Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States of America (the)

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 9.147.139.47
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 52545
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;9.147.139.47.			IN	A

;; AUTHORITY SECTION:
.			588	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2024060201 1800 900 604800 86400

;; Query time: 15 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Jun 03 05:26:52 CST 2024
;; MSG SIZE  rcvd: 105
Host info
Host 47.139.147.9.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 47.139.147.9.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
175.24.122.67 attackspam
6379/tcp
[2020-08-30]1pkt
2020-08-31 06:50:18
106.12.204.81 attackbots
Aug 30 23:54:23 PorscheCustomer sshd[27932]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.204.81
Aug 30 23:54:25 PorscheCustomer sshd[27932]: Failed password for invalid user mali from 106.12.204.81 port 59612 ssh2
Aug 30 23:57:37 PorscheCustomer sshd[28031]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.204.81
...
2020-08-31 07:01:57
118.27.31.145 attackbotsspam
SSH Brute-force
2020-08-31 07:04:54
142.93.100.171 attackbots
[N10.H2.VM2] Port Scanner Detected Blocked by UFW
2020-08-31 06:48:13
103.145.87.155 attackspam
23214/tcp
[2020-08-30]1pkt
2020-08-31 06:51:25
118.25.74.199 attackspam
Aug 30 22:05:52 game-panel sshd[22961]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.25.74.199  user=ftpuser
Aug 30 22:05:54 game-panel sshd[22961]: Failed password for invalid user ftpuser from 118.25.74.199 port 34682 ssh2
Aug 30 22:11:18 game-panel sshd[23284]: Failed password for root from 118.25.74.199 port 36468 ssh2
2020-08-31 06:50:35
106.55.167.157 attackbotsspam
Invalid user xufang from 106.55.167.157 port 50484
2020-08-31 06:36:51
68.183.226.209 attackspambots
Invalid user fsj from 68.183.226.209 port 42482
2020-08-31 06:39:25
111.230.248.93 attackspambots
Invalid user squid from 111.230.248.93 port 51324
2020-08-31 06:46:02
212.70.149.4 attackspambots
2020-08-31T01:01:20.167735www postfix/smtpd[8789]: warning: unknown[212.70.149.4]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
2020-08-31T01:04:30.481215www postfix/smtpd[8840]: warning: unknown[212.70.149.4]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
2020-08-31T01:07:42.297120www postfix/smtpd[8840]: warning: unknown[212.70.149.4]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
...
2020-08-31 07:11:00
185.54.156.5 attackbotsspam
SP-Scan 43009:26369 detected 2020.08.30 21:47:24
blocked until 2020.10.19 14:50:11
2020-08-31 07:03:11
176.107.183.146 attackbots
fell into ViewStateTrap:oslo
2020-08-31 07:08:05
219.139.78.58 attackbotsspam
Invalid user mani from 219.139.78.58 port 33652
2020-08-31 06:38:07
217.182.192.217 attackbotsspam
2020-08-31T00:31:22.001670n23.at sshd[144126]: Failed password for root from 217.182.192.217 port 44530 ssh2
2020-08-31T00:31:25.773800n23.at sshd[144126]: Failed password for root from 217.182.192.217 port 44530 ssh2
2020-08-31T00:31:28.537187n23.at sshd[144126]: Failed password for root from 217.182.192.217 port 44530 ssh2
...
2020-08-31 06:40:06
88.155.154.55 attackbotsspam
trying to access non-authorized port
2020-08-31 06:58:39

Recently Reported IPs

190.225.129.130 225.12.56.61 192.146.86.224 158.61.71.82
76.46.221.52 120.122.172.11 77.83.163.108 189.124.199.192
243.215.31.124 112.167.57.144 145.127.131.230 178.115.45.81
102.32.108.250 174.229.131.214 165.182.103.208 63.17.146.167
195.239.62.204 246.137.171.243 171.247.197.206 161.152.60.170