Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: None

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 103.139.48.93
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 64765
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;103.139.48.93.			IN	A

;; AUTHORITY SECTION:
.			566	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022040101 1800 900 604800 86400

;; Query time: 68 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Apr 01 21:11:54 CST 2022
;; MSG SIZE  rcvd: 106
Host info
Host 93.48.139.103.in-addr.arpa not found: 2(SERVFAIL)
Nslookup info:
server can't find 103.139.48.93.in-addr.arpa: SERVFAIL
Related IP info:
Related comments:
IP Type Details Datetime
143.202.117.18 attackbotsspam
Unauthorised access (Nov 26) SRC=143.202.117.18 LEN=44 TOS=0x10 PREC=0x40 TTL=46 ID=5342 TCP DPT=23 WINDOW=54732 SYN
2019-11-26 22:29:26
101.95.29.150 attack
Automatic report - Banned IP Access
2019-11-26 22:06:55
102.64.66.251 attack
Unauthorized connection attempt from IP address 102.64.66.251 on Port 445(SMB)
2019-11-26 22:46:15
159.65.27.252 attackbots
Masscan Port Scanning Tool Detection
2019-11-26 22:08:54
111.231.138.136 attackbots
$f2bV_matches
2019-11-26 22:15:43
111.20.126.210 attack
Nov 26 10:27:14 mail sshd\[22547\]: Invalid user Administrator from 111.20.126.210
Nov 26 10:27:14 mail sshd\[22547\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.20.126.210
Nov 26 10:27:17 mail sshd\[22547\]: Failed password for invalid user Administrator from 111.20.126.210 port 36190 ssh2
...
2019-11-26 22:27:13
177.10.146.158 attackspambots
Telnet/23 MH Probe, BF, Hack -
2019-11-26 22:23:42
106.13.22.60 attack
Automatic report - SSH Brute-Force Attack
2019-11-26 22:26:06
101.51.218.143 attackspam
Telnet/23 MH Probe, BF, Hack -
2019-11-26 22:42:34
114.124.193.140 attackbots
Brute force SMTP login attempts.
2019-11-26 22:09:13
51.255.168.202 attackspambots
Nov 26 16:39:11 server sshd\[31844\]: Invalid user test5 from 51.255.168.202
Nov 26 16:39:11 server sshd\[31844\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=202.ip-51-255-168.eu 
Nov 26 16:39:14 server sshd\[31844\]: Failed password for invalid user test5 from 51.255.168.202 port 39586 ssh2
Nov 26 16:43:59 server sshd\[501\]: Invalid user gnieshad from 51.255.168.202
Nov 26 16:43:59 server sshd\[501\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=202.ip-51-255-168.eu 
...
2019-11-26 22:38:35
89.248.160.193 attack
firewall-block, port(s): 3394/tcp, 3395/tcp, 6901/tcp, 6903/tcp, 6904/tcp
2019-11-26 22:07:42
34.214.145.123 attack
Automatic report - Web App Attack
2019-11-26 22:25:20
139.155.45.196 attackspam
Nov 26 08:30:26 vps691689 sshd[28403]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.155.45.196
Nov 26 08:30:28 vps691689 sshd[28403]: Failed password for invalid user password123 from 139.155.45.196 port 56246 ssh2
...
2019-11-26 22:30:52
188.120.159.253 attack
Telnet/23 MH Probe, BF, Hack -
2019-11-26 22:15:14

Recently Reported IPs

103.139.48.71 103.139.75.123 103.139.75.46 103.139.75.72
103.139.89.182 103.145.50.243 103.145.51.100 103.145.51.130
103.145.54.99 103.145.96.72 103.145.97.36 103.146.100.79
103.146.104.30 103.146.111.134 103.146.124.171 103.146.124.197
103.146.151.83 103.146.174.208 103.146.176.116 41.74.205.157