Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Iran

Internet Service Provider: MTN Irancell

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 5.114.247.139
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 47935
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;5.114.247.139.			IN	A

;; AUTHORITY SECTION:
.			600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2023010501 1800 900 604800 86400

;; Query time: 64 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Jan 06 03:16:11 CST 2023
;; MSG SIZE  rcvd: 106
Host info
Host 139.247.114.5.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 139.247.114.5.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
216.218.206.108 attack
firewall-block, port(s): 2323/tcp
2020-02-29 19:36:26
113.125.26.101 attackbotsspam
Feb 29 10:40:53 gw1 sshd[28853]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=113.125.26.101
Feb 29 10:40:55 gw1 sshd[28853]: Failed password for invalid user huhao from 113.125.26.101 port 43646 ssh2
...
2020-02-29 19:08:38
182.61.176.241 attackspambots
Feb 29 01:53:10 dallas01 sshd[20797]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.61.176.241
Feb 29 01:53:11 dallas01 sshd[20797]: Failed password for invalid user ganhuaiyan from 182.61.176.241 port 52220 ssh2
Feb 29 01:57:18 dallas01 sshd[21280]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.61.176.241
2020-02-29 19:15:15
36.75.50.171 attack
20/2/29@02:04:43: FAIL: Alarm-Network address from=36.75.50.171
20/2/29@02:04:44: FAIL: Alarm-Network address from=36.75.50.171
...
2020-02-29 19:21:07
185.74.4.110 attackspambots
Feb 29 12:19:40 vpn01 sshd[5171]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=185.74.4.110
Feb 29 12:19:42 vpn01 sshd[5171]: Failed password for invalid user nexus from 185.74.4.110 port 39331 ssh2
...
2020-02-29 19:36:46
222.186.30.209 attack
Feb 29 12:18:36 localhost sshd\[8652\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.30.209  user=root
Feb 29 12:18:37 localhost sshd\[8652\]: Failed password for root from 222.186.30.209 port 32254 ssh2
Feb 29 12:18:39 localhost sshd\[8652\]: Failed password for root from 222.186.30.209 port 32254 ssh2
2020-02-29 19:18:52
185.242.4.206 attackspam
Lines containing failures of 185.242.4.206
Feb 29 06:33:50 shared11 sshd[12340]: Invalid user admin from 185.242.4.206 port 60526
Feb 29 06:33:50 shared11 sshd[12340]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=185.242.4.206
Feb 29 06:33:53 shared11 sshd[12340]: Failed password for invalid user admin from 185.242.4.206 port 60526 ssh2
Feb 29 06:33:53 shared11 sshd[12340]: Connection closed by invalid user admin 185.242.4.206 port 60526 [preauth]


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=185.242.4.206
2020-02-29 19:03:44
162.241.216.68 attackspam
SSH invalid-user multiple login try
2020-02-29 19:26:46
200.124.228.200 attackbots
Feb 29 11:25:04 Ubuntu-1404-trusty-64-minimal sshd\[11775\]: Invalid user demo from 200.124.228.200
Feb 29 11:25:04 Ubuntu-1404-trusty-64-minimal sshd\[11775\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=200.124.228.200
Feb 29 11:25:06 Ubuntu-1404-trusty-64-minimal sshd\[11775\]: Failed password for invalid user demo from 200.124.228.200 port 39402 ssh2
Feb 29 11:42:57 Ubuntu-1404-trusty-64-minimal sshd\[25145\]: Invalid user redis from 200.124.228.200
Feb 29 11:42:57 Ubuntu-1404-trusty-64-minimal sshd\[25145\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=200.124.228.200
2020-02-29 19:16:37
180.76.167.9 attackbots
Feb 29 06:17:53 firewall sshd[28049]: Invalid user nginx from 180.76.167.9
Feb 29 06:17:54 firewall sshd[28049]: Failed password for invalid user nginx from 180.76.167.9 port 44004 ssh2
Feb 29 06:26:07 firewall sshd[28384]: Invalid user nitish from 180.76.167.9
...
2020-02-29 19:13:30
112.161.204.57 attack
Unauthorized connection attempt detected from IP address 112.161.204.57 to port 23 [J]
2020-02-29 19:23:07
77.42.92.23 attack
Automatic report - Port Scan Attack
2020-02-29 19:23:39
202.152.10.211 attackbots
1582954837 - 02/29/2020 06:40:37 Host: 202.152.10.211/202.152.10.211 Port: 445 TCP Blocked
2020-02-29 19:22:38
111.204.10.249 attack
Port 1433 Scan
2020-02-29 19:12:39
112.118.207.138 attack
Unauthorized connection attempt detected from IP address 112.118.207.138 to port 23 [J]
2020-02-29 19:46:12

Recently Reported IPs

103.81.44.76 102.159.141.188 101.41.224.222 101.204.155.87
101.109.250.51 100.248.226.221 100.236.239.43 100.173.25.151
10.152.220.199 10.48.38.36 0.46.131.57 71.55.68.163
128.199.190.105 128.199.190.41 128.199.190.73 128.199.190.216
128.199.190.20 128.199.190.229 128.199.190.247 128.199.190.167