Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Multicast Address

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 239.147.214.80
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 60096
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;239.147.214.80.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025022001 1800 900 604800 86400

;; Query time: 35 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 21 02:15:04 CST 2025
;; MSG SIZE  rcvd: 107
Host info
Host 80.214.147.239.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 80.214.147.239.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
206.189.142.10 attackspam
Dec 24 00:39:49 silence02 sshd[3365]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=206.189.142.10
Dec 24 00:39:51 silence02 sshd[3365]: Failed password for invalid user chedy from 206.189.142.10 port 57898 ssh2
Dec 24 00:41:34 silence02 sshd[4240]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=206.189.142.10
2019-12-24 07:54:55
133.130.119.178 attackbotsspam
Dec 23 23:48:37 [host] sshd[3791]: Invalid user araceli from 133.130.119.178
Dec 23 23:48:37 [host] sshd[3791]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=133.130.119.178
Dec 23 23:48:39 [host] sshd[3791]: Failed password for invalid user araceli from 133.130.119.178 port 65015 ssh2
2019-12-24 07:21:45
39.186.102.11 attackspambots
Dec 23 23:42:42 mxgate1 postfix/postscreen[24754]: CONNECT from [39.186.102.11]:7931 to [176.31.12.44]:25
Dec 23 23:42:42 mxgate1 postfix/dnsblog[24758]: addr 39.186.102.11 listed by domain zen.spamhaus.org as 127.0.0.11
Dec 23 23:42:42 mxgate1 postfix/dnsblog[24757]: addr 39.186.102.11 listed by domain b.barracudacentral.org as 127.0.0.2
Dec 23 23:42:48 mxgate1 postfix/postscreen[24754]: DNSBL rank 3 for [39.186.102.11]:7931
Dec 23 23:42:49 mxgate1 postfix/postscreen[24754]: NOQUEUE: reject: RCPT from [39.186.102.11]:7931: 550 5.7.1 Service unavailable; client [39.186.102.11] blocked using zen.spamhaus.org; from=x@x helo=<2012-20171001WL>
Dec 23 23:42:49 mxgate1 postfix/postscreen[24754]: DISCONNECT [39.186.102.11]:7931
Dec 23 23:42:49 mxgate1 postfix/postscreen[24754]: CONNECT from [39.186.102.11]:7989 to [176.31.12.44]:25
Dec 23 23:42:49 mxgate1 postfix/dnsblog[24758]: addr 39.186.102.11 listed by domain zen.spamhaus.org as 127.0.0.11
Dec 23 23:42:49 mxgate1 postfix/........
-------------------------------
2019-12-24 07:19:48
220.225.126.55 attack
Dec 24 01:43:23 server sshd\[25802\]: Invalid user gla from 220.225.126.55
Dec 24 01:43:23 server sshd\[25802\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=220.225.126.55 
Dec 24 01:43:25 server sshd\[25802\]: Failed password for invalid user gla from 220.225.126.55 port 54686 ssh2
Dec 24 01:48:06 server sshd\[27013\]: Invalid user yassine from 220.225.126.55
Dec 24 01:48:06 server sshd\[27013\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=220.225.126.55 
...
2019-12-24 07:43:49
222.186.173.142 attackspambots
2019-12-23T18:21:02.284812xentho-1 sshd[152133]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.173.142  user=root
2019-12-23T18:21:04.239425xentho-1 sshd[152133]: Failed password for root from 222.186.173.142 port 6060 ssh2
2019-12-23T18:21:08.892809xentho-1 sshd[152133]: Failed password for root from 222.186.173.142 port 6060 ssh2
2019-12-23T18:21:02.284812xentho-1 sshd[152133]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.173.142  user=root
2019-12-23T18:21:04.239425xentho-1 sshd[152133]: Failed password for root from 222.186.173.142 port 6060 ssh2
2019-12-23T18:21:08.892809xentho-1 sshd[152133]: Failed password for root from 222.186.173.142 port 6060 ssh2
2019-12-23T18:21:02.284812xentho-1 sshd[152133]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.173.142  user=root
2019-12-23T18:21:04.239425xentho-1 sshd[152133]: Failed password for
...
2019-12-24 07:26:47
201.16.197.149 attackbots
$f2bV_matches
2019-12-24 07:28:33
171.244.10.50 attack
Automatic report - Banned IP Access
2019-12-24 07:29:29
117.131.60.38 attackbotsspam
Dec 23 23:36:31 www_kotimaassa_fi sshd[9997]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=117.131.60.38
Dec 23 23:36:33 www_kotimaassa_fi sshd[9997]: Failed password for invalid user hokland from 117.131.60.38 port 2755 ssh2
...
2019-12-24 07:51:11
189.49.159.204 attack
Lines containing failures of 189.49.159.204
Dec 23 23:24:01 shared01 sshd[2545]: Invalid user mcj from 189.49.159.204 port 42437
Dec 23 23:24:01 shared01 sshd[2545]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=189.49.159.204
Dec 23 23:24:03 shared01 sshd[2545]: Failed password for invalid user mcj from 189.49.159.204 port 42437 ssh2
Dec 23 23:24:03 shared01 sshd[2545]: Received disconnect from 189.49.159.204 port 42437:11: Bye Bye [preauth]
Dec 23 23:24:03 shared01 sshd[2545]: Disconnected from invalid user mcj 189.49.159.204 port 42437 [preauth]


