Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: IANA Special-Purpose Address

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 247.11.139.196
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 44678
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;247.11.139.196.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025021000 1800 900 604800 86400

;; Query time: 9 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Feb 10 14:55:18 CST 2025
;; MSG SIZE  rcvd: 107
Host info
Host 196.139.11.247.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 196.139.11.247.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
62.76.92.22 attackspam
[portscan] Port scan
2019-11-14 18:53:03
165.22.243.44 attack
//vendor/phpunit/phpunit/phpunit.xsd
2019-11-14 19:23:01
62.113.217.2 attack
pfaffenroth-photographie.de 62.113.217.2 \[14/Nov/2019:10:44:36 +0100\] "POST /wp-login.php HTTP/1.1" 200 8450 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0"
pfaffenroth-photographie.de 62.113.217.2 \[14/Nov/2019:10:44:36 +0100\] "POST /wp-login.php HTTP/1.1" 200 8450 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0"
pfaffenroth-photographie.de 62.113.217.2 \[14/Nov/2019:10:44:36 +0100\] "POST /wp-login.php HTTP/1.1" 200 8450 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0"
2019-11-14 19:17:51
31.132.225.41 attackspambots
Nov 14 07:24:12 lnxmail61 postfix/smtps/smtpd[26778]: warning: unknown[31.132.225.41]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Nov 14 07:24:12 lnxmail61 postfix/smtps/smtpd[26778]: lost connection after AUTH from unknown[31.132.225.41]
Nov 14 07:24:19 lnxmail61 postfix/smtps/smtpd[26778]: warning: unknown[31.132.225.41]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Nov 14 07:24:19 lnxmail61 postfix/smtps/smtpd[26778]: lost connection after AUTH from unknown[31.132.225.41]
Nov 14 07:24:30 lnxmail61 postfix/smtps/smtpd[26858]: warning: unknown[31.132.225.41]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Nov 14 07:24:30 lnxmail61 postfix/smtps/smtpd[26858]: lost connection after AUTH from unknown[31.132.225.41]
2019-11-14 19:02:03
180.76.141.184 attackbotsspam
Nov 14 07:19:26 MK-Soft-VM6 sshd[2220]: Failed password for root from 180.76.141.184 port 35074 ssh2
...
2019-11-14 19:07:58
178.33.236.23 attack
Nov 14 10:06:44 MK-Soft-VM8 sshd[25998]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.33.236.23 
Nov 14 10:06:46 MK-Soft-VM8 sshd[25998]: Failed password for invalid user naser from 178.33.236.23 port 36458 ssh2
...
2019-11-14 18:48:24
35.198.121.252 attack
Automatic report - XMLRPC Attack
2019-11-14 19:20:48
107.175.77.138 attack
Registration form abuse
2019-11-14 18:56:44
94.53.101.171 attackbotsspam
UTC: 2019-11-13 port: 23/tcp
2019-11-14 18:58:52
107.172.139.237 attackbots
Registration form abuse
2019-11-14 18:55:55
178.128.94.133 attackspam
Nov 14 09:21:16 localhost sshd\[10018\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.128.94.133  user=news
Nov 14 09:21:18 localhost sshd\[10018\]: Failed password for news from 178.128.94.133 port 56166 ssh2
Nov 14 09:25:39 localhost sshd\[10418\]: Invalid user dbus from 178.128.94.133 port 37824
2019-11-14 19:01:37
212.62.99.195 attack
11/14/2019-01:24:34.846763 212.62.99.195 Protocol: 6 ET SCAN Suspicious inbound to MSSQL port 1433
2019-11-14 18:59:56
27.47.152.202 attackbots
Nov 14 09:53:09 localhost sshd\[25960\]: Invalid user qhsupport from 27.47.152.202 port 2350
Nov 14 09:53:09 localhost sshd\[25960\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=27.47.152.202
Nov 14 09:53:11 localhost sshd\[25960\]: Failed password for invalid user qhsupport from 27.47.152.202 port 2350 ssh2
...
2019-11-14 18:52:31
175.145.234.225 attackbots
$f2bV_matches
2019-11-14 19:18:13
195.82.155.117 attack
[portscan] Port scan
2019-11-14 19:07:00

Recently Reported IPs

166.111.175.135 180.61.253.214 202.39.165.63 99.89.212.51
208.159.204.208 133.78.169.117 21.94.191.93 124.251.138.94
195.65.61.213 236.72.249.248 94.91.93.4 56.243.215.6
162.1.4.79 230.136.183.203 13.75.30.71 214.229.149.190
198.35.230.142 116.57.2.140 139.89.199.1 191.146.200.177