalid user nowbridge from 20.55.201.39 port 62302
...
2020-09-25 08:24:44
129.204.82.4 attackspam
SSH Invalid Login
2020-09-25 08:35:33
2.237.133.169 attackbots
Ssh brute force
2020-09-25 08:23:14
61.177.172.177 attack
Sep 25 02:08:22 sso sshd[21644]: Failed password for root from 61.177.172.177 port 23780 ssh2
Sep 25 02:08:25 sso sshd[21644]: Failed password for root from 61.177.172.177 port 23780 ssh2
...
2020-09-25 08:17:09

Recently Reported IPs

8.153.162.249 139.224.32.76 101.132.27.61 8.153.205.79
8.153.202.73 8.153.196.17 47.123.3.206 47.123.3.151
139.224.226.152 101.132.243.216 104.234.115.58 64.62.156.152
64.62.156.157 38.244.3.57 62.72.182.94 149.88.206.192
206.168.34.59 46.101.123.232 43.143.236.36 47.97.111.180