Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Sydney

Region: New South Wales

Country: Australia

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 103.139.48.142
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 49389
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;103.139.48.142.			IN	A

;; AUTHORITY SECTION:
.			554	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022040801 1800 900 604800 86400

;; Query time: 60 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Apr 09 03:43:48 CST 2022
;; MSG SIZE  rcvd: 107
Host info
b';; connection timed out; no servers could be reached
'
Nslookup info:
server can't find 103.139.48.142.in-addr.arpa: SERVFAIL
Related IP info:
Related comments:
IP Type Details Datetime
168.232.198.246 attack
Invalid user juliana from 168.232.198.246 port 55080
2020-10-01 22:35:31
68.183.53.170 attackspambots
Invalid user ems from 68.183.53.170 port 44912
2020-10-01 22:44:54
106.3.130.99 attackspam
IP 106.3.130.99 attacked honeypot on port: 22 at 10/1/2020 5:27:10 AM
2020-10-01 23:05:49
42.194.143.72 attackbotsspam
Sep 30 19:53:01 vps46666688 sshd[26805]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=42.194.143.72
Sep 30 19:53:03 vps46666688 sshd[26805]: Failed password for invalid user mike from 42.194.143.72 port 18845 ssh2
...
2020-10-01 22:50:05
140.86.39.162 attackbotsspam
Invalid user jay from 140.86.39.162 port 64754
2020-10-01 22:48:59
67.207.89.15 attackspam
SSH login attempts.
2020-10-01 22:41:03
13.233.194.72 attackbots
xmlrpc attack
2020-10-01 22:29:15
45.179.165.207 attackspam
Sep 30 22:39:30 mellenthin postfix/smtpd[20705]: NOQUEUE: reject: RCPT from 207.165.179.45.in-addr.arpa[45.179.165.207]: 554 5.7.1 Service unavailable; Client host [45.179.165.207] blocked using zen.spamhaus.org; https://www.spamhaus.org/query/ip/45.179.165.207; from= to= proto=ESMTP helo=<245.165.179.45.in-addr.arpa>
2020-10-01 22:43:09
143.255.244.205 attack
Firewall Dropped Connection
2020-10-01 23:07:33
158.69.0.38 attack
Invalid user xa from 158.69.0.38 port 57804
2020-10-01 22:30:40
66.41.236.80 attackbotsspam
[f2b] sshd bruteforce, retries: 1
2020-10-01 22:59:17
193.228.91.108 attack
Oct  1 16:02:58 s2 sshd[7685]: Failed password for root from 193.228.91.108 port 59744 ssh2
Oct  1 16:03:09 s2 sshd[7688]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=193.228.91.108 
Oct  1 16:03:11 s2 sshd[7688]: Failed password for invalid user oracle from 193.228.91.108 port 36964 ssh2
2020-10-01 22:33:07
49.233.147.147 attack
Invalid user t from 49.233.147.147 port 39548
2020-10-01 22:55:17
49.234.64.161 attackbots
SSH login attempts.
2020-10-01 22:27:36
94.45.192.49 attack
20/9/30@16:39:26: FAIL: Alarm-Network address from=94.45.192.49
20/9/30@16:39:26: FAIL: Alarm-Network address from=94.45.192.49
...
2020-10-01 22:47:33

Recently Reported IPs

103.139.48.141 103.139.48.143 103.139.48.144 103.139.48.145
103.139.48.146 103.139.48.149 103.139.48.15 103.139.48.153
103.139.48.154 103.139.48.158 103.139.48.160 103.139.48.161
103.139.48.165 103.139.48.166 103.139.48.167 103.146.203.32
103.146.203.84 103.147.142.4 103.147.143.51 103.147.186.168