Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Zhengzhou

Region: Henan

Country: China

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 123.52.148.139
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 44723
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;123.52.148.139.			IN	A

;; AUTHORITY SECTION:
.			582	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022030901 1800 900 604800 86400

;; Query time: 17 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Mar 10 08:34:31 CST 2022
;; MSG SIZE  rcvd: 107
Host info
139.148.52.123.in-addr.arpa domain name pointer 139.148.52.123.broad.ly.ha.dynamic.163data.com.cn.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
139.148.52.123.in-addr.arpa	name = 139.148.52.123.broad.ly.ha.dynamic.163data.com.cn.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
118.70.186.70 attack
445/tcp
[2020-04-08]1pkt
2020-04-09 03:57:11
186.225.151.46 attackspam
Tried to log into my steam account, most likely used brute force and then tried to change my password 

Could potentially have my email too as it sent to my email
2020-04-09 04:04:43
60.248.52.35 attackspambots
23/tcp
[2020-04-08]1pkt
2020-04-09 04:12:24
193.142.146.21 attack
prod3
...
2020-04-09 04:09:36
18.223.72.99 attackspambots
IDS admin
2020-04-09 04:02:04
190.128.130.242 attackspambots
Unauthorized connection attempt detected from IP address 190.128.130.242 to port 445
2020-04-09 04:13:20
79.10.62.172 attackspambots
23/tcp
[2020-04-08]1pkt
2020-04-09 04:16:46
111.230.13.11 attack
Apr  8 19:36:54 gw1 sshd[29314]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.230.13.11
Apr  8 19:36:56 gw1 sshd[29314]: Failed password for invalid user admin from 111.230.13.11 port 59660 ssh2
...
2020-04-09 04:19:12
2604:a880:400:d1::6ab:e001 attackspambots
Honeypot attack, port: 7, PTR: do-prod-us-east-burner-0402-2.do.binaryedge.ninja.
2020-04-09 04:10:36
79.142.84.198 attackbotsspam
Unauthorized connection attempt detected from IP address 79.142.84.198 to port 445
2020-04-09 04:24:23
114.35.93.210 attackspam
4567/tcp
[2020-04-08]1pkt
2020-04-09 04:11:01
192.241.238.210 attack
26/tcp 5094/tcp 389/tcp...
[2020-02-07/04-08]19pkt,17pt.(tcp),1pt.(udp)
2020-04-09 03:50:41
75.119.217.147 attackbots
WordPress brute-force
2020-04-09 04:12:01
51.254.205.6 attackspam
Apr  8 18:07:16 124388 sshd[15461]: Invalid user postgres from 51.254.205.6 port 33714
Apr  8 18:07:16 124388 sshd[15461]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.254.205.6
Apr  8 18:07:16 124388 sshd[15461]: Invalid user postgres from 51.254.205.6 port 33714
Apr  8 18:07:18 124388 sshd[15461]: Failed password for invalid user postgres from 51.254.205.6 port 33714 ssh2
Apr  8 18:12:02 124388 sshd[15610]: Invalid user postgres from 51.254.205.6 port 44016
2020-04-09 04:24:53
202.166.171.82 attackbots
1433/tcp 445/tcp
[2020-04-04/08]2pkt
2020-04-09 03:53:08

Recently Reported IPs

123.52.148.12 123.52.148.149 123.52.148.198 123.52.149.163
123.52.149.176 123.52.149.224 123.52.149.236 123.52.149.58
144.66.238.207 123.52.15.158 123.52.150.18 123.52.150.212
123.52.150.80 123.52.151.12 123.52.151.215 123.52.151.40
123.52.152.208 123.52.152.212 123.52.152.83 123.52.153.111