Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Jakarta

Region: Jakarta Raya

Country: Indonesia

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
IP Type Details Datetime
147.139.136.237 attackspambots
Automatic report - Banned IP Access
2020-02-11 00:24:52
147.139.136.237 attackspambots
Unauthorized connection attempt detected from IP address 147.139.136.237 to port 2220 [J]
2020-02-02 00:26:43
147.139.136.237 attackspam
Unauthorized connection attempt detected from IP address 147.139.136.237 to port 2220 [J]
2020-01-29 01:31:30
147.139.136.77 attackspam
Jan 19 06:39:58 dedicated sshd[17232]: Invalid user deploy from 147.139.136.77 port 40940
2020-01-19 13:41:46
147.139.136.237 attackspambots
Dec 26 08:59:41 sd-53420 sshd\[17767\]: Invalid user rashawn from 147.139.136.237
Dec 26 08:59:41 sd-53420 sshd\[17767\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=147.139.136.237
Dec 26 08:59:43 sd-53420 sshd\[17767\]: Failed password for invalid user rashawn from 147.139.136.237 port 38948 ssh2
Dec 26 09:01:49 sd-53420 sshd\[18592\]: Invalid user sidarta from 147.139.136.237
Dec 26 09:01:49 sd-53420 sshd\[18592\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=147.139.136.237
...
2019-12-26 16:52:01
147.139.136.237 attack
Dec 14 04:30:34 TORMINT sshd\[18951\]: Invalid user albina from 147.139.136.237
Dec 14 04:30:34 TORMINT sshd\[18951\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=147.139.136.237
Dec 14 04:30:35 TORMINT sshd\[18951\]: Failed password for invalid user albina from 147.139.136.237 port 57512 ssh2
...
2019-12-14 17:32:22
147.139.136.237 attackspam
Tried sshing with brute force.
2019-11-22 17:40:33
147.139.136.237 attackspam
Nov 16 00:44:29 dallas01 sshd[12318]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=147.139.136.237
Nov 16 00:44:31 dallas01 sshd[12318]: Failed password for invalid user ftp from 147.139.136.237 port 38624 ssh2
Nov 16 00:51:40 dallas01 sshd[13517]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=147.139.136.237
2019-11-16 19:15:11
147.139.136.237 attackspam
2019-11-10T07:02:27.202273abusebot-8.cloudsearch.cf sshd\[16889\]: Invalid user pessoal from 147.139.136.237 port 58276
2019-11-10 19:40:01
147.139.136.237 attackbots
SSH Brute Force, server-1 sshd[31736]: Failed password for invalid user andromada from 147.139.136.237 port 55026 ssh2
2019-11-07 08:33:23
147.139.136.237 attack
Nov  1 07:04:46 debian sshd\[7546\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=147.139.136.237  user=root
Nov  1 07:04:48 debian sshd\[7546\]: Failed password for root from 147.139.136.237 port 36042 ssh2
Nov  1 07:12:12 debian sshd\[7631\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=147.139.136.237  user=root
...
2019-11-01 19:28:27
147.139.136.237 attackspam
2019-10-31T19:06:10.279349abusebot-2.cloudsearch.cf sshd\[5135\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=147.139.136.237  user=root
2019-11-01 03:31:31
147.139.136.237 attackbots
2019-10-21T12:04:22.080528shield sshd\[9108\]: Invalid user wangbo from 147.139.136.237 port 40218
2019-10-21T12:04:22.084579shield sshd\[9108\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=147.139.136.237
2019-10-21T12:04:24.809578shield sshd\[9108\]: Failed password for invalid user wangbo from 147.139.136.237 port 40218 ssh2
2019-10-21T12:13:54.086843shield sshd\[10958\]: Invalid user dereco from 147.139.136.237 port 50474
2019-10-21T12:13:54.090230shield sshd\[10958\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=147.139.136.237
2019-10-21 20:22:00
147.139.136.237 attackbots
Sep 30 12:28:50 localhost sshd\[15696\]: Invalid user nimda123 from 147.139.136.237 port 39702
Sep 30 12:28:50 localhost sshd\[15696\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=147.139.136.237
Sep 30 12:28:51 localhost sshd\[15696\]: Failed password for invalid user nimda123 from 147.139.136.237 port 39702 ssh2
Sep 30 12:38:48 localhost sshd\[16000\]: Invalid user 123 from 147.139.136.237 port 52402
Sep 30 12:38:48 localhost sshd\[16000\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=147.139.136.237
...
2019-09-30 20:42:59
147.139.136.237 attackspam
Sep 30 10:00:38 localhost sshd\[10673\]: Invalid user henry from 147.139.136.237 port 46768
Sep 30 10:00:38 localhost sshd\[10673\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=147.139.136.237
Sep 30 10:00:40 localhost sshd\[10673\]: Failed password for invalid user henry from 147.139.136.237 port 46768 ssh2
Sep 30 10:10:35 localhost sshd\[11080\]: Invalid user test from 147.139.136.237 port 59470
Sep 30 10:10:35 localhost sshd\[11080\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=147.139.136.237
...
2019-09-30 18:19:44
Whois info:
#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2026, American Registry for Internet Numbers, Ltd.
#



