Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Cerritos

Region: California

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 47.145.121.239
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 54893
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;47.145.121.239.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025021202 1800 900 604800 86400

;; Query time: 18 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Feb 13 12:38:09 CST 2025
;; MSG SIZE  rcvd: 107
Host info
Host 239.121.145.47.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 239.121.145.47.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
222.186.180.147 attackbots
May 14 23:50:30 eventyay sshd[341]: Failed password for root from 222.186.180.147 port 24460 ssh2
May 14 23:50:44 eventyay sshd[341]: error: maximum authentication attempts exceeded for root from 222.186.180.147 port 24460 ssh2 [preauth]
May 14 23:50:49 eventyay sshd[370]: Failed password for root from 222.186.180.147 port 35528 ssh2
...
2020-05-15 05:51:41
49.233.88.126 attackbots
Fail2Ban - SSH Bruteforce Attempt
2020-05-15 05:53:12
62.210.54.33 attackspam
62.210.54.33 - - [16/Dec/2019:03:29:01 +0100] "GET /phpmyadmin/scripts/setup.php HTTP/1.1" 404 454
...
2020-05-15 05:51:04
45.13.93.90 attackbotsspam
firewall-block, port(s): 10080/tcp, 48678/tcp
2020-05-15 06:00:17
69.119.114.36 attack
2020-05-14T17:00:20.2900111495-001 sshd[47370]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=ool-45777224.dyn.optonline.net  user=root
2020-05-14T17:00:22.4111541495-001 sshd[47370]: Failed password for root from 69.119.114.36 port 35046 ssh2
2020-05-14T17:04:21.5446161495-001 sshd[47563]: Invalid user george from 69.119.114.36 port 38959
2020-05-14T17:04:21.5530881495-001 sshd[47563]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=ool-45777224.dyn.optonline.net
2020-05-14T17:04:21.5446161495-001 sshd[47563]: Invalid user george from 69.119.114.36 port 38959
2020-05-14T17:04:23.4287951495-001 sshd[47563]: Failed password for invalid user george from 69.119.114.36 port 38959 ssh2
...
2020-05-15 05:27:22
36.37.115.106 attackspambots
May 14 23:20:01 meumeu sshd[233102]: Invalid user vnc from 36.37.115.106 port 55606
May 14 23:20:01 meumeu sshd[233102]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=36.37.115.106 
May 14 23:20:01 meumeu sshd[233102]: Invalid user vnc from 36.37.115.106 port 55606
May 14 23:20:03 meumeu sshd[233102]: Failed password for invalid user vnc from 36.37.115.106 port 55606 ssh2
May 14 23:22:29 meumeu sshd[233442]: Invalid user support from 36.37.115.106 port 56832
May 14 23:22:29 meumeu sshd[233442]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=36.37.115.106 
May 14 23:22:29 meumeu sshd[233442]: Invalid user support from 36.37.115.106 port 56832
May 14 23:22:31 meumeu sshd[233442]: Failed password for invalid user support from 36.37.115.106 port 56832 ssh2
May 14 23:25:03 meumeu sshd[233813]: Invalid user zzz from 36.37.115.106 port 58058
...
2020-05-15 05:58:59
61.154.14.234 attack
May 14 20:46:32 ip-172-31-62-245 sshd\[9827\]: Invalid user asp from 61.154.14.234\
May 14 20:46:34 ip-172-31-62-245 sshd\[9827\]: Failed password for invalid user asp from 61.154.14.234 port 10926 ssh2\
May 14 20:49:50 ip-172-31-62-245 sshd\[9849\]: Failed password for ubuntu from 61.154.14.234 port 32867 ssh2\
May 14 20:56:09 ip-172-31-62-245 sshd\[9875\]: Invalid user teamspeak2 from 61.154.14.234\
May 14 20:56:11 ip-172-31-62-245 sshd\[9875\]: Failed password for invalid user teamspeak2 from 61.154.14.234 port 36529 ssh2\
2020-05-15 05:36:07
162.243.139.224 attackspam
