Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Sydney

Region: New South Wales

Country: Australia

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 103.139.48.246
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 56379
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;103.139.48.246.			IN	A

;; AUTHORITY SECTION:
.			141	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022040901 1800 900 604800 86400

;; Query time: 22 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Apr 10 05:31:40 CST 2022
;; MSG SIZE  rcvd: 107
Host info
Host 246.48.139.103.in-addr.arpa not found: 2(SERVFAIL)
Nslookup info:
server can't find 103.139.48.246.in-addr.arpa: SERVFAIL
Related IP info:
Related comments:
IP Type Details Datetime
222.173.245.234 attack
Attempted connection to port 445.
2020-04-22 19:57:43
200.49.173.131 attackbotsspam
Attempted connection to port 1433.
2020-04-22 19:59:52
211.43.13.243 attackspambots
$f2bV_matches
2020-04-22 19:48:51
120.92.102.213 attackspambots
firewall-block, port(s): 6024/tcp
2020-04-22 20:07:08
42.159.228.125 attackbots
Apr 22 14:00:17 DAAP sshd[32106]: Invalid user mz from 42.159.228.125 port 48830
Apr 22 14:00:18 DAAP sshd[32106]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=42.159.228.125
Apr 22 14:00:17 DAAP sshd[32106]: Invalid user mz from 42.159.228.125 port 48830
Apr 22 14:00:19 DAAP sshd[32106]: Failed password for invalid user mz from 42.159.228.125 port 48830 ssh2
Apr 22 14:05:07 DAAP sshd[32174]: Invalid user admin from 42.159.228.125 port 45247
...
2020-04-22 20:23:26
197.248.0.222 attackbots
Invalid user zp from 197.248.0.222 port 36926
2020-04-22 20:01:04
106.39.21.10 attackbotsspam
Apr 22 17:02:42 gw1 sshd[29902]: Failed password for root from 106.39.21.10 port 42494 ssh2
...
2020-04-22 20:19:51
24.6.59.51 attack
odoo8
...
2020-04-22 19:43:18
200.73.129.109 attackbots
$f2bV_matches
2020-04-22 19:58:33
118.101.184.191 attack
Honeypot attack, port: 81, PTR: PTR record not found
2020-04-22 20:14:45
92.222.216.222 attackbotsspam
Invalid user fi from 92.222.216.222 port 33938
2020-04-22 20:04:33
41.207.184.182 attackbotsspam
Apr 22 13:58:08 legacy sshd[14564]: Failed password for root from 41.207.184.182 port 35686 ssh2
Apr 22 14:05:16 legacy sshd[14661]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=41.207.184.182
Apr 22 14:05:19 legacy sshd[14661]: Failed password for invalid user ftpuser from 41.207.184.182 port 42746 ssh2
...
2020-04-22 20:09:17
102.67.19.2 attackbots
IMAP
2020-04-22 20:08:42
91.203.145.26 attackspam
Invalid user admin from 91.203.145.26 port 47812
2020-04-22 19:56:07
171.244.21.243 attackbotsspam
Attempted connection to port 445.
2020-04-22 20:03:31

Recently Reported IPs

103.139.48.245 103.139.48.249 103.139.48.25 103.139.48.250
103.139.48.251 103.139.48.26 103.139.48.3 103.139.48.30
103.139.48.31 103.139.48.32 103.139.48.33 103.139.48.34
103.139.48.35 103.139.48.36 103.139.48.37 103.139.48.38
103.139.48.4 103.139.48.40 103.139.48.41 103.139.48.42