Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Hyderabad

Region: Telangana

Country: India

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 14.98.247.139
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 51662
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;14.98.247.139.			IN	A

;; AUTHORITY SECTION:
.			243	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2020060803 1800 900 604800 86400

;; Query time: 110 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Jun 09 08:23:07 CST 2020
;; MSG SIZE  rcvd: 117
Host info
139.247.98.14.in-addr.arpa domain name pointer static-139.247.98.14-tataidc.co.in.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
139.247.98.14.in-addr.arpa	name = static-139.247.98.14-tataidc.co.in.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
185.112.149.220 attackbots
Telnet/23 MH Probe, BF, Hack -
2019-12-04 22:14:47
182.61.176.53 attackbots
sshd jail - ssh hack attempt
2019-12-04 21:48:10
192.241.175.250 attackspambots
SSH Brute Force, server-1 sshd[2792]: Failed password for invalid user stemen from 192.241.175.250 port 33502 ssh2
2019-12-04 22:19:48
218.92.0.145 attackspambots
Dec  4 15:19:57 amit sshd\[6752\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.145  user=root
Dec  4 15:19:59 amit sshd\[6752\]: Failed password for root from 218.92.0.145 port 30318 ssh2
Dec  4 15:20:19 amit sshd\[6754\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.145  user=root
...
2019-12-04 22:23:10
106.13.181.147 attackspam
$f2bV_matches
2019-12-04 22:11:00
222.186.15.33 attackbotsspam
port scan and connect, tcp 22 (ssh)
2019-12-04 21:50:48
182.72.104.106 attack
ssh failed login
2019-12-04 22:29:04
222.220.162.172 attackspambots
" "
2019-12-04 22:05:22
218.35.66.239 attackspam
Telnet/23 MH Probe, BF, Hack -
2019-12-04 21:55:30
117.48.208.71 attackbots
Dec  4 15:37:39 hosting sshd[10950]: Invalid user mariejeanne from 117.48.208.71 port 38850
...
2019-12-04 22:19:25
61.183.35.44 attackbotsspam
2019-12-04T12:32:35.554940abusebot-5.cloudsearch.cf sshd\[26986\]: Invalid user robert from 61.183.35.44 port 33813
2019-12-04 22:16:13
62.234.119.193 attack
Dec  4 14:32:50 eventyay sshd[13872]: Failed password for root from 62.234.119.193 port 35050 ssh2
Dec  4 14:40:45 eventyay sshd[14101]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=62.234.119.193
Dec  4 14:40:47 eventyay sshd[14101]: Failed password for invalid user sendapti from 62.234.119.193 port 38862 ssh2
...
2019-12-04 21:56:23
106.13.138.3 attack
SSH brute-force: detected 7 distinct usernames within a 24-hour window.
2019-12-04 22:21:04
221.195.189.144 attackspam
Dec  4 13:37:41 marvibiene sshd[44778]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=221.195.189.144  user=root
Dec  4 13:37:43 marvibiene sshd[44778]: Failed password for root from 221.195.189.144 port 52696 ssh2
Dec  4 13:47:24 marvibiene sshd[45072]: Invalid user cele from 221.195.189.144 port 36346
...
2019-12-04 21:54:40
128.199.197.53 attackbots
Dec  4 17:23:51 hosting sshd[21016]: Invalid user yw from 128.199.197.53 port 37954
...
2019-12-04 22:25:35

Recently Reported IPs

112.157.38.5 190.210.154.220 89.208.228.48 122.117.95.84
84.88.75.143 52.35.209.63 172.125.37.72 77.127.96.113
83.28.181.231 183.240.124.5 60.27.211.130 182.85.43.25
137.163.207.15 58.237.205.234 85.252.87.47 76.68.117.209
121.242.162.250 121.93.4.187 186.151.82.53 176.206.202.122