Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Amsterdam

Region: North Holland

Country: Netherlands

Internet Service Provider: unknown

Hostname: unknown

Organization: Microsoft Corporation

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:

; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.47.147.5
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 65001
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;104.47.147.5.			IN	A

;; AUTHORITY SECTION:
.			3600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019040500 1800 900 604800 86400

;; Query time: 3 msec
;; SERVER: 67.207.67.3#53(67.207.67.3)
;; WHEN: Sat Apr 06 00:05:46 +08 2019
;; MSG SIZE  rcvd: 116

Host info
Host 5.147.47.104.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		67.207.67.3
Address:	67.207.67.3#53

** server can't find 5.147.47.104.in-addr.arpa: NXDOMAIN

Related IP info:
Related comments:
IP Type Details Datetime
180.179.124.182 attack
Unauthorized connection attempt from IP address 180.179.124.182 on Port 445(SMB)
2019-06-28 21:45:57
103.245.181.2 attack
Jun 28 10:07:46 plusreed sshd[17563]: Invalid user merlin from 103.245.181.2
...
2019-06-28 22:31:52
186.208.111.163 attackspam
Jun 28 09:51:21 web1 postfix/smtpd[10088]: warning: unknown[186.208.111.163]: SASL PLAIN authentication failed: authentication failure
...
2019-06-28 22:36:14
138.197.153.228 attackspambots
Tried sshing with brute force.
2019-06-28 22:11:54
217.112.128.243 attackspambots
Sent Mail to address hacked/leaked/bought from crystalproductions.cz between 2011 and 2018
2019-06-28 22:16:46
92.118.37.84 attackbotsspam
Jun 28 15:39:46 h2177944 kernel: \[53658.494568\] \[UFW BLOCK\] IN=venet0 OUT= MAC= SRC=92.118.37.84 DST=85.214.117.9 LEN=40 TOS=0x00 PREC=0x00 TTL=250 ID=18261 PROTO=TCP SPT=41610 DPT=17097 WINDOW=1024 RES=0x00 SYN URGP=0 
Jun 28 15:41:24 h2177944 kernel: \[53757.313955\] \[UFW BLOCK\] IN=venet0 OUT= MAC= SRC=92.118.37.84 DST=85.214.117.9 LEN=40 TOS=0x00 PREC=0x00 TTL=250 ID=47773 PROTO=TCP SPT=41610 DPT=6789 WINDOW=1024 RES=0x00 SYN URGP=0 
Jun 28 15:42:03 h2177944 kernel: \[53795.516769\] \[UFW BLOCK\] IN=venet0 OUT= MAC= SRC=92.118.37.84 DST=85.214.117.9 LEN=40 TOS=0x00 PREC=0x00 TTL=250 ID=21353 PROTO=TCP SPT=41610 DPT=17980 WINDOW=1024 RES=0x00 SYN URGP=0 
Jun 28 15:44:07 h2177944 kernel: \[53919.874090\] \[UFW BLOCK\] IN=venet0 OUT= MAC= SRC=92.118.37.84 DST=85.214.117.9 LEN=40 TOS=0x00 PREC=0x00 TTL=250 ID=45574 PROTO=TCP SPT=41610 DPT=36405 WINDOW=1024 RES=0x00 SYN URGP=0 
Jun 28 15:51:03 h2177944 kernel: \[54335.537905\] \[UFW BLOCK\] IN=venet0 OUT= MAC= SRC=92.118.37.84 DST=85.214.117.9 LEN=40 TOS=
2019-06-28 22:43:49
106.51.37.110 attack
Jun 28 15:52:05 ubuntu-2gb-nbg1-dc3-1 sshd[22524]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.51.37.110
Jun 28 15:52:07 ubuntu-2gb-nbg1-dc3-1 sshd[22524]: Failed password for invalid user odoo from 106.51.37.110 port 60801 ssh2
...
2019-06-28 22:12:25
134.209.35.183 attack
Jun 28 15:51:52 MK-Soft-Root2 sshd\[21388\]: Invalid user ftptest from 134.209.35.183 port 59291
Jun 28 15:51:52 MK-Soft-Root2 sshd\[21388\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.209.35.183
Jun 28 15:51:55 MK-Soft-Root2 sshd\[21388\]: Failed password for invalid user ftptest from 134.209.35.183 port 59291 ssh2
...
2019-06-28 22:17:24
115.254.63.51 attackbots
Triggered by Fail2Ban at Ares web server
2019-06-28 22:19:15
115.159.235.153 attack
$f2bV_matches
2019-06-28 22:34:59
196.34.35.180 attackspam
2019-06-28T13:53:00.272943abusebot-4.cloudsearch.cf sshd\[18833\]: Invalid user seng from 196.34.35.180 port 49004
2019-06-28 21:57:31
201.46.62.221 attackspambots
Jun 28 09:51:15 web1 postfix/smtpd[9143]: warning: unknown[201.46.62.221]: SASL PLAIN authentication failed: authentication failure
...
2019-06-28 22:38:05
197.45.155.12 attackbots
2019-06-28T15:51:28.731019test01.cajus.name sshd\[17303\]: Invalid user af1n from 197.45.155.12 port 53711
2019-06-28T15:51:28.753520test01.cajus.name sshd\[17303\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=197.45.155.12
2019-06-28T15:51:30.910384test01.cajus.name sshd\[17303\]: Failed password for invalid user af1n from 197.45.155.12 port 53711 ssh2
2019-06-28 22:32:55
177.21.133.57 attackspambots
libpam_shield report: forced login attempt
2019-06-28 21:58:26
27.64.196.25 attackbots
Unauthorized connection attempt from IP address 27.64.196.25 on Port 445(SMB)
2019-06-28 21:46:29

Recently Reported IPs

185.55.66.140 196.223.160.234 112.85.42.227 212.159.18.107
51.15.162.39 156.204.65.66 37.49.224.187 121.122.103.39
104.168.159.5 159.146.39.196 118.24.90.64 46.232.112.20
109.111.159.211 177.126.81.33 68.183.31.138 64.66.25.149
36.68.220.99 118.70.109.194 139.59.26.155 106.13.60.187