Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: China

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 59.48.152.142
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 1731
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;59.48.152.142.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025021401 1800 900 604800 86400

;; Query time: 16 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Feb 15 09:25:10 CST 2025
;; MSG SIZE  rcvd: 106
Host info
Host 142.152.48.59.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 142.152.48.59.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
193.201.224.199 attackspambots
Jun 27 06:54:29 localhost sshd\[19026\]: Invalid user admin from 193.201.224.199 port 16881
Jun 27 06:54:29 localhost sshd\[19026\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=193.201.224.199
...
2019-06-27 14:24:32
77.154.194.148 attackbots
109.230.239.171 77.154.194.148 \[27/Jun/2019:07:06:01 +0200\] "GET /phpMyAdmin/scripts/setup.php HTTP/1.1" 301 532 "-" "ZmEu"
109.230.239.171 77.154.194.148 \[27/Jun/2019:07:06:01 +0200\] "GET /phpmyadmin/scripts/setup.php HTTP/1.1" 301 532 "-" "ZmEu"
109.230.239.171 77.154.194.148 \[27/Jun/2019:07:06:01 +0200\] "GET /pma/scripts/setup.php HTTP/1.1" 301 518 "-" "ZmEu"
2019-06-27 14:48:06
95.32.89.30 attackbotsspam
@LucianNitescu Personal Honeypot Network <<<>>> Donate at paypal.me/LNitescu <<<>>> 2019-06-26 04:12:42,157 INFO [shellcode_manager] (95.32.89.30) no match, writing hexdump (f653fa67bd3a0fb157645278b7008150 :11960) - SMB (Unknown)
2019-06-27 14:22:20
198.136.63.8 attackspam
Automatic report
2019-06-27 14:36:20
139.59.84.55 attackbots
Jun 27 08:59:48 OPSO sshd\[2983\]: Invalid user user3 from 139.59.84.55 port 44058
Jun 27 08:59:48 OPSO sshd\[2983\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.84.55
Jun 27 08:59:51 OPSO sshd\[2983\]: Failed password for invalid user user3 from 139.59.84.55 port 44058 ssh2
Jun 27 09:02:57 OPSO sshd\[3402\]: Invalid user cv from 139.59.84.55 port 46816
Jun 27 09:02:57 OPSO sshd\[3402\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.84.55
2019-06-27 15:06:38
218.87.254.142 attackspam
@LucianNitescu Personal Honeypot Network <<<>>> Donate at paypal.me/LNitescu <<<>>> 2019-06-27 03:13:13,386 INFO [shellcode_manager] (218.87.254.142) no match, writing hexdump (92a87b10f1e54a48f62a515a6e661c54 :1999835) - MS17010 (EternalBlue)
2019-06-27 14:16:26
81.171.1.6 attackbots
IP: 81.171.1.6
ASN: AS60781 LeaseWeb Netherlands B.V.
Port: World Wide Web HTTP 80
Found in one or more Blacklists
Date: 27/06/2019 6:33:06 AM UTC
2019-06-27 15:16:04
178.19.105.202 spam
Spammer
2019-06-27 15:08:52
54.38.47.55 attack
Jun 27 13:16:20 itv-usvr-01 sshd[17852]: Invalid user jack from 54.38.47.55
Jun 27 13:16:20 itv-usvr-01 sshd[17852]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=54.38.47.55
Jun 27 13:16:20 itv-usvr-01 sshd[17852]: Invalid user jack from 54.38.47.55
Jun 27 13:16:22 itv-usvr-01 sshd[17852]: Failed password for invalid user jack from 54.38.47.55 port 43380 ssh2
Jun 27 13:17:48 itv-usvr-01 sshd[17888]: Invalid user ai from 54.38.47.55
2019-06-27 14:38:02
188.127.230.7 attack
188.127.230.7 - - \[27/Jun/2019:05:50:26 +0200\] "GET /wp-login.php HTTP/1.1" 200 1301 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0"
188.127.230.7 - - \[27/Jun/2019:05:50:26 +0200\] "POST /wp-login.php HTTP/1.1" 200 1704 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0"
188.127.230.7 - - \[27/Jun/2019:05:50:27 +0200\] "GET /wp-login.php HTTP/1.1" 200 1301 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0"
188.127.230.7 - - \[27/Jun/2019:05:50:27 +0200\] "POST /wp-login.php HTTP/1.1" 200 1684 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0"
188.127.230.7 - - \[27/Jun/2019:05:50:28 +0200\] "GET /wp-login.php HTTP/1.1" 200 1301 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0"
188.127.230.7 - - \[27/Jun/2019:05:50:28 +0200\] "POST /wp-login.php HTTP/1.1" 200 1688 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\)
2019-06-27 14:19:15
213.131.52.226 attack
@LucianNitescu Personal Honeypot Network <<<>>> Donate at paypal.me/LNitescu <<<>>> 2019-06-27 03:29:26,279 INFO [amun_request_handler] PortScan Detected on Port: 445 (213.131.52.226)
2019-06-27 14:17:57
144.76.84.44 attack
SSH Brute-Force reported by Fail2Ban
2019-06-27 14:46:13
46.3.96.68 attack
Port scan attempt detected by AWS-CCS, CTS, India
2019-06-27 14:26:01
167.86.120.109 attackspam
27.06.2019 06:10:43 Connection to port 50802 blocked by firewall
2019-06-27 14:35:47
167.99.66.166 attackbotsspam
Jun 27 06:05:17 localhost sshd\[16105\]: Invalid user postgres from 167.99.66.166 port 33388
Jun 27 06:05:17 localhost sshd\[16105\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.99.66.166
...
2019-06-27 14:22:40

Recently Reported IPs

141.70.9.167 6.65.111.151 255.19.94.143 99.191.214.10
23.86.33.28 160.29.148.237 27.206.131.37 161.156.179.199
133.26.97.229 234.121.175.125 20.7.32.50 34.163.190.5
35.5.233.246 96.136.227.150 212.1.23.101 252.130.61.244
49.42.178.82 55.214.21.31 243.145.7.251 230.200.72.69