Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 47.242.200.148
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 3542
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;47.242.200.148.			IN	A

;; AUTHORITY SECTION:
.			600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022020700 1800 900 604800 86400

;; Query time: 56 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Feb 07 14:26:36 CST 2022
;; MSG SIZE  rcvd: 107
Host info
Host 148.200.242.47.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 148.200.242.47.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
78.128.111.65 attack
CloudCIX Reconnaissance Scan Detected, PTR: PTR record not found
2019-08-19 05:37:34
163.172.192.210 attackspambots
\[2019-08-18 13:49:43\] SECURITY\[2326\] res_security_log.c: SecurityEvent="FailedACL",EventTV="2019-08-18T13:49:43.654-0400",Severity="Error",Service="SIP",EventVersion="1",AccountID="",SessionID="0x7ff4d07952f8",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/163.172.192.210/58655",ACLName="no_extension_match"
\[2019-08-18 13:53:35\] SECURITY\[2326\] res_security_log.c: SecurityEvent="FailedACL",EventTV="2019-08-18T13:53:35.508-0400",Severity="Error",Service="SIP",EventVersion="1",AccountID="",SessionID="0x7ff4d0348688",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/163.172.192.210/58929",ACLName="no_extension_match"
\[2019-08-18 13:57:20\] SECURITY\[2326\] res_security_log.c: SecurityEvent="FailedACL",EventTV="2019-08-18T13:57:20.083-0400",Severity="Error",Service="SIP",EventVersion="1",AccountID="333011972592277524",SessionID="0x7ff4d07952f8",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/163.172.192.210/60709",ACLName="no_extension_match"
...
2019-08-19 05:52:20
118.24.212.156 attackspam
Aug 18 17:35:10 legacy sshd[19865]: Failed password for root from 118.24.212.156 port 41084 ssh2
Aug 18 17:38:34 legacy sshd[19972]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.24.212.156
Aug 18 17:38:35 legacy sshd[19972]: Failed password for invalid user cvsuser from 118.24.212.156 port 37770 ssh2
...
2019-08-19 05:28:46
142.93.245.174 attackspam
Aug 18 17:29:11 pkdns2 sshd\[8821\]: Invalid user luca from 142.93.245.174Aug 18 17:29:13 pkdns2 sshd\[8821\]: Failed password for invalid user luca from 142.93.245.174 port 59458 ssh2Aug 18 17:33:24 pkdns2 sshd\[9022\]: Invalid user Muklesr0x!221845 from 142.93.245.174Aug 18 17:33:26 pkdns2 sshd\[9022\]: Failed password for invalid user Muklesr0x!221845 from 142.93.245.174 port 49836 ssh2Aug 18 17:37:34 pkdns2 sshd\[9196\]: Invalid user 111111 from 142.93.245.174Aug 18 17:37:36 pkdns2 sshd\[9196\]: Failed password for invalid user 111111 from 142.93.245.174 port 40164 ssh2
...
2019-08-19 05:35:14
54.38.36.210 attackbots
[Aegis] @ 2019-08-18 15:28:10  0100 -> Multiple authentication failures.
2019-08-19 05:41:58
220.76.181.164 attackbots
Aug 18 16:42:35 legacy sshd[18052]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=220.76.181.164
Aug 18 16:42:37 legacy sshd[18052]: Failed password for invalid user rstudio from 220.76.181.164 port 35481 ssh2
Aug 18 16:47:40 legacy sshd[18226]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=220.76.181.164
...
2019-08-19 05:26:20
202.215.36.230 attackspambots
DATE:2019-08-18 14:56:55, IP:202.215.36.230, PORT:ssh SSH brute force auth (ermes)
2019-08-19 05:27:10
49.232.51.237 attackspam
Aug 18 18:15:24 vps65 sshd\[17085\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.232.51.237  user=git
Aug 18 18:15:27 vps65 sshd\[17085\]: Failed password for git from 49.232.51.237 port 57724 ssh2
...
2019-08-19 05:25:45
183.102.114.59 attackbots
Aug 18 08:25:37 home sshd[7934]: Invalid user tams from 183.102.114.59 port 56278
Aug 18 08:25:37 home sshd[7934]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=183.102.114.59
Aug 18 08:25:37 home sshd[7934]: Invalid user tams from 183.102.114.59 port 56278
Aug 18 08:25:39 home sshd[7934]: Failed password for invalid user tams from 183.102.114.59 port 56278 ssh2
Aug 18 08:37:42 home sshd[7966]: Invalid user server from 183.102.114.59 port 48230
Aug 18 08:37:42 home sshd[7966]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=183.102.114.59
Aug 18 08:37:42 home sshd[7966]: Invalid user server from 183.102.114.59 port 48230
Aug 18 08:37:43 home sshd[7966]: Failed password for invalid user server from 183.102.114.59 port 48230 ssh2
Aug 18 08:42:47 home sshd[8009]: Invalid user mani from 183.102.114.59 port 38866
Aug 18 08:42:47 home sshd[8009]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=1
2019-08-19 05:24:11
101.164.67.148 attack
Aug 18 14:50:32 tux-35-217 sshd\[26831\]: Invalid user kafka from 101.164.67.148 port 58756
Aug 18 14:50:32 tux-35-217 sshd\[26831\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=101.164.67.148
Aug 18 14:50:33 tux-35-217 sshd\[26831\]: Failed password for invalid user kafka from 101.164.67.148 port 58756 ssh2
Aug 18 14:56:21 tux-35-217 sshd\[26871\]: Invalid user dante from 101.164.67.148 port 49780
Aug 18 14:56:21 tux-35-217 sshd\[26871\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=101.164.67.148
...
2019-08-19 05:49:31
202.169.46.82 attackbots
Aug 18 11:08:48 TORMINT sshd\[5090\]: Invalid user vid from 202.169.46.82
Aug 18 11:08:48 TORMINT sshd\[5090\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=202.169.46.82
Aug 18 11:08:50 TORMINT sshd\[5090\]: Failed password for invalid user vid from 202.169.46.82 port 42236 ssh2
...
2019-08-19 05:15:30
106.12.54.93 attackspam
Aug 18 23:51:25 mout sshd[21204]: Invalid user jose from 106.12.54.93 port 45318
2019-08-19 05:51:42
51.75.248.241 attack
Aug 18 23:29:42 vps01 sshd[9169]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.75.248.241
Aug 18 23:29:43 vps01 sshd[9169]: Failed password for invalid user idempiere from 51.75.248.241 port 48776 ssh2
2019-08-19 05:29:45
148.70.23.121 attack
$f2bV_matches_ltvn
2019-08-19 05:37:12
45.83.65.93 attackspambots
19/8/18@08:56:22: FAIL: IoT-SSH address from=45.83.65.93
...
2019-08-19 05:49:54

Recently Reported IPs

64.119.30.126 67.85.250.197 217.236.245.142 118.26.110.65
217.219.179.55 27.254.246.18 187.66.181.150 120.89.74.16
3.83.134.199 2.37.203.65 123.24.150.119 162.241.217.96
118.163.39.216 159.89.236.70 60.65.56.174 39.89.118.52
125.228.55.37 211.36.141.114 116.105.219.153 175.140.121.249