Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States of America (the)

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 147.39.85.16
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 60345
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;147.39.85.16.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025020500 1800 900 604800 86400

;; Query time: 69 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Feb 05 15:14:42 CST 2025
;; MSG SIZE  rcvd: 105
Host info
Host 16.85.39.147.in-addr.arpa not found: 2(SERVFAIL)
Nslookup info:
server can't find 147.39.85.16.in-addr.arpa: SERVFAIL
Related IP info:
Related comments:
IP Type Details Datetime
116.209.137.201 attackspam
spam (f2b h2)
2020-07-20 06:57:40
146.0.41.70 attack
Jul 19 23:17:10 jumpserver sshd[139104]: Invalid user ubuntu from 146.0.41.70 port 60560
Jul 19 23:17:12 jumpserver sshd[139104]: Failed password for invalid user ubuntu from 146.0.41.70 port 60560 ssh2
Jul 19 23:21:03 jumpserver sshd[139139]: Invalid user icinga from 146.0.41.70 port 47674
...
2020-07-20 07:25:19
120.53.15.134 attack
Invalid user oracle from 120.53.15.134 port 43224
2020-07-20 07:27:30
149.129.222.60 attackbotsspam
Fail2Ban
2020-07-20 07:13:55
185.200.118.73 attackbotsspam
1080/tcp 3389/tcp 1723/tcp...
[2020-05-25/07-19]18pkt,3pt.(tcp),1pt.(udp)
2020-07-20 07:13:16
59.120.249.3 attack
Invalid user dock from 59.120.249.3 port 51916
2020-07-20 07:28:17
23.251.142.181 attackbots
Jul 20 00:53:01 sip sshd[1008926]: Invalid user demo from 23.251.142.181 port 21233
Jul 20 00:53:02 sip sshd[1008926]: Failed password for invalid user demo from 23.251.142.181 port 21233 ssh2
Jul 20 00:56:53 sip sshd[1008960]: Invalid user admin from 23.251.142.181 port 38022
...
2020-07-20 07:29:18
185.175.93.14 attack
07/19/2020-18:48:59.821076 185.175.93.14 Protocol: 6 ET DROP Dshield Block Listed Source group 1
2020-07-20 07:02:18
160.153.147.36 attack
WordPress login Brute force / Web App Attack on client site.
2020-07-20 06:57:07
200.222.54.228 attackspam
TCP Port Scanning
2020-07-20 07:21:35
213.57.76.72 attack
Automatic report - Banned IP Access
2020-07-20 07:08:17
51.91.125.136 attackbotsspam
Jul 19 19:06:14 buvik sshd[22555]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.91.125.136
Jul 19 19:06:16 buvik sshd[22555]: Failed password for invalid user pnd from 51.91.125.136 port 49466 ssh2
Jul 19 19:10:15 buvik sshd[23224]: Invalid user user from 51.91.125.136
...
2020-07-20 07:10:14
193.29.15.169 attackbotsspam
 UDP 193.29.15.169:49156 -> port 389, len 80
2020-07-20 07:16:32
150.158.178.137 attack
$f2bV_matches
2020-07-20 07:09:14
45.143.220.65 attackbots
 UDP 45.143.220.65:5927 -> port 5070, len 441
2020-07-20 07:15:14

Recently Reported IPs

186.166.131.42 95.30.102.35 90.122.59.132 197.173.164.71
132.247.180.26 47.25.155.218 106.202.71.184 205.11.0.174
109.152.170.249 73.57.189.206 108.53.120.157 215.63.96.215
155.196.87.79 28.25.157.63 207.42.14.24 219.146.228.244
211.163.33.164 14.95.242.152 208.163.223.16 45.68.203.159