Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Easton

Region: Pennsylvania

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 139.147.34.113
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 39777
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;139.147.34.113.			IN	A

;; AUTHORITY SECTION:
.			497	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2020071801 1800 900 604800 86400

;; Query time: 115 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Jul 19 08:38:25 CST 2020
;; MSG SIZE  rcvd: 118
Host info
Host 113.34.147.139.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 113.34.147.139.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
51.75.247.13 attackbots
Invalid user ubuntu from 51.75.247.13 port 56265
2019-07-24 16:08:36
162.247.74.200 attackspambots
pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=162.247.74.200  user=root
Failed password for root from 162.247.74.200 port 51548 ssh2
Failed password for root from 162.247.74.200 port 51548 ssh2
Failed password for root from 162.247.74.200 port 51548 ssh2
Failed password for root from 162.247.74.200 port 51548 ssh2
2019-07-24 15:54:42
138.68.92.121 attack
Invalid user hao from 138.68.92.121 port 34314
2019-07-24 16:26:20
201.216.193.65 attackbotsspam
Invalid user test from 201.216.193.65 port 38200
2019-07-24 16:16:37
193.70.114.154 attack
Invalid user hosting from 193.70.114.154 port 59917
2019-07-24 15:44:02
190.201.21.74 attackbotsspam
Invalid user pi from 190.201.21.74 port 37892
2019-07-24 16:18:12
193.70.33.75 attackbotsspam
Invalid user service from 193.70.33.75 port 47556
2019-07-24 15:44:44
221.162.255.74 attackspambots
Invalid user redis from 221.162.255.74 port 57238
2019-07-24 16:13:48
115.254.63.52 attackbots
Invalid user applmgr from 115.254.63.52 port 36451
2019-07-24 16:31:20
104.236.186.24 attackbotsspam
Jul 24 01:30:26 cac1d2 sshd\[16434\]: Invalid user nagios from 104.236.186.24 port 48267
Jul 24 01:30:26 cac1d2 sshd\[16434\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.236.186.24
Jul 24 01:30:29 cac1d2 sshd\[16434\]: Failed password for invalid user nagios from 104.236.186.24 port 48267 ssh2
...
2019-07-24 16:33:25
191.100.24.188 attackbotsspam
Invalid user robert from 191.100.24.188 port 55370
2019-07-24 16:17:43
73.55.140.184 attackbots
Invalid user admin from 73.55.140.184 port 60872
2019-07-24 16:05:31
222.127.30.130 attack
Invalid user oracle2 from 222.127.30.130 port 10430
2019-07-24 15:38:17
159.65.144.233 attackspambots
Invalid user usuario from 159.65.144.233 port 46920
2019-07-24 16:22:29
138.197.105.79 attack
Invalid user qhsupport from 138.197.105.79 port 50064
2019-07-24 16:25:03

Recently Reported IPs

128.1.116.107 181.132.224.251 176.213.156.93 110.137.70.6
75.217.211.171 72.10.213.95 87.123.216.30 106.133.97.119
188.156.86.67 64.36.192.55 121.24.225.222 157.245.68.105
36.86.7.133 5.23.175.32 103.111.20.10 207.235.120.151
2.227.150.197 70.66.77.41 175.137.197.240 102.144.119.46