Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: None

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 103.148.179.139
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 56981
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;103.148.179.139.		IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025021901 1800 900 604800 86400

;; Query time: 8 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Feb 20 02:07:55 CST 2025
;; MSG SIZE  rcvd: 108
Host info
Host 139.179.148.103.in-addr.arpa not found: 2(SERVFAIL)
Nslookup info:
;; Got SERVFAIL reply from 183.60.83.19, trying next server
Server:		183.60.82.98
Address:	183.60.82.98#53

** server can't find 139.179.148.103.in-addr.arpa: SERVFAIL
Related IP info:
Related comments:
IP Type Details Datetime
69.245.71.26 attackbotsspam
2020-08-14T15:45:09.444771morrigan.ad5gb.com sshd[3455204]: Failed password for root from 69.245.71.26 port 49244 ssh2
2020-08-14T15:45:11.784193morrigan.ad5gb.com sshd[3455204]: Disconnected from authenticating user root 69.245.71.26 port 49244 [preauth]
2020-08-15 04:52:22
61.177.172.159 attackbots
Failed password for invalid user from 61.177.172.159 port 54877 ssh2
2020-08-15 05:02:54
111.72.197.18 attackbotsspam
Aug 14 22:40:59 srv01 postfix/smtpd\[6846\]: warning: unknown\[111.72.197.18\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Aug 14 22:44:26 srv01 postfix/smtpd\[9015\]: warning: unknown\[111.72.197.18\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Aug 14 22:44:37 srv01 postfix/smtpd\[9015\]: warning: unknown\[111.72.197.18\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Aug 14 22:44:53 srv01 postfix/smtpd\[9015\]: warning: unknown\[111.72.197.18\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Aug 14 22:45:11 srv01 postfix/smtpd\[9015\]: warning: unknown\[111.72.197.18\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
...
2020-08-15 04:53:14
185.132.53.200 attackbots
 TCP (SYN) 185.132.53.200:18112 -> port 8080, len 40
2020-08-15 04:42:39
106.52.213.68 attack
Aug 14 23:35:42 lukav-desktop sshd\[25070\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.52.213.68  user=root
Aug 14 23:35:43 lukav-desktop sshd\[25070\]: Failed password for root from 106.52.213.68 port 50378 ssh2
Aug 14 23:40:57 lukav-desktop sshd\[27498\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.52.213.68  user=root
Aug 14 23:40:58 lukav-desktop sshd\[27498\]: Failed password for root from 106.52.213.68 port 48048 ssh2
Aug 14 23:45:08 lukav-desktop sshd\[29515\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.52.213.68  user=root
2020-08-15 04:48:44
103.215.27.254 attackbots
Unauthorized connection attempt from IP address 103.215.27.254 on Port 445(SMB)
2020-08-15 04:51:55
222.186.180.17 attackspam
Aug 14 21:49:14 rocket sshd[20715]: Failed password for root from 222.186.180.17 port 39078 ssh2
Aug 14 21:49:26 rocket sshd[20715]: Failed password for root from 222.186.180.17 port 39078 ssh2
Aug 14 21:49:26 rocket sshd[20715]: error: maximum authentication attempts exceeded for root from 222.186.180.17 port 39078 ssh2 [preauth]
...
2020-08-15 04:54:01
221.7.213.133 attackspambots
Aug 14 22:37:42 eventyay sshd[16889]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=221.7.213.133
Aug 14 22:37:44 eventyay sshd[16889]: Failed password for invalid user com from 221.7.213.133 port 47410 ssh2
Aug 14 22:45:09 eventyay sshd[17072]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=221.7.213.133
...
2020-08-15 04:55:11
35.200.241.227 attackspam
Aug 14 22:26:13 sip sshd[4201]: Failed password for root from 35.200.241.227 port 39974 ssh2
Aug 14 22:40:32 sip sshd[8001]: Failed password for root from 35.200.241.227 port 36348 ssh2
2020-08-15 05:03:18
218.92.0.175 attack
[ssh] SSH attack
2020-08-15 04:40:48
114.231.104.56 attackbots
Blocked 114.231.104.56 For policy violation
2020-08-15 04:39:01
171.244.139.178 attack
Aug 15 01:56:37 gw1 sshd[18234]: Failed password for root from 171.244.139.178 port 18265 ssh2
...
2020-08-15 05:01:58
195.54.160.183 attackspam
Aug 14 23:04:31 ucs sshd\[28869\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=195.54.160.183  user=root
Aug 14 23:04:33 ucs sshd\[25378\]: error: PAM: User not known to the underlying authentication module for root from 195.54.160.183
Aug 14 23:04:33 ucs sshd\[28871\]: Invalid user share from 195.54.160.183 port 22276
...
2020-08-15 05:04:09
153.101.167.242 attack
Aug 14 19:42:37 server sshd[1904]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=153.101.167.242  user=root
Aug 14 19:42:39 server sshd[1904]: Failed password for invalid user root from 153.101.167.242 port 60876 ssh2
Aug 14 19:56:49 server sshd[2462]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=153.101.167.242  user=root
Aug 14 19:56:51 server sshd[2462]: Failed password for invalid user root from 153.101.167.242 port 55668 ssh2
2020-08-15 04:37:50
220.231.127.3 attack
Unauthorized connection attempt from IP address 220.231.127.3 on Port 445(SMB)
2020-08-15 04:46:17

Recently Reported IPs

67.93.182.139 34.96.50.49 169.24.234.119 52.122.147.39
204.107.83.81 98.0.65.60 29.86.248.63 19.31.161.193
50.116.142.43 188.122.204.12 124.33.15.87 77.216.29.249
151.212.205.208 87.238.8.7 118.171.117.231 250.54.165.215
40.89.48.150 28.1.242.173 195.9.53.251 88.99.138.240