trying to access non-authorized port
2020-05-15 05:59:41
102.177.145.221 attackbots
May 14 23:09:52 piServer sshd[30652]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=102.177.145.221 
May 14 23:09:54 piServer sshd[30652]: Failed password for invalid user root3 from 102.177.145.221 port 45138 ssh2
May 14 23:14:29 piServer sshd[31087]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=102.177.145.221 
...
2020-05-15 05:21:38
36.67.163.146 attackspam
May 14 23:27:15 meumeu sshd[234149]: Invalid user test from 36.67.163.146 port 37648
May 14 23:27:15 meumeu sshd[234149]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=36.67.163.146 
May 14 23:27:15 meumeu sshd[234149]: Invalid user test from 36.67.163.146 port 37648
May 14 23:27:17 meumeu sshd[234149]: Failed password for invalid user test from 36.67.163.146 port 37648 ssh2
May 14 23:30:06 meumeu sshd[234545]: Invalid user ts from 36.67.163.146 port 43282
May 14 23:30:06 meumeu sshd[234545]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=36.67.163.146 
May 14 23:30:06 meumeu sshd[234545]: Invalid user ts from 36.67.163.146 port 43282
May 14 23:30:08 meumeu sshd[234545]: Failed password for invalid user ts from 36.67.163.146 port 43282 ssh2
May 14 23:32:55 meumeu sshd[234955]: Invalid user guest from 36.67.163.146 port 48900
...
2020-05-15 05:46:27
191.109.57.4 attackbots
Automatic report - XMLRPC Attack
2020-05-15 05:45:08
92.154.127.87 attack
20/5/14@16:56:32: FAIL: Alarm-Network address from=92.154.127.87
20/5/14@16:56:32: FAIL: Alarm-Network address from=92.154.127.87
...
2020-05-15 05:23:19
142.93.60.53 attackbots
May 14 21:50:55 onepixel sshd[3598913]: Invalid user adeline from 142.93.60.53 port 60284
May 14 21:50:55 onepixel sshd[3598913]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.60.53 
May 14 21:50:55 onepixel sshd[3598913]: Invalid user adeline from 142.93.60.53 port 60284
May 14 21:50:57 onepixel sshd[3598913]: Failed password for invalid user adeline from 142.93.60.53 port 60284 ssh2
May 14 21:54:08 onepixel sshd[3599314]: Invalid user tracey from 142.93.60.53 port 39822
2020-05-15 05:56:21
94.191.23.15 attack
fail2ban/May 14 22:51:22 h1962932 sshd[24825]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=94.191.23.15  user=root
May 14 22:51:24 h1962932 sshd[24825]: Failed password for root from 94.191.23.15 port 56236 ssh2
May 14 22:55:56 h1962932 sshd[24938]: Invalid user student5 from 94.191.23.15 port 58632
May 14 22:55:56 h1962932 sshd[24938]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=94.191.23.15
May 14 22:55:56 h1962932 sshd[24938]: Invalid user student5 from 94.191.23.15 port 58632
May 14 22:55:57 h1962932 sshd[24938]: Failed password for invalid user student5 from 94.191.23.15 port 58632 ssh2
2020-05-15 05:42:40
149.202.133.43 attackspambots
May 14 23:28:41 vps sshd[247687]: Failed password for invalid user admin from 149.202.133.43 port 44542 ssh2
May 14 23:32:41 vps sshd[267265]: Invalid user sims from 149.202.133.43 port 40944
May 14 23:32:41 vps sshd[267265]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=ip43.ip-149-202-133.eu
May 14 23:32:43 vps sshd[267265]: Failed password for invalid user sims from 149.202.133.43 port 40944 ssh2
May 14 23:36:43 vps sshd[286376]: Invalid user joe from 149.202.133.43 port 37344
...
2020-05-15 05:38:51

Recently Reported IPs

62.212.207.140 153.58.22.223 70.44.91.16 171.68.196.74
83.10.122.100 83.190.43.183 198.150.185.73 145.149.90.13
169.47.135.162 34.217.13.89 117.173.150.130 28.128.32.179
222.205.122.203 30.86.19.169 113.55.164.79 51.52.190.135
82.254.59.2 9.156.176.38 64.95.248.222 22.55.161.191