Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 48.129.53.139
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 6811
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;48.129.53.139.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025022000 1800 900 604800 86400

;; Query time: 15 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Feb 20 18:00:26 CST 2025
;; MSG SIZE  rcvd: 106
Host info
Host 139.53.129.48.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 139.53.129.48.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
210.14.69.76 attackbots
Sep  8 15:37:44 itv-usvr-01 sshd[30598]: Invalid user pyla from 210.14.69.76
Sep  8 15:37:44 itv-usvr-01 sshd[30598]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=210.14.69.76
Sep  8 15:37:44 itv-usvr-01 sshd[30598]: Invalid user pyla from 210.14.69.76
Sep  8 15:37:47 itv-usvr-01 sshd[30598]: Failed password for invalid user pyla from 210.14.69.76 port 46910 ssh2
2019-09-08 16:51:48
91.121.143.205 attackbots
[ssh] SSH attack
2019-09-08 16:42:40
123.207.2.120 attackbotsspam
Sep  8 08:17:25 MK-Soft-VM5 sshd\[30434\]: Invalid user tommy from 123.207.2.120 port 42254
Sep  8 08:17:25 MK-Soft-VM5 sshd\[30434\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=123.207.2.120
Sep  8 08:17:27 MK-Soft-VM5 sshd\[30434\]: Failed password for invalid user tommy from 123.207.2.120 port 42254 ssh2
...
2019-09-08 17:04:18
188.240.196.66 attack
proto=tcp  .  spt=54087  .  dpt=25  .     (listed on 188.240.196.0/24    Iranian ip   dnsbl-sorbs abuseat-org barracuda)     (840)
2019-09-08 16:52:46
222.186.30.111 attackspam
2019-09-08T08:18:00.204909abusebot-3.cloudsearch.cf sshd\[5165\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.30.111  user=root
2019-09-08 16:22:10
200.35.49.65 attack
proto=tcp  .  spt=55040  .  dpt=25  .     (listed on Dark List de Sep 08)     (845)
2019-09-08 16:29:46
51.68.123.37 attack
Sep  7 22:46:07 web9 sshd\[29850\]: Invalid user csserver from 51.68.123.37
Sep  7 22:46:07 web9 sshd\[29850\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.68.123.37
Sep  7 22:46:08 web9 sshd\[29850\]: Failed password for invalid user csserver from 51.68.123.37 port 32984 ssh2
Sep  7 22:50:14 web9 sshd\[30691\]: Invalid user vyatta from 51.68.123.37
Sep  7 22:50:14 web9 sshd\[30691\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.68.123.37
2019-09-08 16:59:47
80.93.210.82 attack
445/tcp 445/tcp 445/tcp...
[2019-07-12/09-08]8pkt,1pt.(tcp)
2019-09-08 16:54:02
45.136.109.37 attackbots
09/08/2019-04:17:31.302297 45.136.109.37 Protocol: 6 ET SCAN NMAP -sS window 1024
2019-09-08 16:58:02
85.105.145.67 attackspambots
Automatic report - Port Scan Attack
2019-09-08 16:56:28
54.37.232.131 attackspam
[AUTOMATIC REPORT] - 25 tries in total - SSH BRUTE FORCE - IP banned
2019-09-08 16:17:23
198.211.114.208 attackbotsspam
Automatic report - Banned IP Access
2019-09-08 16:54:32
37.9.134.133 attack
proto=tcp  .  spt=49980  .  dpt=25  .     (listed on Dark List de Sep 08)     (837)
2019-09-08 17:06:15
23.254.238.2 attackspambots
" "
2019-09-08 16:58:37
182.176.158.112 attack
445/tcp 445/tcp 445/tcp...
[2019-07-08/09-08]6pkt,1pt.(tcp)
2019-09-08 16:43:54

Recently Reported IPs

51.138.40.244 142.255.233.165 130.80.218.168 25.149.33.51
216.225.19.211 121.113.210.253 214.2.211.116 36.113.11.81
253.61.69.232 59.115.248.215 48.100.47.30 7.165.180.245
218.178.37.95 139.114.179.137 15.194.243.184 166.174.255.171
216.174.168.179 77.61.245.88 132.244.222.177 108.39.219.108