Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Brno

Region: South Moravian Region (Jihomoravsky kraj)

Country: Czechia

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 147.229.107.39
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 61479
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;147.229.107.39.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025031303 1800 900 604800 86400

;; Query time: 12 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Mar 14 11:13:04 CST 2025
;; MSG SIZE  rcvd: 107
Host info
Host 39.107.229.147.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 39.107.229.147.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
113.200.60.74 attackspam
Jan 20 06:22:33 meumeu sshd[4923]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=113.200.60.74 
Jan 20 06:22:35 meumeu sshd[4923]: Failed password for invalid user testftp from 113.200.60.74 port 36938 ssh2
Jan 20 06:24:02 meumeu sshd[5098]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=113.200.60.74 
...
2020-01-20 14:03:04
51.38.130.198 attack
...
2020-01-20 13:57:28
113.89.68.183 attack
$f2bV_matches
2020-01-20 13:35:17
179.232.1.254 attackspam
Jan 20 06:15:56 sd-53420 sshd\[14283\]: Invalid user sheng from 179.232.1.254
Jan 20 06:15:56 sd-53420 sshd\[14283\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=179.232.1.254
Jan 20 06:15:58 sd-53420 sshd\[14283\]: Failed password for invalid user sheng from 179.232.1.254 port 33425 ssh2
Jan 20 06:18:46 sd-53420 sshd\[14654\]: Invalid user tomcat from 179.232.1.254
Jan 20 06:18:46 sd-53420 sshd\[14654\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=179.232.1.254
...
2020-01-20 13:24:36
157.245.56.93 attack
Jan 20 00:21:21 onepro3 sshd[16272]: Failed password for invalid user ubuntu from 157.245.56.93 port 45628 ssh2
Jan 20 00:22:15 onepro3 sshd[16278]: Failed password for invalid user admin from 157.245.56.93 port 55686 ssh2
Jan 20 00:23:13 onepro3 sshd[16280]: Failed password for invalid user oracle from 157.245.56.93 port 37494 ssh2
2020-01-20 14:01:35
92.63.196.9 attack
unauthorized connection attempt
2020-01-20 13:45:21
106.12.186.74 attackspambots
Jan 20 06:27:11 163-172-32-151 sshd[5014]: Invalid user fei from 106.12.186.74 port 58638
...
2020-01-20 13:31:58
222.186.173.142 attackspambots
pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.173.142  user=root
Failed password for root from 222.186.173.142 port 31634 ssh2
Failed password for root from 222.186.173.142 port 31634 ssh2
Failed password for root from 222.186.173.142 port 31634 ssh2
Failed password for root from 222.186.173.142 port 31634 ssh2
2020-01-20 13:43:46
222.186.180.6 attack
Jan 20 05:45:50 IngegnereFirenze sshd[1802]: User root from 222.186.180.6 not allowed because not listed in AllowUsers
Jan 20 05:45:50 IngegnereFirenze sshd[1802]: Failed none for invalid user root from 222.186.180.6 port 1224 ssh2
...
2020-01-20 13:49:02
27.254.12.20 attackspam
Unauthorized connection attempt detected from IP address 27.254.12.20 to port 445
2020-01-20 13:53:01
124.205.151.122 attackbotsspam
$f2bV_matches
2020-01-20 14:03:58
119.254.155.187 attackspambots
Unauthorized connection attempt detected from IP address 119.254.155.187 to port 2220 [J]
2020-01-20 13:53:29
185.220.101.44 attackspam
Unauthorized access detected from banned ip
2020-01-20 13:28:42
51.75.30.238 attackbotsspam
Jan 20 05:59:09 vpn01 sshd[9976]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.75.30.238
Jan 20 05:59:11 vpn01 sshd[9976]: Failed password for invalid user admin1 from 51.75.30.238 port 36690 ssh2
...
2020-01-20 13:32:55
36.226.144.180 attackspam
Unauthorized connection attempt from IP address 36.226.144.180 on Port 445(SMB)
2020-01-20 13:42:38

Recently Reported IPs

74.157.87.175 91.94.186.218 116.189.15.139 23.126.200.50
171.145.119.60 119.41.174.201 125.12.216.130 193.151.95.49
185.217.161.252 84.145.248.76 66.42.220.14 150.196.164.108
143.245.3.209 206.44.218.173 119.40.251.210 217.113.143.225
220.84.120.72 107.200.139.49 58.118.98.164 7.171.52.39