Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States of America (the)

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 139.229.147.217
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 53937
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;139.229.147.217.		IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025020400 1800 900 604800 86400

;; Query time: 12 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Feb 04 22:55:28 CST 2025
;; MSG SIZE  rcvd: 108
Host info
Host 217.147.229.139.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 217.147.229.139.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
190.52.34.86 attack
Attempted connection to port 23.
2020-08-02 09:05:29
188.4.18.184 attackbots
Attempted connection to port 23.
2020-08-02 09:06:01
198.211.53.162 attackspam
Attempted hack
2020-08-02 09:04:13
177.36.208.61 attackbotsspam
Unauthorized connection attempt from IP address 177.36.208.61 on Port 445(SMB)
2020-08-02 09:00:49
91.121.91.82 attack
Aug  2 08:52:12 gw1 sshd[31104]: Failed password for root from 91.121.91.82 port 39612 ssh2
...
2020-08-02 12:08:51
27.116.48.102 attack
Port probing on unauthorized port 23
2020-08-02 12:10:02
130.162.64.72 attackbots
Invalid user test123 from 130.162.64.72 port 30578
2020-08-02 12:04:07
94.233.249.183 attackbotsspam
Unauthorized connection attempt from IP address 94.233.249.183 on Port 445(SMB)
2020-08-02 08:57:52
198.38.84.254 attackspambots
Automatic report - XMLRPC Attack
2020-08-02 12:12:17
121.36.72.98 attack
20 attempts against mh-ssh on anise
2020-08-02 12:16:39
222.186.180.130 attack
Tried sshing with brute force.
2020-08-02 12:21:40
106.13.233.102 attackspambots
Aug  2 02:03:25 serwer sshd\[30622\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.233.102  user=root
Aug  2 02:03:27 serwer sshd\[30622\]: Failed password for root from 106.13.233.102 port 48540 ssh2
Aug  2 02:07:53 serwer sshd\[31163\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.233.102  user=root
...
2020-08-02 08:55:17
192.95.29.186 attack
20 attempts against mh-misbehave-ban on pluto
2020-08-02 09:04:40
210.245.92.228 attackbots
Connection to SSH Honeypot - Detected by HoneypotDB
2020-08-02 12:22:27
222.186.30.76 attackspambots
Aug  2 04:16:34 game-panel sshd[10387]: Failed password for root from 222.186.30.76 port 26557 ssh2
Aug  2 04:16:36 game-panel sshd[10387]: Failed password for root from 222.186.30.76 port 26557 ssh2
Aug  2 04:16:39 game-panel sshd[10387]: Failed password for root from 222.186.30.76 port 26557 ssh2
2020-08-02 12:17:11

Recently Reported IPs

109.67.67.227 220.32.90.229 156.65.165.157 161.164.72.192
40.59.186.13 133.143.214.131 214.162.79.158 237.63.235.148
55.212.137.27 192.155.76.96 13.77.42.95 29.10.126.38
179.4.219.148 128.135.30.160 146.198.218.24 109.119.84.239
74.175.240.45 93.73.86.132 245.77.26.222 58.215.3.46