Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: unknown

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
IP Type Details Datetime
139.5.147.78 attackbotsspam
Dec 10 11:29:48 hosting sshd[18757]: Invalid user jooran from 139.5.147.78 port 58572
...
2019-12-10 20:52:50
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 139.5.147.45
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 63633
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;139.5.147.45.			IN	A

;; AUTHORITY SECTION:
.			219	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022030803 1800 900 604800 86400

;; Query time: 14 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Mar 09 08:31:39 CST 2022
;; MSG SIZE  rcvd: 105
Host info
45.147.5.139.in-addr.arpa domain name pointer rev-dns-cloud-bkk-45-147-5-139-th.nipa.cloud.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
45.147.5.139.in-addr.arpa	name = rev-dns-cloud-bkk-45-147-5-139-th.nipa.cloud.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
118.25.40.51 attackbotsspam
DATE:2020-04-21 06:17:14, IP:118.25.40.51, PORT:ssh SSH brute force auth (docker-dc)
2020-04-21 13:22:57
1.53.37.50 attack
Port probing on unauthorized port 8291
2020-04-21 12:56:25
47.56.218.27 attackbots
Scans for ./cgi-bin ./login.action ./atutor
2020-04-21 13:19:55
192.99.200.69 attack
Automatic report - XMLRPC Attack
2020-04-21 13:04:11
148.0.230.105 attackbots
Detected By Fail2ban
2020-04-21 13:09:23
122.138.228.196 attackbots
Automatic report - Port Scan Attack
2020-04-21 13:22:37
104.248.171.81 attack
Port scan(s) denied
2020-04-21 13:09:38
14.182.109.36 attackspam
20/4/20@23:56:12: FAIL: Alarm-Network address from=14.182.109.36
20/4/20@23:56:12: FAIL: Alarm-Network address from=14.182.109.36
...
2020-04-21 13:17:16
129.146.103.40 attackbots
Apr 21 06:38:51 meumeu sshd[25541]: Failed password for root from 129.146.103.40 port 53340 ssh2
Apr 21 06:42:49 meumeu sshd[26335]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.146.103.40 
Apr 21 06:42:52 meumeu sshd[26335]: Failed password for invalid user at from 129.146.103.40 port 54026 ssh2
...
2020-04-21 13:08:13
103.108.144.245 attackbots
Wordpress malicious attack:[sshd]
2020-04-21 13:29:18
99.185.76.161 attackspam
$f2bV_matches
2020-04-21 12:54:21
103.216.112.204 attackbots
Invalid user jl from 103.216.112.204 port 38378
2020-04-21 13:06:09
118.89.164.156 attack
Apr 21 05:46:54 icinga sshd[56570]: Failed password for root from 118.89.164.156 port 44866 ssh2
Apr 21 05:56:34 icinga sshd[6916]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.89.164.156 
Apr 21 05:56:36 icinga sshd[6916]: Failed password for invalid user ftpuser from 118.89.164.156 port 34718 ssh2
...
2020-04-21 12:59:56
51.91.140.60 attackspam
Wordpress malicious attack:[sshd]
2020-04-21 13:01:08
95.78.251.116 attack
Invalid user fq from 95.78.251.116 port 51714
2020-04-21 13:10:08

Recently Reported IPs

139.5.148.13 118.254.141.111 118.254.141.112 118.254.141.115
118.254.141.116 139.5.222.177 139.5.222.20 139.5.222.189
139.5.222.203 139.5.222.204 139.5.222.200 139.5.222.18
139.5.222.185 139.5.222.201 139.5.222.176 139.5.222.180
118.254.141.120 139.5.222.174 139.5.222.210 139.5.222.239