Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Sydney

Region: New South Wales

Country: Australia

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 103.139.48.105
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 20723
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;103.139.48.105.			IN	A

;; AUTHORITY SECTION:
.			591	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022040801 1800 900 604800 86400

;; Query time: 62 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Apr 09 03:42:41 CST 2022
;; MSG SIZE  rcvd: 107
Host info
Host 105.48.139.103.in-addr.arpa not found: 2(SERVFAIL)
Nslookup info:
server can't find 103.139.48.105.in-addr.arpa: SERVFAIL
Related IP info:
Related comments:
IP Type Details Datetime
37.187.25.138 attackbotsspam
Oct 13 16:50:35 marvibiene sshd[7984]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=37.187.25.138  user=root
Oct 13 16:50:37 marvibiene sshd[7984]: Failed password for root from 37.187.25.138 port 51860 ssh2
Oct 13 16:54:10 marvibiene sshd[8062]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=37.187.25.138  user=root
Oct 13 16:54:13 marvibiene sshd[8062]: Failed password for root from 37.187.25.138 port 35896 ssh2
...
2019-10-14 00:54:51
185.72.26.134 attackspam
IP Ban Report : https://help-dysk.pl/wordpress-firewall-plugins/ip/185.72.26.134/ 
 IR - 1H : (47)  
 Protection Against DDoS WordPress plugin :  
 "odzyskiwanie danych help-dysk" 
 IP Address Ranges by Country : IR 
 NAME ASN : ASN49100 
 
 IP : 185.72.26.134 
 
 CIDR : 185.72.24.0/22 
 
 PREFIX COUNT : 82 
 
 UNIQUE IP COUNT : 134656 
 
 
 WYKRYTE ATAKI Z ASN49100 :  
  1H - 1 
  3H - 1 
  6H - 1 
 12H - 1 
 24H - 1 
 
 DateTime : 2019-10-13 13:48:24 
 
 INFO : Port SERVER 80 Scan Detected and Blocked by ADMIN  - data recovery
2019-10-14 01:32:40
95.215.58.146 attack
Oct 13 12:01:56 game-panel sshd[26507]: Failed password for root from 95.215.58.146 port 54530 ssh2
Oct 13 12:06:23 game-panel sshd[26659]: Failed password for root from 95.215.58.146 port 46253 ssh2
2019-10-14 01:34:33
148.72.232.135 attack
Automatic report - XMLRPC Attack
2019-10-14 01:25:58
222.175.49.22 attack
Fail2Ban - HTTP Exploit Attempt
2019-10-14 01:30:28
137.74.111.39 attack
137.74.111.39 has been banned for [spam]
...
2019-10-14 00:56:42
1.55.17.162 attack
2019-10-13T11:49:44.484084abusebot-7.cloudsearch.cf sshd\[17558\]: Invalid user China@2017 from 1.55.17.162 port 38586
2019-10-14 00:49:04
64.53.14.211 attackbotsspam
Tried sshing with brute force.
2019-10-14 00:53:04
182.61.109.92 attack
Oct 13 19:06:02 ns381471 sshd[14977]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.61.109.92
Oct 13 19:06:04 ns381471 sshd[14977]: Failed password for invalid user Montana@123 from 182.61.109.92 port 47718 ssh2
Oct 13 19:10:05 ns381471 sshd[15447]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.61.109.92
2019-10-14 01:14:12
79.137.84.144 attack
2019-10-13T17:05:18.919289abusebot-5.cloudsearch.cf sshd\[9186\]: Invalid user oracle from 79.137.84.144 port 60478
2019-10-14 01:18:15
41.221.168.167 attackspambots
Automatic report - Banned IP Access
2019-10-14 01:32:15
62.173.149.65 attackspambots
" "
2019-10-14 01:16:46
35.199.154.128 attackspam
2019-10-13T14:01:42.473676hub.schaetter.us sshd\[14964\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.154.199.35.bc.googleusercontent.com  user=root
2019-10-13T14:01:44.311464hub.schaetter.us sshd\[14964\]: Failed password for root from 35.199.154.128 port 57872 ssh2
2019-10-13T14:05:17.122825hub.schaetter.us sshd\[14986\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.154.199.35.bc.googleusercontent.com  user=root
2019-10-13T14:05:18.498781hub.schaetter.us sshd\[14986\]: Failed password for root from 35.199.154.128 port 39830 ssh2
2019-10-13T14:08:40.994812hub.schaetter.us sshd\[15017\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.154.199.35.bc.googleusercontent.com  user=root
...
2019-10-14 01:29:53
41.79.224.105 attack
Oct 13 15:55:16 raspberrypi sshd\[8105\]: Failed password for root from 41.79.224.105 port 37126 ssh2Oct 13 16:18:51 raspberrypi sshd\[8714\]: Failed password for root from 41.79.224.105 port 57088 ssh2Oct 13 16:23:56 raspberrypi sshd\[8840\]: Failed password for root from 41.79.224.105 port 40852 ssh2
...
2019-10-14 00:58:02
8.23.37.201 attackbotsspam
Mail/25/465/587-993/995 Probe, Reject, BadAuth, Hack, SPAM -
2019-10-14 01:14:44

Recently Reported IPs

103.139.48.103 103.139.48.107 103.139.48.108 103.139.48.11
103.139.48.119 103.139.48.120 103.139.48.125 103.139.48.129
103.139.48.13 103.139.48.130 103.139.48.132 103.139.48.133
103.139.48.137 103.139.48.139 103.139.48.140 103.139.48.141
103.139.48.142 103.139.48.143 103.139.48.144 103.139.48.145