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=189.49.159.204
2019-12-24 07:49:18
74.222.4.14 attackbotsspam
SMB Server BruteForce Attack
2019-12-24 07:54:30
157.230.244.13 attack
Dec 24 04:43:41 vibhu-HP-Z238-Microtower-Workstation sshd\[18124\]: Invalid user admin from 157.230.244.13
Dec 24 04:43:41 vibhu-HP-Z238-Microtower-Workstation sshd\[18124\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.230.244.13
Dec 24 04:43:43 vibhu-HP-Z238-Microtower-Workstation sshd\[18124\]: Failed password for invalid user admin from 157.230.244.13 port 47730 ssh2
Dec 24 04:45:25 vibhu-HP-Z238-Microtower-Workstation sshd\[18197\]: Invalid user asterisk from 157.230.244.13
Dec 24 04:45:25 vibhu-HP-Z238-Microtower-Workstation sshd\[18197\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.230.244.13
...
2019-12-24 07:24:51
159.203.173.173 attack
[Aegis] @ 2019-12-23 22:48:07  0000 -> A web attack returned code 200 (success).
2019-12-24 07:42:07
186.103.223.10 attackspambots
Dec 23 23:48:18 mout sshd[15480]: Invalid user prokaziuk from 186.103.223.10 port 42740
2019-12-24 07:32:23
96.250.98.32 attackbots
Dec 23 23:39:50 km20725 sshd\[8593\]: Invalid user oracle from 96.250.98.32Dec 23 23:39:52 km20725 sshd\[8593\]: Failed password for invalid user oracle from 96.250.98.32 port 59552 ssh2Dec 23 23:45:23 km20725 sshd\[8921\]: Failed password for root from 96.250.98.32 port 49730 ssh2Dec 23 23:48:15 km20725 sshd\[9075\]: Invalid user ftptest1 from 96.250.98.32
...
2019-12-24 07:39:36
112.30.133.241 attackbotsspam
Dec 23 17:35:38 plusreed sshd[19625]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.30.133.241  user=mysql
Dec 23 17:35:40 plusreed sshd[19625]: Failed password for mysql from 112.30.133.241 port 50336 ssh2
Dec 23 17:48:27 plusreed sshd[23109]: Invalid user tirocu from 112.30.133.241
Dec 23 17:48:27 plusreed sshd[23109]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.30.133.241
Dec 23 17:48:27 plusreed sshd[23109]: Invalid user tirocu from 112.30.133.241
Dec 23 17:48:29 plusreed sshd[23109]: Failed password for invalid user tirocu from 112.30.133.241 port 50685 ssh2
...
2019-12-24 07:30:27

Recently Reported IPs

80.218.86.167 153.167.136.114 215.32.146.125 90.100.232.102
214.36.39.144 79.150.69.64 139.72.12.1 218.254.167.235
151.195.95.103 16.33.97.70 177.87.33.185 165.18.132.16
247.209.58.136 55.215.234.74 223.174.255.66 165.191.121.144
46.63.130.161 177.146.226.30 126.187.169.47 156.133.148.108