# start

NetRange:       147.139.0.0 - 147.139.255.255
CIDR:           147.139.0.0/16
NetName:        AL-3
NetHandle:      NET-147-139-0-0-1
Parent:         NET147 (NET-147-0-0-0-0)
NetType:        Direct Allocation
OriginAS:       
Organization:   Alibaba Cloud LLC (AL-3)
RegDate:        2016-12-19
Updated:        2017-04-26
Ref:            https://rdap.arin.net/registry/ip/147.139.0.0



OrgName:        Alibaba Cloud LLC
OrgId:          AL-3
Address:        400 S El Camino Real, Suite 400
City:           San Mateo
StateProv:      CA
PostalCode:     94402
Country:        US
RegDate:        2010-10-29
Updated:        2026-02-11
Comment:        1.For AliCloud IPR Infringement and Abuse Claim, please use below link with browser to report: https://intl.aliyun.com/report
Comment:        
Comment:        2.For Alibaba.com and Aliexpress.com's IPR Infringement , please use below link with browser to report: https://ipp.alibabagroup.com
Comment:        
Comment:        3.For Alibaba.com and Aliexpress.com's Abuse, please send email to those two mail lists to report: intl-abuse@list.alibaba-inc.com and abuse@alibaba-inc.com
Comment:        
Comment:        4. For network issue, please send email to this mail list: aliops-goc@list.alibaba-inc.com
Ref:            https://rdap.arin.net/registry/entity/AL-3


OrgNOCHandle: ALIBA-ARIN
OrgNOCName:   Alibaba NOC
OrgNOCPhone:  +1-408-748-1200 
OrgNOCEmail:  abuse@alibaba-inc.com
OrgNOCRef:    https://rdap.arin.net/registry/entity/ALIBA-ARIN

OrgTechHandle: ALIBA-ARIN
OrgTechName:   Alibaba NOC
OrgTechPhone:  +1-408-748-1200 
OrgTechEmail:  abuse@alibaba-inc.com
OrgTechRef:    https://rdap.arin.net/registry/entity/ALIBA-ARIN

OrgAbuseHandle: NETWO4028-ARIN
OrgAbuseName:   Network Abuse
OrgAbusePhone:  +1-408-785-5580 
OrgAbuseEmail:  abuse@alibaba-inc.com
OrgAbuseRef:    https://rdap.arin.net/registry/entity/NETWO4028-ARIN

# end


# start

NetRange:       147.139.128.0 - 147.139.255.255
CIDR:           147.139.128.0/17
NetName:        ALIBABA CLOUD - ID
NetHandle:      NET-147-139-128-0-1
Parent:         AL-3 (NET-147-139-0-0-1)
NetType:        Reassigned
OriginAS:       
Customer:       Alibaba Cloud - ID (C07275027)
RegDate:        2019-01-10
Updated:        2024-09-03
Comment:        	1.For AliCloud IPR Infringement and Abuse Claim, please use below link with browser to report: https://intl.aliyun.com/report
Comment:        
Comment:        2.For Alibaba.com and Aliexpress.com's IPR Infringement , please use below link with browser to report: https://ipp.alibabagroup.com
Comment:        
Comment:        3.For Alibaba.com and Aliexpress.com's Abuse, please send email to those two mail lists to report: intl-abuse@list.alibaba-inc.com and abuse@alibaba-inc.com
Comment:        
Comment:        4. For network issue, please send email to this mail list: aliops-goc@list.alibaba-inc.com
Ref:            https://rdap.arin.net/registry/ip/147.139.128.0


