Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Tokyo

Region: Tokyo

Country: Japan

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2026, American Registry for Internet Numbers, Ltd.
#



# start

NetRange:       47.235.0.0 - 47.246.255.255
CIDR:           47.240.0.0/14, 47.246.0.0/16, 47.235.0.0/16, 47.244.0.0/15, 47.236.0.0/14
NetName:        AL-3
NetHandle:      NET-47-235-0-0-1
Parent:         NET47 (NET-47-0-0-0-0)
NetType:        Direct Allocation
OriginAS:       
Organization:   Alibaba Cloud LLC (AL-3)
RegDate:        2016-04-15
Updated:        2017-04-26
Ref:            https://rdap.arin.net/registry/ip/47.235.0.0



OrgName:        Alibaba Cloud LLC
OrgId:          AL-3
Address:        400 S El Camino Real, Suite 400
City:           San Mateo
StateProv:      CA
PostalCode:     94402
Country:        US
RegDate:        2010-10-29
Updated:        2026-02-11
Comment:        1.For AliCloud IPR Infringement and Abuse Claim, please use below link with browser to report: https://intl.aliyun.com/report
Comment:        
Comment:        2.For Alibaba.com and Aliexpress.com's IPR Infringement , please use below link with browser to report: https://ipp.alibabagroup.com
Comment:        
Comment:        3.For Alibaba.com and Aliexpress.com's Abuse, please send email to those two mail lists to report: intl-abuse@list.alibaba-inc.com and abuse@alibaba-inc.com
Comment:        
Comment:        4. For network issue, please send email to this mail list: aliops-goc@list.alibaba-inc.com
Ref:            https://rdap.arin.net/registry/entity/AL-3


OrgNOCHandle: ALIBA-ARIN
OrgNOCName:   Alibaba NOC
OrgNOCPhone:  +1-408-748-1200 
OrgNOCEmail:  noc@list.alibaba-inc.com
OrgNOCRef:    https://rdap.arin.net/registry/entity/ALIBA-ARIN

OrgTechHandle: ALIBA-ARIN
OrgTechName:   Alibaba NOC
OrgTechPhone:  +1-408-748-1200 
OrgTechEmail:  noc@list.alibaba-inc.com
OrgTechRef:    https://rdap.arin.net/registry/entity/ALIBA-ARIN

OrgAbuseHandle: NETWO4028-ARIN
OrgAbuseName:   Network Abuse
OrgAbusePhone:  +1-408-785-5580 
OrgAbuseEmail:  intl-abuse@list.alibaba-inc.com
OrgAbuseRef:    https://rdap.arin.net/registry/entity/NETWO4028-ARIN

# end


# start

NetRange:       47.245.0.0 - 47.245.63.255
CIDR:           47.245.0.0/18
NetName:        ALIBABA CLOUD - JP
NetHandle:      NET-47-245-0-0-1
Parent:         AL-3 (NET-47-235-0-0-1)
NetType:        Reassigned
OriginAS:       
Customer:       Alibaba Cloud - JP (C07477111)
RegDate:        2019-12-22
Updated:        2024-09-03
Comment:        1.For AliCloud IPR Infringement and Abuse Claim, please use below link with browser to report: https://intl.aliyun.com/report
Comment:        
Comment:        2.For Alibaba.com and Aliexpress.com's IPR Infringement , please use below link with browser to report: https://ipp.alibabagroup.com
Comment:        
Comment:        3.For Alibaba.com and Aliexpress.com's Abuse, please send email to those two mail lists to report: intl-abuse@list.alibaba-inc.com and abuse@alibaba-inc.com
Comment:        
Comment:        4. For network issue, please send email to this mail list: aliops-goc@list.alibaba-inc.com
Ref:            https://rdap.arin.net/registry/ip/47.245.0.0


CustName:       Alibaba Cloud - JP
Address:        27F Kyobashi Edogrand, 2-2-1 Kyobashi, Chuo-ku, Tokyo 1040031
City:           TOKYO
StateProv:      
PostalCode:     
Country:        JP
RegDate:        2019-12-22
Updated:        2024-09-03
Ref:            https://rdap.arin.net/registry/entity/C07477111

OrgNOCHandle: ALIBA-ARIN
OrgNOCName:   Alibaba NOC
OrgNOCPhone:  +1-408-748-1200 
OrgNOCEmail:  noc@list.alibaba-inc.com
OrgNOCRef:    https://rdap.arin.net/registry/entity/ALIBA-ARIN

OrgTechHandle: ALIBA-ARIN
OrgTechName:   Alibaba NOC
OrgTechPhone:  +1-408-748-1200 
OrgTechEmail:  noc@list.alibaba-inc.com
OrgTechRef:    https://rdap.arin.net/registry/entity/ALIBA-ARIN

