Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 47.248.107.139
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 1478
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;47.248.107.139.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025082300 1800 900 604800 86400

;; Query time: 37 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Aug 23 20:00:54 CST 2025
;; MSG SIZE  rcvd: 107
Host info
139.107.248.47.in-addr.arpa domain name pointer syn-047-248-107-139.res.spectrum.com.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
139.107.248.47.in-addr.arpa	name = syn-047-248-107-139.res.spectrum.com.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
182.61.175.71 attack
Dec  7 10:05:06 vps691689 sshd[12590]: Failed password for sshd from 182.61.175.71 port 46342 ssh2
Dec  7 10:11:20 vps691689 sshd[12750]: Failed password for root from 182.61.175.71 port 54570 ssh2
...
2019-12-07 22:22:24
186.179.100.15 attackspam
[portscan] Port scan
2019-12-07 21:58:55
140.82.23.73 attack
Dec  7 07:23:12 lnxmail61 postfix/smtps/smtpd[4396]: lost connection after CONNECT from unknown[140.82.23.73]
Dec  7 07:23:22 lnxmail61 postfix/smtps/smtpd[4396]: lost connection after CONNECT from unknown[140.82.23.73]
Dec  7 07:23:33 lnxmail61 postfix/smtps/smtpd[4396]: lost connection after CONNECT from unknown[140.82.23.73]
Dec  7 07:23:44 lnxmail61 postfix/smtps/smtpd[4396]: lost connection after CONNECT from unknown[140.82.23.73]
Dec  7 07:23:54 lnxmail61 postfix/smtps/smtpd[4396]: lost connection after CONNECT from unknown[140.82.23.73]
2019-12-07 22:24:28
49.234.36.126 attackbotsspam
Invalid user site1 from 49.234.36.126 port 36027
pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.234.36.126
Failed password for invalid user site1 from 49.234.36.126 port 36027 ssh2
Invalid user lacroute from 49.234.36.126 port 44916
pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.234.36.126
2019-12-07 22:31:00
89.248.160.193 attackbots
Fail2Ban Ban Triggered
2019-12-07 22:00:09
103.3.226.228 attack
<6 unauthorized SSH connections
2019-12-07 22:03:30
51.75.246.176 attack
Dec  7 02:36:29 server sshd\[20368\]: Failed password for root from 51.75.246.176 port 34604 ssh2
Dec  7 11:27:10 server sshd\[3681\]: Invalid user webmaster from 51.75.246.176
Dec  7 11:27:10 server sshd\[3681\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=176.ip-51-75-246.eu 
Dec  7 11:27:12 server sshd\[3681\]: Failed password for invalid user webmaster from 51.75.246.176 port 48180 ssh2
Dec  7 11:56:09 server sshd\[11298\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=176.ip-51-75-246.eu  user=root
Dec  7 11:56:11 server sshd\[11298\]: Failed password for root from 51.75.246.176 port 34880 ssh2
...
2019-12-07 22:13:27
46.38.144.146 attackbotsspam
Dec  7 15:29:38 ncomp postfix/smtpd[10073]: warning: unknown[46.38.144.146]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Dec  7 15:30:07 ncomp postfix/smtpd[10073]: warning: unknown[46.38.144.146]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Dec  7 15:30:35 ncomp postfix/smtpd[10073]: warning: unknown[46.38.144.146]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
2019-12-07 22:04:06
217.182.70.125 attackbots
2019-12-07T11:03:50.498454abusebot-8.cloudsearch.cf sshd\[25262\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=125.ip-217-182-70.eu  user=root
2019-12-07 21:53:56
188.142.209.49 attackbotsspam
SSH invalid-user multiple login attempts
2019-12-07 22:21:29
69.229.6.52 attackspambots
Dec  7 14:29:01 lnxweb62 sshd[1511]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=69.229.6.52
Dec  7 14:29:01 lnxweb62 sshd[1511]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=69.229.6.52
2019-12-07 22:13:07
40.77.167.59 attackspambots
Automatic report - Banned IP Access
2019-12-07 22:20:08
142.93.212.168 attackspam
SSH Brute Force
2019-12-07 22:12:03
122.52.227.25 attackbotsspam
UTC: 2019-12-06 port: 26/tcp
2019-12-07 22:20:57
185.173.35.41 attackspam
3389BruteforceFW23
2019-12-07 22:07:53

Recently Reported IPs

193.46.255.33 223.194.180.64 215.173.5.87 20.223.85.65
196.232.192.232 162.57.187.109 143.165.74.37 140.68.248.167
14.180.41.60 14.160.222.249 13.105.117.174 13.255.141.3
124.188.182.32 196.251.70.174 176.65.148.175 106.196.252.125
100.27.236.136 102.117.41.40 60.177.250.59 14.213.27.248