Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Singapore

Region: unknown

Country: Singapore

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 139.99.48.69
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 983
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;139.99.48.69.			IN	A

;; AUTHORITY SECTION:
.			359	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022011802 1800 900 604800 86400

;; Query time: 60 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Jan 19 13:23:16 CST 2022
;; MSG SIZE  rcvd: 105
Host info
69.48.99.139.in-addr.arpa domain name pointer ip69.ip-139-99-48.net.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
69.48.99.139.in-addr.arpa	name = ip69.ip-139-99-48.net.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
123.201.115.11 attackspam
[portscan] tcp/23 [TELNET]
*(RWIN=42516)(04301449)
2020-05-01 01:59:57
185.173.35.17 attack
[portscan] tcp/22 [SSH]
*(RWIN=65535)(04301449)
2020-05-01 02:19:36
187.101.225.200 attackspam
Unauthorized connection attempt detected from IP address 187.101.225.200 to port 81
2020-05-01 02:18:32
121.155.94.248 attackspambots
[portscan] tcp/23 [TELNET]
*(RWIN=1611)(04301449)
2020-05-01 02:27:15
85.105.36.139 attackbots
[portscan] tcp/23 [TELNET]
*(RWIN=3947)(04301449)
2020-05-01 02:06:41
118.200.72.27 attack
[portscan] tcp/23 [TELNET]
*(RWIN=51891)(04301449)
2020-05-01 02:00:45
111.65.154.204 attackbotsspam
[portscan] tcp/23 [TELNET]
*(RWIN=21585)(04301449)
2020-05-01 02:32:21
171.38.222.179 attackspambots
Unauthorized connection attempt detected from IP address 171.38.222.179 to port 23 [T]
2020-05-01 02:22:54
177.38.20.55 attackbots
[portscan] tcp/23 [TELNET]
*(RWIN=14600)(04301449)
2020-05-01 02:21:41
80.82.77.240 attackspambots
firewall-block, port(s): 2377/tcp, 2483/tcp
2020-05-01 02:35:28
178.233.234.188 attackspam
[portscan] tcp/81 [alter-web/web-proxy]
*(RWIN=14600)(04301449)
2020-05-01 02:21:10
171.233.224.72 attack
[portscan] tcp/23 [TELNET]
*(RWIN=56853)(04301449)
2020-05-01 02:22:30
162.243.140.86 attackbots
*Port Scan* detected from 162.243.140.86 (US/United States/California/San Francisco/zg-0428c-412.stretchoid.com). 4 hits in the last 250 seconds
2020-05-01 01:57:22
82.147.220.206 attack
(ftpd) Failed FTP login from 82.147.220.206 (SA/Saudi Arabia/-): 10 in the last 3600 secs
2020-05-01 02:07:07
45.169.43.170 attackbotsspam
[portscan] tcp/23 [TELNET]
*(RWIN=18950)(04301449)
2020-05-01 02:10:19

Recently Reported IPs

103.158.125.109 247.90.197.197 46.24.216.168 1.227.216.35
173.18.245.155 54.90.182.84 211.152.249.90 213.108.231.174
27.126.219.176 32.1.6.20 82.149.224.192 168.229.102.114
141.130.104.129 175.226.25.215 175.229.50.112 44.68.106.199
83.149.57.132 176.216.80.122 37.222.154.59 201.98.221.199