Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States of America (the)

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 48.41.240.139
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 48028
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;48.41.240.139.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025012801 1800 900 604800 86400

;; Query time: 57 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Jan 29 02:20:54 CST 2025
;; MSG SIZE  rcvd: 106
Host info
Host 139.240.41.48.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 139.240.41.48.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
185.53.88.63 attackspambots
*Port Scan* detected from 185.53.88.63 (NL/Netherlands/-). 4 hits in the last 221 seconds
2019-07-05 01:50:43
198.108.66.208 attackspambots
Automatic report - Web App Attack
2019-07-05 01:35:45
47.105.106.150 attackbots
MultiHost/MultiPort Probe, Scan, Hack -
2019-07-05 01:56:18
140.143.4.188 attackbots
Unauthorized SSH login attempts
2019-07-05 01:16:12
171.241.190.43 attackspambots
23/tcp 23/tcp 23/tcp...
[2019-06-15/07-04]6pkt,1pt.(tcp)
2019-07-05 01:27:53
107.170.48.143 attackbots
107.170.48.143 - - [04/Jul/2019:17:40:16 +0200] "GET /wp-login.php HTTP/1.1" 200 1237 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
107.170.48.143 - - [04/Jul/2019:17:40:17 +0200] "POST /wp-login.php HTTP/1.1" 200 1632 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
107.170.48.143 - - [04/Jul/2019:17:40:17 +0200] "GET /wp-login.php HTTP/1.1" 200 1237 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
107.170.48.143 - - [04/Jul/2019:17:40:18 +0200] "POST /wp-login.php HTTP/1.1" 200 1631 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
107.170.48.143 - - [04/Jul/2019:17:40:18 +0200] "GET /wp-login.php HTTP/1.1" 200 1237 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
107.170.48.143 - - [04/Jul/2019:17:40:19 +0200] "POST /wp-login.php HTTP/1.1" 200 1630 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
...
2019-07-05 01:26:40
153.126.139.185 attackspam
TCP src-port=38288   dst-port=25    dnsbl-sorbs abuseat-org barracuda         (764)
2019-07-05 01:15:25
178.89.225.135 attack
2019-07-04 14:51:48 unexpected disconnection while reading SMTP command from ([178.89.225.135]) [178.89.225.135]:12838 I=[10.100.18.20]:25 (error: Connection reset by peer)
2019-07-04 14:52:17 unexpected disconnection while reading SMTP command from ([178.89.225.135]) [178.89.225.135]:15927 I=[10.100.18.20]:25 (error: Connection reset by peer)
2019-07-04 14:52:29 unexpected disconnection while reading SMTP command from ([178.89.225.135]) [178.89.225.135]:6891 I=[10.100.18.20]:25 (error: Connection reset by peer)


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=178.89.225.135
2019-07-05 01:32:43
41.113.167.44 attackspambots
2019-07-04 14:50:31 unexpected disconnection while reading SMTP command from ([41.113.167.44]) [41.113.167.44]:2658 I=[10.100.18.25]:25 (error: Connection reset by peer)
2019-07-04 14:52:11 unexpected disconnection while reading SMTP command from ([41.113.167.44]) [41.113.167.44]:25182 I=[10.100.18.25]:25 (error: Connection reset by peer)
2019-07-04 14:52:38 unexpected disconnection while reading SMTP command from ([41.113.167.44]) [41.113.167.44]:5438 I=[10.100.18.25]:25 (error: Connection reset by peer)


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=41.113.167.44
2019-07-05 01:45:23
138.197.86.155 attackspambots
8545/tcp 8545/tcp 8545/tcp...
[2019-06-19/07-04]178pkt,1pt.(tcp)
2019-07-05 01:25:18
86.35.42.74 attack
$f2bV_matches
2019-07-05 01:11:01
118.25.238.76 attack
Apr 23 20:58:29 yesfletchmain sshd\[24223\]: Invalid user public from 118.25.238.76 port 35918
Apr 23 20:58:29 yesfletchmain sshd\[24223\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.25.238.76
Apr 23 20:58:30 yesfletchmain sshd\[24223\]: Failed password for invalid user public from 118.25.238.76 port 35918 ssh2
Apr 23 21:01:46 yesfletchmain sshd\[24270\]: Invalid user mani from 118.25.238.76 port 32980
Apr 23 21:01:46 yesfletchmain sshd\[24270\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.25.238.76
...
2019-07-05 01:51:01
77.114.174.134 attack
2019-07-04 14:50:47 unexpected disconnection while reading SMTP command from apn-77-114-174-134.dynamic.gprs.plus.pl [77.114.174.134]:27339 I=[10.100.18.25]:25 (error: Connection reset by peer)
2019-07-04 14:51:42 unexpected disconnection while reading SMTP command from apn-77-114-174-134.dynamic.gprs.plus.pl [77.114.174.134]:37906 I=[10.100.18.25]:25 (error: Connection reset by peer)
2019-07-04 14:52:29 unexpected disconnection while reading SMTP command from apn-77-114-174-134.dynamic.gprs.plus.pl [77.114.174.134]:26358 I=[10.100.18.25]:25 (error: Connection reset by peer)


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=77.114.174.134
2019-07-05 01:42:04
51.68.81.112 attack
Jul  4 18:58:41 srv03 sshd\[30909\]: Invalid user info from 51.68.81.112 port 44976
Jul  4 18:58:41 srv03 sshd\[30909\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.68.81.112
Jul  4 18:58:43 srv03 sshd\[30909\]: Failed password for invalid user info from 51.68.81.112 port 44976 ssh2
2019-07-05 01:40:58
138.197.146.200 attackspambots
Jul  4 16:33:07 s1 wordpress\(www.dance-corner.de\)\[8494\]: Authentication attempt for unknown user fehst from 138.197.146.200
...
2019-07-05 01:52:28

Recently Reported IPs

145.140.137.226 17.164.95.181 94.21.125.62 73.22.31.253
166.40.136.234 165.203.200.137 4.13.25.82 136.33.64.143
18.54.234.107 223.148.242.6 56.132.253.80 55.113.101.237
124.78.88.83 121.95.229.36 146.106.62.79 152.108.27.50
128.28.3.185 115.111.248.213 202.69.170.38 162.152.17.177