Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Pailles

Region: Moka

Country: Mauritius

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
% This is the AfriNIC Whois server.
% The AFRINIC whois database is subject to  the following terms of Use. See https://afrinic.net/whois/terms

% Note: this output has been filtered.
%       To receive output for a database update, use the "-B" flag.

% Information related to '102.0.0.0 - 102.255.255.255'

% No abuse contact registered for 102.0.0.0 - 102.255.255.255

inetnum:        102.0.0.0 - 102.255.255.255
netname:        AFRINIC
descr:
descr:          AfriNIC - www.afrinic.net
descr:          Allocation for Africa - This block is in use
descr:          by AfriNIC for allocating/assigning to networks
descr:          in the AfriNIC service region.
descr:          More information - whois.afrinic.net.
descr:          Abuse - please querry the whois db for the
descr:          contacts of the assigned/allocated prefix.
descr:
country:        MU
org:            ORG-AFNC1-AFRINIC
admin-c:        TEAM-AFRINIC
tech-c:         TEAM-AFRINIC
status:         ALLOCATED UNSPECIFIED
mnt-by:         AFRINIC-DB-MNT
mnt-lower:      AFRINIC-HM-MNT
mnt-domains:    AFRINIC-IT-MNT
source:         AFRINIC # Filtered
parent:         0.0.0.0 - 255.255.255.255

organisation:   ORG-AFNC1-AFRINIC
org-name:       African Network Information Center - (AfriNIC) Ltd
org-type:       RIR
country:        MU
address:        11th Floor, Standard Chartered Tower
address:        19, Cybercity
address:        Ebène
phone:          tel:+230-466-6758
phone:          tel:+230-403-5100
admin-c:        CA15-AFRINIC
tech-c:         IT7-AFRINIC
mnt-ref:        AFRINIC-HM-MNT
mnt-ref:        AFRINIC-IT-MNT
mnt-ref:        AFRINIC-DB-MNT
mnt-by:         AFRINIC-HM-MNT
remarks:        =======================================
remarks:        For more information on AFRINIC assigned blocks,
remarks:        querry whois.afrinic.net port 43, or the web based
remarks:        query at http://whois.afrinic.net or www.afrinic.net
remarks:        website: www.afrinic.net
remarks:        Other Contacts:
remarks:        ===============
remarks:        hostmaster@afrinic.net  - for IP resources
remarks:        new-member@afrinic.net  - for new members and other
remarks:        inquiries.
source:         AFRINIC # Filtered

role:           AfriNIC TEAM
address:        Raffles Tower - 11th Floor
address:        Cybercity
address:        Mauritius
phone:          tel:+230-403-5100
fax-no:         tel:+230-466-6758
admin-c:        CA15-AFRINIC
tech-c:         CA15-AFRINIC
nic-hdl:        TEAM-AFRINIC
mnt-by:         AFRINIC-DB-MNT
source:         AFRINIC # Filtered
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 102.202.138.105
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 39908
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;102.202.138.105.		IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2026032201 1800 900 604800 86400

;; Query time: 7 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Mar 23 08:15:10 CST 2026
;; MSG SIZE  rcvd: 108
Host info
Host 105.138.202.102.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 105.138.202.102.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
219.128.75.34 attackspam
(CN/China/-) SMTP Bruteforcing attempts
2020-06-19 18:39:15
217.197.40.50 attackspambots
(CZ/Czechia/-) SMTP Bruteforcing attempts
2020-06-19 18:44:58
34.73.237.110 attackspam
xmlrpc attack
2020-06-19 18:50:44
172.67.74.82 attack
SSH login attempts.
2020-06-19 18:48:03
111.67.195.229 attack
SSH login attempts.
2020-06-19 18:16:27
104.47.38.36 attackbots
SSH login attempts.
2020-06-19 18:35:20
27.54.173.19 attackspambots
(IN/India/-) SMTP Bruteforcing attempts
2020-06-19 18:19:25
173.194.221.108 attackspam
SSH login attempts.
2020-06-19 18:46:54
5.255.255.80 attackbots
SSH login attempts.
2020-06-19 18:23:13
122.118.194.148 attackbots
SmallBizIT.US 1 packets to tcp(23)
2020-06-19 18:40:51
123.207.92.183 attackspam
sshd: Failed password for invalid user .... from 123.207.92.183 port 44376 ssh2 (7 attempts)
2020-06-19 18:51:37
195.4.92.218 attackbots
SSH login attempts.
2020-06-19 18:54:40
66.96.140.134 attack
SSH login attempts.
2020-06-19 18:38:50
103.83.157.86 attack
Jun 18 04:30:26 Server1 sshd[7606]: Invalid user pub from 103.83.157.86 port 46372
Jun 18 04:30:26 Server1 sshd[7606]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.83.157.86
Jun 18 04:30:29 Server1 sshd[7606]: Failed password for invalid user pub from 103.83.157.86 port 46372 ssh2
Jun 18 04:30:29 Server1 sshd[7606]: Received disconnect from 103.83.157.86 port 46372:11: Bye Bye [preauth]
Jun 18 04:30:29 Server1 sshd[7606]: Disconnected from invalid user pub 103.83.157.86 port 46372 [preauth]
Jun 18 04:34:43 Server1 sshd[7656]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.83.157.86  user=r.r


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=103.83.157.86
2020-06-19 18:21:26
24.220.134.245 attack
SSH login attempts.
2020-06-19 18:56:16

Recently Reported IPs

142.127.166.5 109.143.125.17 218.234.139.133 121.191.162.149
19.168.218.252 60.3.36.100 59.26.129.97 217.68.75.232
160.210.131.166 113.160.196.163 134.214.57.86 47.242.58.79
103.115.63.38 52.96.3.178 185.96.194.104 15.115.69.9
139.20.145.184 125.138.52.163 103.144.173.41 211.239.108.27