Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: None

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 48.137.103.159
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 3579
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;48.137.103.159.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025020600 1800 900 604800 86400

;; Query time: 59 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Feb 06 18:27:30 CST 2025
;; MSG SIZE  rcvd: 107
Host info
Host 159.103.137.48.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 159.103.137.48.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
23.129.64.158 attackbots
Automatic report - Web App Attack
2019-07-05 06:29:13
103.119.140.25 attack
Unauthorized connection attempt from IP address 103.119.140.25 on Port 445(SMB)
2019-07-05 06:04:06
46.3.96.69 attackbots
04.07.2019 21:50:13 Connection to port 3432 blocked by firewall
2019-07-05 06:01:08
113.172.217.173 attackbotsspam
Jul  4 15:56:38 master sshd[12674]: Failed password for invalid user admin from 113.172.217.173 port 52109 ssh2
2019-07-05 06:07:46
222.173.81.22 attackspambots
Jul  4 21:30:27 vps691689 sshd[19252]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.173.81.22
Jul  4 21:30:29 vps691689 sshd[19252]: Failed password for invalid user ken from 222.173.81.22 port 31157 ssh2
...
2019-07-05 06:05:09
149.56.44.101 attackspambots
Jun  9 13:07:57 yesfletchmain sshd\[21023\]: Invalid user vsftpd from 149.56.44.101 port 53538
Jun  9 13:07:57 yesfletchmain sshd\[21023\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=149.56.44.101
Jun  9 13:07:59 yesfletchmain sshd\[21023\]: Failed password for invalid user vsftpd from 149.56.44.101 port 53538 ssh2
Jun  9 13:11:39 yesfletchmain sshd\[21168\]: Invalid user roger from 149.56.44.101 port 41492
Jun  9 13:11:39 yesfletchmain sshd\[21168\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=149.56.44.101
...
2019-07-05 06:24:33
77.20.216.19 attackbotsspam
Jul  4 20:42:38 lvps5-35-247-183 sshd[21945]: Invalid user pi from 77.20.216.19
Jul  4 20:42:39 lvps5-35-247-183 sshd[21947]: Invalid user pi from 77.20.216.19
Jul  4 20:42:40 lvps5-35-247-183 sshd[21945]: Failed password for invalid user pi from 77.20.216.19 port 40108 ssh2
Jul  4 20:42:40 lvps5-35-247-183 sshd[21945]: Connection closed by 77.20.216.19 [preauth]
Jul  4 20:42:41 lvps5-35-247-183 sshd[21947]: Failed password for invalid user pi from 77.20.216.19 port 40110 ssh2
Jul  4 20:42:41 lvps5-35-247-183 sshd[21947]: Connection closed by 77.20.216.19 [preauth]


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=77.20.216.19
2019-07-05 06:08:05
185.220.101.62 attackspam
Automatic report - Web App Attack
2019-07-05 06:33:49
121.162.131.223 attackbots
ssh failed login
2019-07-05 06:17:21
189.3.152.194 attack
SSH Bruteforce Attack
2019-07-05 06:18:42
118.24.124.138 attack
Jul  4 14:49:17 vps sshd[28616]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.24.124.138 
Jul  4 14:49:18 vps sshd[28616]: Failed password for invalid user teamspeak from 118.24.124.138 port 53720 ssh2
Jul  4 15:01:26 vps sshd[29055]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.24.124.138 
...
2019-07-05 06:38:56
121.136.156.51 attackspambots
Scanning (more than 2 packets) random ports - tries to find possible vulnerable services
2019-07-05 06:36:52
118.25.208.97 attackspambots
$f2bV_matches
2019-07-05 06:38:39
89.248.174.3 attackspam
04.07.2019 19:06:13 Connection to port 591 blocked by firewall
2019-07-05 06:04:32
188.254.106.186 attackbots
utm - spam
2019-07-05 06:30:01

Recently Reported IPs

166.53.167.38 231.162.51.84 78.223.127.152 49.16.132.212
140.247.115.49 188.91.19.157 28.112.244.123 56.76.34.33
174.44.176.110 206.129.138.42 24.170.233.155 34.84.160.72
124.12.85.243 153.158.190.229 6.179.72.36 122.232.152.60
85.70.116.89 241.250.71.207 69.235.235.141 209.10.185.85