Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: None

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 147.135.139.7
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 59747
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;147.135.139.7.			IN	A

;; AUTHORITY SECTION:
.			0	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022022700 1800 900 604800 86400

;; Query time: 16 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Feb 27 14:24:07 CST 2022
;; MSG SIZE  rcvd: 106
Host info
7.139.135.147.in-addr.arpa domain name pointer ns3104691.ip-147-135-139.eu.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
7.139.135.147.in-addr.arpa	name = ns3104691.ip-147-135-139.eu.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
203.202.252.246 attackbots
Unauthorized IMAP connection attempt
2020-06-08 20:48:52
35.192.130.126 attackspam
2020-06-08T09:19:39.607539mail.thespaminator.com sshd[14319]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=126.130.192.35.bc.googleusercontent.com  user=root
2020-06-08T09:19:44.749810mail.thespaminator.com sshd[14319]: Failed password for root from 35.192.130.126 port 47888 ssh2
...
2020-06-08 21:25:52
39.37.220.96 attackbots
Automatic report - XMLRPC Attack
2020-06-08 21:21:28
139.155.90.141 attackspambots
Jun  8 02:07:42 dns-3 sshd[19917]: User r.r from 139.155.90.141 not allowed because not listed in AllowUsers
Jun  8 02:07:42 dns-3 sshd[19917]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.155.90.141  user=r.r
Jun  8 02:07:44 dns-3 sshd[19917]: Failed password for invalid user r.r from 139.155.90.141 port 37214 ssh2
Jun  8 02:07:45 dns-3 sshd[19917]: Received disconnect from 139.155.90.141 port 37214:11: Bye Bye [preauth]
Jun  8 02:07:45 dns-3 sshd[19917]: Disconnected from invalid user r.r 139.155.90.141 port 37214 [preauth]
Jun  8 02:09:23 dns-3 sshd[20020]: User r.r from 139.155.90.141 not allowed because not listed in AllowUsers
Jun  8 02:09:23 dns-3 sshd[20020]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.155.90.141  user=r.r
Jun  8 02:09:25 dns-3 sshd[20020]: Failed password for invalid user r.r from 139.155.90.141 port 54128 ssh2
Jun  8 02:09:26 dns-3 sshd[20020]: Recei........
-------------------------------
2020-06-08 20:48:14
149.202.133.43 attackspambots
SSH Honeypot -> SSH Bruteforce / Login
2020-06-08 20:49:04
171.103.158.34 attackbotsspam
2020-06-08T15:09:16.684996mail1.gph.lt auth[60745]: pam_unix(dovecot:auth): authentication failure; logname= uid=0 euid=0 tty=dovecot ruser=saulius@stepracing.lt rhost=171.103.158.34
...
2020-06-08 20:59:51
152.136.58.127 attackbots
2020-06-08T15:13:03.229648snf-827550 sshd[14839]: Failed password for root from 152.136.58.127 port 36668 ssh2
2020-06-08T15:17:06.369392snf-827550 sshd[14866]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=152.136.58.127  user=root
2020-06-08T15:17:08.355591snf-827550 sshd[14866]: Failed password for root from 152.136.58.127 port 40018 ssh2
...
2020-06-08 21:12:09
193.112.244.218 attackspam
Jun  8 13:57:09 h2646465 sshd[16393]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=193.112.244.218  user=root
Jun  8 13:57:11 h2646465 sshd[16393]: Failed password for root from 193.112.244.218 port 33532 ssh2
Jun  8 14:02:55 h2646465 sshd[17093]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=193.112.244.218  user=root
Jun  8 14:02:58 h2646465 sshd[17093]: Failed password for root from 193.112.244.218 port 59666 ssh2
Jun  8 14:04:55 h2646465 sshd[17156]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=193.112.244.218  user=root
Jun  8 14:04:57 h2646465 sshd[17156]: Failed password for root from 193.112.244.218 port 50042 ssh2
Jun  8 14:06:51 h2646465 sshd[17312]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=193.112.244.218  user=root
