Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Sydney

Region: New South Wales

Country: Australia

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 103.139.48.2
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 53564
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;103.139.48.2.			IN	A

;; AUTHORITY SECTION:
.			14	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022040901 1800 900 604800 86400

;; Query time: 21 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Apr 10 05:28:34 CST 2022
;; MSG SIZE  rcvd: 105
Host info
Host 2.48.139.103.in-addr.arpa not found: 2(SERVFAIL)
Nslookup info:
server can't find 103.139.48.2.in-addr.arpa: SERVFAIL
Related IP info:
Related comments:
IP Type Details Datetime
197.156.81.252 attackspam
Unauthorized connection attempt from IP address 197.156.81.252 on Port 445(SMB)
2019-08-25 12:00:49
92.51.75.246 attackbots
Unauthorized connection attempt from IP address 92.51.75.246 on Port 445(SMB)
2019-08-25 12:09:37
177.23.184.99 attack
2019-08-25T03:50:18.444623abusebot-6.cloudsearch.cf sshd\[10984\]: Invalid user kr from 177.23.184.99 port 60034
2019-08-25 12:15:14
142.93.114.123 attackbots
SSH Brute Force, server-1 sshd[1459]: Failed password for invalid user admin from 142.93.114.123 port 57608 ssh2
2019-08-25 11:59:58
187.177.164.189 attackbotsspam
MultiHost/MultiPort Probe, Scan, Hack -
2019-08-25 12:07:57
84.228.65.242 attackspam
Automatic report - Port Scan Attack
2019-08-25 12:20:57
171.236.96.2 attackspambots
port scan and connect, tcp 23 (telnet)
2019-08-25 12:18:39
121.135.100.139 attackspambots
Telnet Server BruteForce Attack
2019-08-25 12:33:51
80.103.163.66 attackspam
Aug 25 05:53:35 MainVPS sshd[23858]: Invalid user hadoop123!@# from 80.103.163.66 port 51403
Aug 25 05:53:35 MainVPS sshd[23858]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=80.103.163.66
Aug 25 05:53:35 MainVPS sshd[23858]: Invalid user hadoop123!@# from 80.103.163.66 port 51403
Aug 25 05:53:37 MainVPS sshd[23858]: Failed password for invalid user hadoop123!@# from 80.103.163.66 port 51403 ssh2
Aug 25 05:57:54 MainVPS sshd[24158]: Invalid user rizky from 80.103.163.66 port 45350
...
2019-08-25 12:25:54
194.58.71.195 attackspambots
Unauthorized connection attempt from IP address 194.58.71.195 on Port 445(SMB)
2019-08-25 12:03:01
13.127.83.88 attack
fail2ban honeypot
2019-08-25 12:14:28
60.184.241.200 attackspambots
SSH/22 MH Probe, BF, Hack -
2019-08-25 11:47:41
110.137.98.3 attackspam
Unauthorized connection attempt from IP address 110.137.98.3 on Port 445(SMB)
2019-08-25 11:53:30
52.230.68.68 attackspambots
Aug 25 01:50:23 vps647732 sshd[25202]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=52.230.68.68
Aug 25 01:50:25 vps647732 sshd[25202]: Failed password for invalid user opc from 52.230.68.68 port 47858 ssh2
...
2019-08-25 12:16:32
88.208.206.200 attack
Automatic report - Banned IP Access
2019-08-25 12:25:21

Recently Reported IPs

103.139.48.199 103.139.48.201 103.139.48.203 103.139.48.204
103.139.48.205 103.139.48.206 103.139.48.208 103.139.48.209
103.139.48.21 103.139.48.210 103.139.48.211 103.139.48.212
103.139.48.213 103.139.48.214 103.139.48.215 103.139.48.217
103.139.48.218 237.189.151.231 103.139.48.219 103.139.48.220