Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 139.121.48.7
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 47760
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;139.121.48.7.			IN	A

;; AUTHORITY SECTION:
.			132	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2023011600 1800 900 604800 86400

;; Query time: 56 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Jan 16 21:10:57 CST 2023
;; MSG SIZE  rcvd: 105
Host info
Host 7.48.121.139.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 7.48.121.139.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
37.235.144.193 attackbotsspam
Unauthorized connection attempt detected from IP address 37.235.144.193 to port 80 [T]
2020-06-24 02:31:22
91.201.116.241 attackbotsspam
Unauthorized connection attempt detected from IP address 91.201.116.241 to port 2323 [T]
2020-06-24 02:27:49
185.173.35.5 attack
9983/tcp 8531/tcp 83/tcp...
[2020-04-24/06-23]75pkt,55pt.(tcp),3pt.(udp),1tp.(icmp)
2020-06-24 02:21:12
31.207.210.39 attackspam
Unauthorized connection attempt detected from IP address 31.207.210.39 to port 80 [T]
2020-06-24 02:33:32
216.218.206.66 attack
Unauthorized connection attempt detected from IP address 216.218.206.66 to port 21
2020-06-24 01:59:47
5.188.206.18 attackspam
Unauthorized connection attempt detected from IP address 5.188.206.18 to port 9955
2020-06-24 01:59:00
222.187.218.30 attackbotsspam
Unauthorized connection attempt detected from IP address 222.187.218.30 to port 23 [T]
2020-06-24 02:34:44
118.238.48.91 attackbotsspam
Unauthorized connection attempt detected from IP address 118.238.48.91 to port 23 [T]
2020-06-24 02:05:53
117.4.163.246 attackbots
Unauthorized connection attempt detected from IP address 117.4.163.246 to port 445 [T]
2020-06-24 02:25:35
162.62.16.194 attackbotsspam
Unauthorized connection attempt detected from IP address 162.62.16.194 to port 9009 [T]
2020-06-24 02:23:36
45.226.79.16 attack
Unauthorized connection attempt detected from IP address 45.226.79.16 to port 445 [T]
2020-06-24 02:30:53
60.216.46.77 attackspambots
Jun 23 19:43:07 santamaria sshd\[3359\]: Invalid user nagios from 60.216.46.77
Jun 23 19:43:07 santamaria sshd\[3359\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=60.216.46.77
Jun 23 19:43:09 santamaria sshd\[3359\]: Failed password for invalid user nagios from 60.216.46.77 port 36439 ssh2
...
2020-06-24 02:12:28
5.129.182.134 attack
Unauthorized connection attempt detected from IP address 5.129.182.134 to port 23 [T]
2020-06-24 02:15:30
218.92.0.221 attack
$f2bV_matches
2020-06-24 01:59:15
117.2.122.13 attack
Unauthorized connection attempt detected from IP address 117.2.122.13 to port 445 [T]
2020-06-24 02:26:08

Recently Reported IPs

206.182.103.103 108.32.178.3 55.61.200.17 26.180.223.194
80.4.99.121 58.101.75.40 145.121.88.82 118.177.115.245
170.157.117.7 106.7.118.202 114.124.212.130 0.173.178.219
48.169.208.112 93.35.54.4 93.123.247.138 181.73.24.109
27.61.81.112 255.98.30.126 232.243.101.89 108.52.116.175