Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Norway

Internet Service Provider: Telia

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 137.47.219.159
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 22780
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;137.47.219.159.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025022602 1800 900 604800 86400

;; Query time: 36 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Feb 27 13:22:45 CST 2025
;; MSG SIZE  rcvd: 107
Host info
Host 159.219.47.137.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 159.219.47.137.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
13.94.30.175 attackbotsspam
Apr 22 14:04:09 vmd26974 sshd[30467]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=13.94.30.175
Apr 22 14:04:12 vmd26974 sshd[30467]: Failed password for invalid user admin from 13.94.30.175 port 55030 ssh2
...
2020-04-22 21:11:36
91.219.138.228 attackspambots
Honeypot attack, port: 445, PTR: PTR record not found
2020-04-22 21:33:19
66.55.69.106 attack
Apr 22 14:04:03 debian-2gb-nbg1-2 kernel: \[9815997.277148\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=66.55.69.106 DST=195.201.40.59 LEN=40 TOS=0x00 PREC=0x00 TTL=243 ID=39579 PROTO=TCP SPT=46051 DPT=15173 WINDOW=1024 RES=0x00 SYN URGP=0
2020-04-22 21:22:42
95.85.60.251 attackspambots
Apr 22 13:54:46 lock-38 sshd[1366258]: Disconnected from invalid user admin 95.85.60.251 port 56144 [preauth]
Apr 22 14:04:11 lock-38 sshd[1366516]: Invalid user xy from 95.85.60.251 port 60834
Apr 22 14:04:11 lock-38 sshd[1366516]: Invalid user xy from 95.85.60.251 port 60834
Apr 22 14:04:11 lock-38 sshd[1366516]: Failed password for invalid user xy from 95.85.60.251 port 60834 ssh2
Apr 22 14:04:11 lock-38 sshd[1366516]: Disconnected from invalid user xy 95.85.60.251 port 60834 [preauth]
...
2020-04-22 21:15:01
105.98.101.162 attackbots
Lines containing failures of 105.98.101.162
Apr 22 13:44:32 shared12 sshd[12407]: Invalid user pi from 105.98.101.162 port 16090
Apr 22 13:44:32 shared12 sshd[12407]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=105.98.101.162
Apr 22 13:44:34 shared12 sshd[12407]: Failed password for invalid user pi from 105.98.101.162 port 16090 ssh2
Apr 22 13:44:34 shared12 sshd[12407]: Connection closed by invalid user pi 105.98.101.162 port 16090 [preauth]


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=105.98.101.162
2020-04-22 21:39:47
134.209.185.131 attackspambots
Apr 22 08:03:52 lanister sshd[26448]: Failed password for invalid user yk from 134.209.185.131 port 46254 ssh2
Apr 22 08:03:50 lanister sshd[26448]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.209.185.131
Apr 22 08:03:50 lanister sshd[26448]: Invalid user yk from 134.209.185.131
Apr 22 08:03:52 lanister sshd[26448]: Failed password for invalid user yk from 134.209.185.131 port 46254 ssh2
2020-04-22 21:34:46
111.39.172.148 attackbotsspam
scans 2 times in preceeding hours on the ports (in chronological order) 3879 27204
2020-04-22 21:38:25
177.205.90.184 attack
Apr 22 14:27:19 meumeu sshd[6824]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=177.205.90.184 
Apr 22 14:27:21 meumeu sshd[6824]: Failed password for invalid user testtest from 177.205.90.184 port 51126 ssh2
Apr 22 14:30:38 meumeu sshd[7414]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=177.205.90.184 
...
2020-04-22 21:32:54
111.206.221.29 attackbots
Bad bot/spoofed identity
2020-04-22 21:30:55
27.154.225.186 attackbots
leo_www
2020-04-22 21:32:26
50.104.13.15 spambotsattack
This is 1 of several ip addresses stalking and hard my kids and me on internet for 2 in a half years. They have my credit card info all my passwords stole 7 email ACCTS that r still active and used with different names. They edit right on the screen everything even legal documents. My ip is 192.168.254.254 please look into this issue and block these psycho paths. Also they have my apps cloned so they can run them
2020-04-22 21:28:34
50.104.13.15 spambotsattack
This is 1 of several ip addresses stalking and hard my kids and me on internet for 2 in a half years. They have my credit card info all my passwords stole 7 email ACCTS that r still active and used with different names. They edit right on the screen everything even legal documents. My ip is 192.168.254.254 please look into this issue and block these psycho paths. Also they have my apps cloned so they can run them
2020-04-22 21:28:31
50.104.13.15 spambotsattack
This is 1 of several ip addresses stalking and hard my kids and me on internet for 2 in a half years. They have my credit card info all my passwords stole 7 email ACCTS that r still active and used with different names. They edit right on the screen everything even legal documents. My ip is 192.168.254.254 please look into this issue and block these psycho paths. Also they have my apps cloned so they can run them
2020-04-22 21:28:28
50.104.13.15 spambotsattack
This is 1 of several ip addresses stalking and hard my kids and me on internet for 2 in a half years. They have my credit card info all my passwords stole 7 email ACCTS that r still active and used with different names. They edit right on the screen everything even legal documents. My ip is 192.168.254.254 please look into this issue and block these psycho paths. Also they have my apps cloned so they can run them
2020-04-22 21:28:13
107.175.87.152 attackspam
Unauthorized connection attempt detected from IP address 107.175.87.152 to port 8088
2020-04-22 21:35:58

Recently Reported IPs

41.119.15.14 88.147.156.133 224.23.148.112 219.93.136.170
96.19.112.28 237.188.254.102 205.159.144.183 107.41.78.133
154.232.190.74 25.29.145.115 203.16.61.117 72.190.41.122
20.57.128.197 137.187.241.72 22.148.252.25 96.245.126.46
21.230.156.237 67.103.234.213 96.202.217.237 192.172.187.247