OrgAbuseHandle: NETWO4028-ARIN
OrgAbuseName:   Network Abuse
OrgAbusePhone:  +1-408-785-5580 
OrgAbuseEmail:  intl-abuse@list.alibaba-inc.com
OrgAbuseRef:    https://rdap.arin.net/registry/entity/NETWO4028-ARIN

# end



#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2026, American Registry for Internet Numbers, Ltd.
#
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 47.245.61.244
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 10394
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;47.245.61.244.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2026040600 1800 900 604800 86400

;; Query time: 7 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Apr 06 21:15:03 CST 2026
;; MSG SIZE  rcvd: 106
Host info
Host 244.61.245.47.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 244.61.245.47.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
222.186.180.147 attack
2019-11-02T04:16:00.508701abusebot.cloudsearch.cf sshd\[23250\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.180.147  user=root
2019-11-02 12:18:18
180.168.70.190 attackspam
Nov  2 04:58:08 MK-Soft-VM5 sshd[20684]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.168.70.190 
Nov  2 04:58:10 MK-Soft-VM5 sshd[20684]: Failed password for invalid user yiran from 180.168.70.190 port 57864 ssh2
...
2019-11-02 12:08:01
212.129.24.77 attackbotsspam
02.11.2019 04:01:21 Connection to port 5060 blocked by firewall
2019-11-02 12:17:55
200.194.40.84 attackbots
MultiHost/MultiPort Probe, Scan, Hack -
2019-11-02 12:01:31
188.250.190.53 attackbotsspam
Spam Timestamp : 01-Nov-19 20:03   BlockList Provider  combined abuse   (652)
2019-11-02 08:11:16
84.120.198.121 attackspam
Spam Timestamp : 01-Nov-19 19:41   BlockList Provider  combined abuse   (650)
2019-11-02 08:12:10
178.68.163.134 attackbots
Chat Spam
2019-11-02 12:00:43
145.239.87.109 attackspambots
2019-11-02T03:47:00.147277shield sshd\[14601\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=109.ip-145-239-87.eu  user=root
2019-11-02T03:47:02.431414shield sshd\[14601\]: Failed password for root from 145.239.87.109 port 59998 ssh2
2019-11-02T03:51:21.573359shield sshd\[16063\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=109.ip-145-239-87.eu  user=root
2019-11-02T03:51:23.931282shield sshd\[16063\]: Failed password for root from 145.239.87.109 port 41944 ssh2
2019-11-02T03:55:43.010475shield sshd\[17350\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=109.ip-145-239-87.eu  user=root
2019-11-02 12:05:11
92.53.104.212 attackspambots
45000/tcp 49389/tcp 61389/tcp...
[2019-10-11/11-01]103pkt,43pt.(tcp)
2019-11-02 08:08:01
119.122.88.207 attackbotsspam
Attempt to attack host OS, exploiting network vulnerabilities, on 02-11-2019 03:55:15.
2019-11-02 12:24:52
113.172.154.4 attack
Nov  1 20:50:38 h2022099 sshd[12407]: Address 113.172.154.4 maps to static.vnpt.vn, but this does not map back to the address - POSSIBLE BREAK-IN ATTEMPT!
Nov  1 20:50:38 h2022099 sshd[12407]: Invalid user admin from 113.172.154.4
Nov  1 20:50:38 h2022099 sshd[12407]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=113.172.154.4 
Nov  1 20:50:40 h2022099 sshd[12407]: Failed password for invalid user admin from 113.172.154.4 port 41420 ssh2
Nov  1 20:50:41 h2022099 sshd[12407]: Connection closed by 113.172.154.4 [preauth]


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=113.172.154.4
2019-11-02 08:17:01
45.67.14.165 attackbots
Bruteforce on SSH Honeypot
2019-11-02 12:00:19
5.167.10.127 attackspambots
Chat Spam
2019-11-02 12:16:28
14.160.24.42 attack
Attempt to attack host OS, exploiting network vulnerabilities, on 02-11-2019 03:55:15.
2019-11-02 12:25:41
81.22.45.115 attack
11/01/2019-20:12:07.786448 81.22.45.115 Protocol: 6 ET DROP Dshield Block Listed Source group 1
2019-11-02 08:17:34

Recently Reported IPs

120.137.205.50 249.138.116.28 34.79.216.126 109.105.210.62
35.189.255.7 144.91.127.12 109.105.210.63 20.199.97.195
24.155.33.136 111.55.74.138 124.197.50.183 34.94.255.248
135.148.120.46 111.230.192.128 204.141.243.14 151.164.187.79
65.157.113.252 99.171.169.2 197.248.225.253 15.205.38.135