Jun  8 14:06:53 h2646465 sshd[17312]: Failed password for root from 193.112.244.218 port 40420 ssh2
Jun  8 14:08
2020-06-08 21:30:04
60.12.221.84 attackbots
Jun  8 02:39:41 php1 sshd\[4049\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=60.12.221.84  user=root
Jun  8 02:39:43 php1 sshd\[4049\]: Failed password for root from 60.12.221.84 port 48788 ssh2
Jun  8 02:43:47 php1 sshd\[4348\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=60.12.221.84  user=root
Jun  8 02:43:49 php1 sshd\[4348\]: Failed password for root from 60.12.221.84 port 42055 ssh2
Jun  8 02:47:08 php1 sshd\[4606\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=60.12.221.84  user=root
2020-06-08 20:57:55
218.92.0.208 attackbotsspam
Jun  8 15:16:24 MainVPS sshd[5637]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.208  user=root
Jun  8 15:16:26 MainVPS sshd[5637]: Failed password for root from 218.92.0.208 port 63509 ssh2
Jun  8 15:16:28 MainVPS sshd[5637]: Failed password for root from 218.92.0.208 port 63509 ssh2
Jun  8 15:16:24 MainVPS sshd[5637]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.208  user=root
Jun  8 15:16:26 MainVPS sshd[5637]: Failed password for root from 218.92.0.208 port 63509 ssh2
Jun  8 15:16:28 MainVPS sshd[5637]: Failed password for root from 218.92.0.208 port 63509 ssh2
Jun  8 15:16:24 MainVPS sshd[5637]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.208  user=root
Jun  8 15:16:26 MainVPS sshd[5637]: Failed password for root from 218.92.0.208 port 63509 ssh2
Jun  8 15:16:28 MainVPS sshd[5637]: Failed password for root from 218.92.0.208 port 63509 ssh2
Jun  8 15:
2020-06-08 21:28:26
93.67.60.60 attackbots
Automatic report - XMLRPC Attack
2020-06-08 21:04:33
120.131.8.12 attack
Lines containing failures of 120.131.8.12
Jun  8 04:25:48 nxxxxxxx sshd[15333]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=120.131.8.12  user=r.r
Jun  8 04:25:51 nxxxxxxx sshd[15333]: Failed password for r.r from 120.131.8.12 port 20304 ssh2
Jun  8 04:25:51 nxxxxxxx sshd[15333]: Received disconnect from 120.131.8.12 port 20304:11: Bye Bye [preauth]
Jun  8 04:25:51 nxxxxxxx sshd[15333]: Disconnected from authenticating user r.r 120.131.8.12 port 20304 [preauth]
Jun  8 04:33:27 nxxxxxxx sshd[16163]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=120.131.8.12  user=r.r
Jun  8 04:33:29 nxxxxxxx sshd[16163]: Failed password for r.r from 120.131.8.12 port 14890 ssh2
Jun  8 04:33:29 nxxxxxxx sshd[16163]: Received disconnect from 120.131.8.12 port 14890:11: Bye Bye [preauth]
Jun  8 04:33:29 nxxxxxxx sshd[16163]: Disconnected from authenticating user r.r 120.131.8.12 port 14890 [preauth]
Jun  8 ........
------------------------------
2020-06-08 21:00:21
218.92.0.158 attackspambots
prod11
...
2020-06-08 21:24:35
49.88.112.111 attackspambots
Jun  8 14:55:48 [Censored Hostname] sshd[21473]: Failed password for root from 49.88.112.111 port 35865 ssh2
Jun  8 14:55:52 [Censored Hostname] sshd[21473]: Failed password for root from 49.88.112.111 port 35865 ssh2[...]
2020-06-08 21:17:04
222.186.180.17 attackspam
Jun  8 15:07:34 santamaria sshd\[2439\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.180.17  user=root
Jun  8 15:07:36 santamaria sshd\[2439\]: Failed password for root from 222.186.180.17 port 1490 ssh2
Jun  8 15:07:46 santamaria sshd\[2439\]: Failed password for root from 222.186.180.17 port 1490 ssh2
...
2020-06-08 21:09:16

Recently Reported IPs

147.135.138.97 147.135.143.15 147.135.143.185 147.135.137.53
147.135.143.61 147.135.15.54 147.135.146.58 147.135.15.6
147.135.160.114 147.135.161.120 147.135.157.52 147.135.163.48
147.135.168.75 147.135.170.162 147.135.174.40 147.135.176.229
147.135.181.129 147.135.174.118 147.135.187.151 147.135.192.121