CustName:       Alibaba Cloud - ID
Address:        CAPITAL PLACE BUILDING, 23rd Floor Jl. Jend. Gatot Subroto kav. 18, Jakarta 12710 INDONESIA
City:           Jakarta
StateProv:      
PostalCode:     
Country:        ID
RegDate:        2019-01-10
Updated:        2024-09-03
Ref:            https://rdap.arin.net/registry/entity/C07275027

OrgNOCHandle: ALIBA-ARIN
OrgNOCName:   Alibaba NOC
OrgNOCPhone:  +1-408-748-1200 
OrgNOCEmail:  abuse@alibaba-inc.com
OrgNOCRef:    https://rdap.arin.net/registry/entity/ALIBA-ARIN

OrgTechHandle: ALIBA-ARIN
OrgTechName:   Alibaba NOC
OrgTechPhone:  +1-408-748-1200 
OrgTechEmail:  abuse@alibaba-inc.com
OrgTechRef:    https://rdap.arin.net/registry/entity/ALIBA-ARIN

OrgAbuseHandle: NETWO4028-ARIN
OrgAbuseName:   Network Abuse
OrgAbusePhone:  +1-408-785-5580 
OrgAbuseEmail:  abuse@alibaba-inc.com
OrgAbuseRef:    https://rdap.arin.net/registry/entity/NETWO4028-ARIN

# end



#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2026, American Registry for Internet Numbers, Ltd.
#
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 147.139.136.75
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 23295
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;147.139.136.75.			IN	A

;; AUTHORITY SECTION:
.			29	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2026033002 1800 900 604800 86400

;; Query time: 5 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Mar 31 09:30:21 CST 2026
;; MSG SIZE  rcvd: 107
Host info
Host 75.136.139.147.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 75.136.139.147.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
27.72.59.240 attackspambots
Unauthorized connection attempt from IP address 27.72.59.240 on Port 445(SMB)
2020-05-02 03:45:57
124.11.193.27 attackspambots
445/tcp
[2020-05-01]1pkt
2020-05-02 03:40:44
201.103.23.245 attackbots
Unauthorized connection attempt detected from IP address 201.103.23.245 to port 8089
2020-05-02 03:45:08
47.240.37.88 attackbotsspam
Automatic report - XMLRPC Attack
2020-05-02 04:04:43
85.53.160.67 attackbotsspam
2020-05-01 11:15:33 server sshd[55577]: Failed password for invalid user root from 85.53.160.67 port 57500 ssh2
2020-05-02 03:36:47
162.243.136.68 attack
Port scan(s) denied
2020-05-02 03:51:27
79.111.131.148 attackspam
Unauthorized connection attempt from IP address 79.111.131.148 on Port 445(SMB)
2020-05-02 03:34:07
178.77.21.149 attack
Unauthorized connection attempt detected from IP address 178.77.21.149 to port 23
2020-05-02 03:49:00
43.226.6.240 attackbotsspam
445/tcp
[2020-05-01]1pkt
2020-05-02 03:53:36
118.251.60.210 attackspam
23/tcp 23/tcp
[2020-05-01]2pkt
2020-05-02 04:03:44
180.108.216.204 attackbotsspam
May  1 13:40:30 meumeu sshd[2598]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.108.216.204 
May  1 13:40:32 meumeu sshd[2598]: Failed password for invalid user steam from 180.108.216.204 port 44454 ssh2
May  1 13:46:02 meumeu sshd[3579]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.108.216.204 
...
2020-05-02 03:47:54
123.152.211.211 attackbots
23/tcp 23/tcp
[2020-05-01]2pkt
2020-05-02 03:25:48
196.204.23.209 attackspambots
445/tcp 445/tcp
[2020-05-01]2pkt
2020-05-02 03:26:47
49.233.46.219 attack
Invalid user heike from 49.233.46.219 port 60364
2020-05-02 03:41:42
162.243.136.81 attackbotsspam
9030/tcp
[2020-05-01]1pkt
2020-05-02 03:50:57

Recently Reported IPs

66.132.186.165 39.98.62.128 2606:4700:10::6816:930 2606:4700:10::6814:5372
2606:4700:10::6816:2228 2606:4700:10::ac43:2246 121.8.28.49 2606:4700:10::6816:3588
2606:4700:10::6814:5047 2606:4700:10::6814:5614 111.231.213.107 51.85.43.116
51.107.85.44 182.138.158.82 175.30.48.63 123.178.210.194
110.77.187.51 134.35.157.71 2606:4700:10::6814:4699 2606:4700:10::6814:7653