Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Hong Kong

Internet Service Provider: Chinatelecom Next Carrying HongKong region Network

Hostname: unknown

Organization: China Telecom Next Generation Carrier Network

Usage Type: Fixed Line ISP

Comments:
Type Details Datetime
attackspam
Dec 27 07:28:56 debian-2gb-nbg1-2 kernel: \[1080861.507771\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=210.48.139.158 DST=195.201.40.59 LEN=40 TOS=0x00 PREC=0x00 TTL=239 ID=13210 PROTO=TCP SPT=57132 DPT=199 WINDOW=1024 RES=0x00 SYN URGP=0
2019-12-27 16:25:31
attackspambots
Dec 22 13:24:47 debian-2gb-nbg1-2 kernel: \[670238.384699\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=210.48.139.158 DST=195.201.40.59 LEN=40 TOS=0x00 PREC=0x00 TTL=239 ID=59312 PROTO=TCP SPT=57132 DPT=84 WINDOW=1024 RES=0x00 SYN URGP=0
2019-12-22 22:19:48
attackbots
Scanning (more than 2 packets) random ports - tries to find possible vulnerable services
2019-06-26 15:08:40
attackbots
MultiHost/MultiPort Probe, Scan, Hack -
2019-06-23 00:49:29
attackbots
firewall-block, port(s): 53/tcp, 100/tcp, 8081/tcp, 10000/tcp
2019-06-21 20:33:21
Comments on same subnet:
IP Type Details Datetime
210.48.139.228 attackspam
spam
2020-03-01 18:53:52
210.48.139.228 attackspam
spam
2020-01-24 16:00:23
210.48.139.228 attack
Jul 29 11:34:52 mail postfix/postscreen[10598]: PREGREET 14 after 0.59 from [210.48.139.228]:39952: EHLO loss.it

...
2019-07-30 07:26:13
Whois info:
b
Dig info:

; <<>> DiG 9.10.3-P4-Ubuntu <<>> 210.48.139.158
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 39668
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;210.48.139.158.			IN	A

;; AUTHORITY SECTION:
.			3600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019041200 1800 900 604800 86400

;; Query time: 1 msec
;; SERVER: 67.207.67.3#53(67.207.67.3)
;; WHEN: Sat Apr 13 00:37:49 +08 2019
;; MSG SIZE  rcvd: 118

Host info
Host 158.139.48.210.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		67.207.67.3
Address:	67.207.67.3#53

** server can't find 158.139.48.210.in-addr.arpa: NXDOMAIN

Related IP info:
Related comments:
IP Type Details Datetime
174.250.210.50 attack
Hacked
2021-10-13 14:39:17
183.63.253.200 normal
jzn
2021-10-07 19:44:46
105.112.38.131 spambotsattackproxynormal
Need to truck this person
2021-10-17 22:24:50
66.240.205.34 attack
enyi
2021-10-02 11:37:50
2001:0002:14:5:1:2:bf35:2610 spambotsattackproxynormal
2048
2021-09-28 16:54:06
181.47.191.37 normal
Normal IP
2021-10-07 06:02:45
217.107.115.218 spamattack
Made an attack on our service, using it to send tons of spam SMS messages
2021-10-11 23:09:07
2001:0002:14:5:1:2:bf35:2610 normal
Hi
2021-09-30 13:33:28
5.188.62.147 spam
Ꮲarty Snaps Photo Booth OC | Photo Booth Rentaⅼ Orange County
12911 Dungan Ln, Garden Grove, CA 92840
how much is 360 photo booth rental гiverside
2021-10-21 20:27:13
60.50.25.135 spambotsattackproxy
随便hack人家的account
2021-09-28 08:21:12
122.252.239.167 spambotsattackproxynormal
122.252.239.167
2021-10-17 21:46:52
94.232.42.80 attack
Attack, like DDOS, Brute-Force, Port Scan, Hack, etc.
Panda Security
2021-09-28 17:30:49
111.90.250.204 spambotsattackproxynormal
Iyes
2021-10-16 23:01:42
194.39.227.230 spambotsattackproxynormal
Spam
2021-10-17 00:36:55
100.78.195.105 spambotsattackproxynormal
Ppssdddfhgfhjgnb
2021-09-28 02:52:34

Recently Reported IPs

36.90.216.100 123.19.161.152 1.236.28.80 150.242.99.37
97.81.154.92 203.130.20.139 186.179.100.47 119.55.121.74
212.129.138.140 113.195.74.83 82.64.29.249 80.178.145.232
124.13.180.162 119.27.175.249 113.160.172.198 49.84.230.103
197.47.202.236 178.33.85.143 120.211.24.5 121.17.22.174