Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Spain

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 159.147.139.146
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 37758
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;159.147.139.146.		IN	A

;; AUTHORITY SECTION:
.			3600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019091102 1800 900 604800 86400

;; Query time: 2 msec
;; SERVER: 67.207.67.2#53(67.207.67.2)
;; WHEN: Thu Sep 12 09:23:31 CST 2019
;; MSG SIZE  rcvd: 119
Host info
146.139.147.159.in-addr.arpa domain name pointer 159-147-139-146.red-acceso.airtel.net.
Nslookup info:
Server:		67.207.67.2
Address:	67.207.67.2#53

Non-authoritative answer:
146.139.147.159.in-addr.arpa	name = 159-147-139-146.red-acceso.airtel.net.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
195.72.233.94 attackspambots
445/tcp 445/tcp 445/tcp
[2020-03-23]3pkt
2020-03-23 21:05:50
42.56.70.168 attackspam
Invalid user vinnie from 42.56.70.168 port 51392
2020-03-23 21:35:16
116.105.150.0 attackspam
Honeypot attack, port: 445, PTR: PTR record not found
2020-03-23 21:06:25
119.251.3.218 attackbotsspam
Honeypot attack, port: 5555, PTR: PTR record not found
2020-03-23 21:20:43
116.102.139.72 attack
Automatic report - Port Scan Attack
2020-03-23 21:17:01
8.14.149.127 attackspam
Mar 23 13:21:50 ourumov-web sshd\[14323\]: Invalid user app-dev from 8.14.149.127 port 33826
Mar 23 13:21:50 ourumov-web sshd\[14323\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=8.14.149.127
Mar 23 13:21:53 ourumov-web sshd\[14323\]: Failed password for invalid user app-dev from 8.14.149.127 port 33826 ssh2
...
2020-03-23 21:35:38
51.75.207.61 attack
Mar 16 05:10:04 host sshd[22230]: Invalid user oracle from 51.75.207.61 port 46836
2020-03-23 21:14:32
119.75.32.18 attackspambots
Honeypot attack, port: 81, PTR: PTR record not found
2020-03-23 20:57:48
115.78.100.103 attackbots
445/tcp
[2020-03-23]1pkt
2020-03-23 21:00:17
180.249.100.218 attackspambots
Unauthorized connection attempt from IP address 180.249.100.218 on Port 445(SMB)
2020-03-23 21:37:15
189.22.248.112 attack
Invalid user gimcre from 189.22.248.112 port 58140
2020-03-23 21:33:38
113.161.1.111 attackbotsspam
detected by Fail2Ban
2020-03-23 21:24:06
119.193.106.80 attack
Telnet/23 MH Probe, Scan, BF, Hack -
2020-03-23 21:29:46
200.57.192.165 attackspam
Automatic report - Port Scan Attack
2020-03-23 21:07:12
183.82.108.131 attackspam
Unauthorized connection attempt from IP address 183.82.108.131 on Port 445(SMB)
2020-03-23 21:12:18

Recently Reported IPs

213.195.116.49 201.27.134.211 198.204.231.10 46.118.155.145
45.95.33.107 177.23.73.250 114.244.240.227 1.123.66.213
34.42.29.42 36.80.139.131 188.95.58.120 222.186.3.179
2.143.10.82 60.51.47.196 123.137.235.97 251.59.65.251
42.118.9.236 117.10.203.198 35.205.240.168 138.181.209.233