Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Vienna

Region: Wien

Country: Austria

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 212.108.47.139
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 39902
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;212.108.47.139.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025012000 1800 900 604800 86400

;; Query time: 9 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Jan 20 16:56:42 CST 2025
;; MSG SIZE  rcvd: 107
Host info
139.47.108.212.in-addr.arpa domain name pointer sta-047-139.mmc.at.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
139.47.108.212.in-addr.arpa	name = sta-047-139.mmc.at.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
146.88.240.4 attackbotsspam
 UDP 146.88.240.4:46389 -> port 51413, len 58
2020-08-28 17:11:20
192.35.168.166 attack
firewall-block, port(s): 47808/udp
2020-08-28 17:05:35
89.248.160.150 attackspambots
89.248.160.150 was recorded 7 times by 4 hosts attempting to connect to the following ports: 41095,41093. Incident counter (4h, 24h, all-time): 7, 34, 16283
2020-08-28 17:32:41
123.123.34.34 attackbots
Demo
2020-08-28 16:56:20
134.209.165.92 attack
"XSS Attack Detected via libinjection - Matched Data: XSS data found within ARGS_NAMES:
2020-08-28 17:12:47
118.99.94.96 attack
Brute Force
2020-08-28 17:35:36
60.146.109.19 attackspambots
(From nasardinih54ne@mail.ru)
2020-08-28 17:08:48
13.68.158.99 attackbots
Connection to SSH Honeypot - Detected by HoneypotDB
2020-08-28 17:24:02
188.166.144.207 attackbotsspam
SSH bruteforce
2020-08-28 17:32:02
181.118.119.176 attackspam
<6 unauthorized SSH connections
2020-08-28 17:30:50
103.110.89.148 attackspam
Aug 28 07:08:31  sshd\[7239\]: User root from 103.110.89.148 not allowed because not listed in AllowUsersAug 28 07:08:33  sshd\[7239\]: Failed password for invalid user root from 103.110.89.148 port 49268 ssh2
...
2020-08-28 17:36:11
144.48.227.74 attackspambots
Aug 28 06:34:28 ns3033917 sshd[16361]: Invalid user test from 144.48.227.74 port 35598
Aug 28 06:34:30 ns3033917 sshd[16361]: Failed password for invalid user test from 144.48.227.74 port 35598 ssh2
Aug 28 06:37:55 ns3033917 sshd[16376]: Invalid user dms from 144.48.227.74 port 54978
...
2020-08-28 17:15:08
170.78.182.54 attackbotsspam
Automatic report - Port Scan Attack
2020-08-28 17:21:49
180.76.175.164 attackspambots
Aug 28 05:01:37 jumpserver sshd[63022]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.76.175.164  user=root
Aug 28 05:01:39 jumpserver sshd[63022]: Failed password for root from 180.76.175.164 port 34156 ssh2
Aug 28 05:05:05 jumpserver sshd[63031]: Invalid user jmjo from 180.76.175.164 port 40932
...
2020-08-28 17:10:31
139.199.1.166 attack
Aug 28 10:48:09 webhost01 sshd[26689]: Failed password for root from 139.199.1.166 port 56142 ssh2
Aug 28 10:49:50 webhost01 sshd[26731]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.199.1.166
...
2020-08-28 17:27:56

Recently Reported IPs

45.98.91.2 0.1.154.186 82.209.106.51 195.208.137.250
123.52.18.92 103.219.43.224 103.208.105.129 103.145.185.1
154.64.254.13 1.164.72.38 1.65.255.100 212.32.254.123
20.59.104.6 20.59.104.32 45.125.222.190 234.196.178.112
219.76.234.162 146.200.164.111 31.207.35.229 147.232.19.130