Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: None

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 247.104.173.139
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 8749
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;247.104.173.139.		IN	A

;; AUTHORITY SECTION:
.			132	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2023010700 1800 900 604800 86400

;; Query time: 191 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Jan 07 17:04:57 CST 2023
;; MSG SIZE  rcvd: 108
Host info
Host 139.173.104.247.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 139.173.104.247.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
51.68.231.147 attackbotsspam
Invalid user gt from 51.68.231.147 port 44702
2019-08-12 06:53:47
27.224.137.211 attackspam
Fail2Ban Ban Triggered
2019-08-12 06:59:07
113.160.198.28 attack
445/tcp 445/tcp 445/tcp...
[2019-08-02/11]4pkt,1pt.(tcp)
2019-08-12 07:26:44
61.178.66.14 attackbots
445/tcp 445/tcp
[2019-07-11/08-11]2pkt
2019-08-12 07:30:07
220.92.16.82 attackbots
Invalid user bcd from 220.92.16.82 port 43472
2019-08-12 07:34:47
198.144.184.34 attack
Aug 12 00:22:28 Ubuntu-1404-trusty-64-minimal sshd\[15504\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=198.144.184.34  user=cs
Aug 12 00:22:30 Ubuntu-1404-trusty-64-minimal sshd\[15504\]: Failed password for cs from 198.144.184.34 port 58205 ssh2
Aug 12 00:39:04 Ubuntu-1404-trusty-64-minimal sshd\[21956\]: Invalid user deployer from 198.144.184.34
Aug 12 00:39:04 Ubuntu-1404-trusty-64-minimal sshd\[21956\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=198.144.184.34
Aug 12 00:39:06 Ubuntu-1404-trusty-64-minimal sshd\[21956\]: Failed password for invalid user deployer from 198.144.184.34 port 41705 ssh2
2019-08-12 07:09:20
82.102.12.76 attackbots
445/tcp 445/tcp 445/tcp...
[2019-06-29/08-11]12pkt,1pt.(tcp)
2019-08-12 06:52:58
77.247.110.216 attackbots
\[2019-08-11 18:42:58\] NOTICE\[2288\] chan_sip.c: Registration from '600 \' failed for '77.247.110.216:50985' - Wrong password
\[2019-08-11 18:42:58\] SECURITY\[2326\] res_security_log.c: SecurityEvent="InvalidPassword",EventTV="2019-08-11T18:42:58.420-0400",Severity="Error",Service="SIP",EventVersion="2",AccountID="600",SessionID="0x7ff4d07e79a8",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/77.247.110.216/50985",Challenge="00ea74c5",ReceivedChallenge="00ea74c5",ReceivedHash="cacdfb4e852b944f840dd112173e69e9"
\[2019-08-11 18:43:50\] NOTICE\[2288\] chan_sip.c: Registration from '1647 \' failed for '77.247.110.216:45262' - Wrong password
\[2019-08-11 18:43:50\] SECURITY\[2326\] res_security_log.c: SecurityEvent="InvalidPassword",EventTV="2019-08-11T18:43:50.681-0400",Severity="Error",Service="SIP",EventVersion="2",AccountID="1647",SessionID="0x7ff4d07952f8",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP
2019-08-12 06:57:07
69.124.59.86 attackspam
Aug 11 21:07:13 srv-4 sshd\[22181\]: Invalid user popuser from 69.124.59.86
Aug 11 21:07:13 srv-4 sshd\[22181\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=69.124.59.86
Aug 11 21:07:15 srv-4 sshd\[22181\]: Failed password for invalid user popuser from 69.124.59.86 port 50028 ssh2
...
2019-08-12 07:08:52
222.137.46.167 attack
Fail2Ban Ban Triggered
2019-08-12 07:10:19
79.137.75.5 attack
Aug 12 00:36:22 nextcloud sshd\[25248\]: Invalid user aplmgr01 from 79.137.75.5
Aug 12 00:36:22 nextcloud sshd\[25248\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=79.137.75.5
Aug 12 00:36:24 nextcloud sshd\[25248\]: Failed password for invalid user aplmgr01 from 79.137.75.5 port 39934 ssh2
...
2019-08-12 06:50:34
171.116.144.72 attackbots
Fail2Ban Ban Triggered
2019-08-12 07:01:52
77.93.33.212 attackbotsspam
Aug 11 22:16:43 h2177944 sshd\[17112\]: Invalid user meteo from 77.93.33.212 port 47053
Aug 11 22:16:43 h2177944 sshd\[17112\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=77.93.33.212
Aug 11 22:16:45 h2177944 sshd\[17112\]: Failed password for invalid user meteo from 77.93.33.212 port 47053 ssh2
Aug 11 22:20:42 h2177944 sshd\[17211\]: Invalid user admin from 77.93.33.212 port 43171
...
2019-08-12 07:21:04
201.157.40.242 attack
445/tcp 445/tcp
[2019-06-22/08-11]2pkt
2019-08-12 07:05:37
170.0.125.102 attack
Email spam. Multiple attempts to send e-mail from invalid/unknown sender domain.
Date: 2019 Aug 11. 18:18:25
Source IP: 170.0.125.102

Portion of the log(s):
Aug 11 18:18:25 vserv postfix/smtpd[3358]: NOQUEUE: reject: RCPT from 102-125-0-170.castelecom.com.br[170.0.125.102]: 450 4.1.8 : Sender address rejected: Domain not found; from= to=<**r**r9@[removed].at> proto=ESMTP helo=<102-125-0-170.castelecom.com.br>
Aug 11 18:18:24 vserv postfix/smtpd[3358]: NOQUEUE: reject: RCPT from 102-125-0-170.castelecom.com.br[170.0.125.102]: 450 4.1.8 : Sender address rejected: Domain not found; from= to=<**r**r8@[removed].at> proto=ESMTP helo=<102-125-0-170.castelecom.com.br>
Aug 11 18:18:24 vserv postfix/smtpd[3358]: NOQUEUE: reject: RCPT from 102-125-0-170.castelecom.com.br[170.0.125.102]: 450 4.1.8 : Sender address rejected
....
2019-08-12 06:55:34

Recently Reported IPs

249.15.65.66 25.167.242.20 244.190.211.231 232.167.76.247
233.35.176.140 223.133.231.9 207.83.36.2 208.154.19.127
200.67.239.251 190.230.30.179 194.39.8.217 198.128.51.110
19.97.165.10 188.246.55.150 182.219.195.133 178.11.251.92
177.203.53.202 174.132.244.118 169.214.180.182 167.100.176.126