Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Győr

Region: Győr-Moson-Sopron

Country: Hungary

Internet Service Provider: unknown

Hostname: unknown

Organization: Magyar Telekom plc.

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:

; <<>> DiG 9.10.3-P4-Ubuntu <<>> 46.139.129.247
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 48149
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;46.139.129.247.			IN	A

;; AUTHORITY SECTION:
.			3600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019052200 1800 900 604800 86400

;; Query time: 2 msec
;; SERVER: 67.207.67.2#53(67.207.67.2)
;; WHEN: Wed May 22 22:55:59 CST 2019
;; MSG SIZE  rcvd: 118

Host info
247.129.139.46.in-addr.arpa domain name pointer 2E8B81F7.catv.pool.telekom.hu.
Nslookup info:
Server:		67.207.67.2
Address:	67.207.67.2#53

Non-authoritative answer:
247.129.139.46.in-addr.arpa	name = 2E8B81F7.catv.pool.telekom.hu.

Authoritative answers can be found from:

Related IP info:
Related comments:
IP Type Details Datetime
101.89.192.64 attackspambots
2020-04-21T14:36:29.419551abusebot-2.cloudsearch.cf sshd[4485]: Invalid user admin from 101.89.192.64 port 57392
2020-04-21T14:36:29.425178abusebot-2.cloudsearch.cf sshd[4485]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=101.89.192.64
2020-04-21T14:36:29.419551abusebot-2.cloudsearch.cf sshd[4485]: Invalid user admin from 101.89.192.64 port 57392
2020-04-21T14:36:31.174948abusebot-2.cloudsearch.cf sshd[4485]: Failed password for invalid user admin from 101.89.192.64 port 57392 ssh2
2020-04-21T14:40:00.160024abusebot-2.cloudsearch.cf sshd[4765]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=101.89.192.64  user=root
2020-04-21T14:40:02.542261abusebot-2.cloudsearch.cf sshd[4765]: Failed password for root from 101.89.192.64 port 43290 ssh2
2020-04-21T14:44:01.612560abusebot-2.cloudsearch.cf sshd[5035]: Invalid user ftpuser from 101.89.192.64 port 57424
...
2020-04-22 01:28:53
111.229.48.106 attackbots
Unauthorised connection attempt detected at AUO MAIN. System is sshd. Protected by AUO Stack Web Application Firewall (WAF)
2020-04-22 01:17:08
116.228.74.30 attackbots
Invalid user shipping from 116.228.74.30 port 9224
2020-04-22 01:10:10
88.218.17.217 attackspam
Invalid user nl from 88.218.17.217 port 48540
2020-04-22 01:31:26
95.88.128.23 attackbotsspam
Apr 21 16:33:31 xeon sshd[64611]: Failed password for invalid user testadmin from 95.88.128.23 port 59025 ssh2
2020-04-22 01:29:22
104.236.22.133 attack
*Port Scan* detected from 104.236.22.133 (US/United States/New Jersey/Clifton/-). 4 hits in the last 185 seconds
2020-04-22 01:25:21
123.24.40.22 attack
Invalid user admin from 123.24.40.22 port 32975
2020-04-22 01:03:54
54.37.226.123 attackspam
Brute-force attempt banned
2020-04-22 01:36:53
112.21.188.235 attackbots
Invalid user uy from 112.21.188.235 port 39756
2020-04-22 01:13:59
118.89.237.146 attackspambots
Invalid user test from 118.89.237.146 port 37324
2020-04-22 01:08:40
103.69.71.57 attackbots
SSH login attempts.
2020-04-22 01:26:36
80.211.53.33 attackbots
Invalid user ap from 80.211.53.33 port 51892
2020-04-22 01:32:33
111.229.167.222 attackspam
Apr 21 18:24:07 host sshd[46382]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.229.167.222  user=root
Apr 21 18:24:09 host sshd[46382]: Failed password for root from 111.229.167.222 port 45410 ssh2
...
2020-04-22 01:16:43
106.13.35.176 attack
Port probing on unauthorized port 1239
2020-04-22 01:20:47
81.4.106.155 attackspam
Apr 21 16:33:16 xeon sshd[64600]: Failed password for root from 81.4.106.155 port 48282 ssh2
2020-04-22 01:32:07

Recently Reported IPs

83.167.127.70 24.107.212.18 223.2.87.90 95.136.119.76
220.98.117.235 96.118.191.148 36.89.53.131 171.7.100.4
92.145.21.228 8.166.56.217 177.73.209.151 81.122.85.220
115.91.250.76 143.254.62.123 66.19.102.206 89.214.197.62
173.52.13.173 46.86.153.147 175.29.105.22 122.156.95.89