Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States of America (the)

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 47.14.139.94
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 11202
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;47.14.139.94.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025010600 1800 900 604800 86400

;; Query time: 17 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Jan 07 01:49:07 CST 2025
;; MSG SIZE  rcvd: 105
Host info
94.139.14.47.in-addr.arpa domain name pointer syn-047-014-139-094.res.spectrum.com.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
94.139.14.47.in-addr.arpa	name = syn-047-014-139-094.res.spectrum.com.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
91.217.63.14 attackspambots
Invalid user xq from 91.217.63.14 port 46172
2020-04-21 21:06:26
61.151.130.22 attackspam
Invalid user zq from 61.151.130.22 port 17295
2020-04-21 21:12:37
104.41.143.165 attack
Invalid user admin from 104.41.143.165 port 52418
2020-04-21 21:02:14
80.24.111.17 attackbotsspam
SSH bruteforce
2020-04-21 21:09:00
51.75.18.212 attackbotsspam
Invalid user admin from 51.75.18.212 port 56060
2020-04-21 21:16:37
211.35.76.241 attackspambots
Invalid user bj from 211.35.76.241 port 52042
2020-04-21 21:33:29
218.149.128.186 attackbotsspam
Apr 21 14:19:42 minden010 sshd[18736]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.149.128.186
Apr 21 14:19:44 minden010 sshd[18736]: Failed password for invalid user oracle from 218.149.128.186 port 35241 ssh2
Apr 21 14:24:15 minden010 sshd[20181]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.149.128.186
...
2020-04-21 21:30:59
64.225.25.59 attackspambots
Apr 21 13:52:19 rotator sshd\[1720\]: Invalid user ftp-user from 64.225.25.59Apr 21 13:52:21 rotator sshd\[1720\]: Failed password for invalid user ftp-user from 64.225.25.59 port 43082 ssh2Apr 21 13:56:47 rotator sshd\[2533\]: Invalid user admin from 64.225.25.59Apr 21 13:56:49 rotator sshd\[2533\]: Failed password for invalid user admin from 64.225.25.59 port 57816 ssh2Apr 21 14:01:21 rotator sshd\[3356\]: Invalid user admin from 64.225.25.59Apr 21 14:01:23 rotator sshd\[3356\]: Failed password for invalid user admin from 64.225.25.59 port 44318 ssh2
...
2020-04-21 21:11:57
102.65.169.135 attackbotsspam
Invalid user in from 102.65.169.135 port 39805
2020-04-21 21:04:16
221.229.162.91 attackbots
Invalid user ben from 221.229.162.91 port 8458
2020-04-21 21:30:08
202.103.37.40 attackspambots
Invalid user admin from 202.103.37.40 port 45660
2020-04-21 21:34:52
84.45.251.243 attackspambots
(sshd) Failed SSH login from 84.45.251.243 (GB/United Kingdom/Durham/Willington/84-45-251-243.static.enta.net/[AS8468 Entanet]): 1 in the last 3600 secs
2020-04-21 21:07:57
50.194.122.164 attackspambots
Invalid user ubuntu from 50.194.122.164 port 44536
2020-04-21 21:18:37
91.207.40.45 attack
Invalid user ftpuser1 from 91.207.40.45 port 56936
2020-04-21 21:06:50
106.54.86.242 attackspam
Invalid user w from 106.54.86.242 port 49938
2020-04-21 20:59:01

Recently Reported IPs

127.241.73.45 41.217.159.247 197.149.49.111 194.196.93.28
84.9.234.136 194.245.224.34 180.155.39.159 115.78.94.127
8.23.188.36 209.20.203.229 238.172.143.147 194.213.140.149
213.208.84.109 52.15.73.90 224.62.161.16 194.108.50.81
157.100.192.43 162.131.219.2 254.82.187.25 34.97.78.195