Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Bantul

Region: Yogyakarta

Country: Indonesia

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 103.105.254.42
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 52575
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;103.105.254.42.			IN	A

;; AUTHORITY SECTION:
.			88	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022040301 1800 900 604800 86400

;; Query time: 125 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Apr 04 12:21:56 CST 2022
;; MSG SIZE  rcvd: 107
Host info
42.254.105.103.in-addr.arpa domain name pointer host42-pool254.bimatek.co.id.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
42.254.105.103.in-addr.arpa	name = host42-pool254.bimatek.co.id.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
121.171.166.170 attackbots
Unauthorized connection attempt detected from IP address 121.171.166.170 to port 2220 [J]
2020-01-08 07:57:38
128.199.199.217 attack
Unauthorized connection attempt detected from IP address 128.199.199.217 to port 2220 [J]
2020-01-08 07:40:40
203.195.243.146 attack
Unauthorized connection attempt detected from IP address 203.195.243.146 to port 2220 [J]
2020-01-08 07:55:12
31.42.254.24 attackbots
Jan  7 22:17:48 icecube postfix/smtpd[21873]: NOQUEUE: reject: RCPT from unknown[31.42.254.24]: 554 5.7.1 Service unavailable; Client host [31.42.254.24] blocked using zen.spamhaus.org; https://www.spamhaus.org/sbl/query/SBLCSS / https://www.spamhaus.org/query/ip/31.42.254.24; from= to= proto=ESMTP helo=
2020-01-08 07:43:50
46.41.137.21 attack
Unauthorized connection attempt detected from IP address 46.41.137.21 to port 2220 [J]
2020-01-08 07:44:57
182.61.105.127 attackspam
Unauthorized connection attempt detected from IP address 182.61.105.127 to port 2220 [J]
2020-01-08 07:52:11
106.13.180.245 attackspam
SASL PLAIN auth failed: ruser=...
2020-01-08 07:42:16
103.240.160.21 attackbotsspam
Registration form abuse
2020-01-08 07:41:38
200.66.39.6 attackspam
Fail2Ban Ban Triggered
2020-01-08 07:51:00
165.22.215.114 attackspambots
$f2bV_matches
2020-01-08 07:44:04
222.186.173.183 attackbots
01/07/2020-18:48:36.977638 222.186.173.183 Protocol: 6 ET SCAN Potential SSH Scan
2020-01-08 07:56:24
77.222.63.206 attack
Unauthorized connection attempt detected from IP address 77.222.63.206 to port 2220 [J]
2020-01-08 07:58:37
27.66.242.99 attackbotsspam
Attempts against SMTP/SSMTP
2020-01-08 08:01:38
181.175.218.66 attackspam
Unauthorized connection attempt detected from IP address 181.175.218.66 to port 1022
2020-01-08 07:52:45
139.99.98.248 attack
Jan  7 22:17:32 MK-Soft-VM5 sshd[12946]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.99.98.248 
Jan  7 22:17:34 MK-Soft-VM5 sshd[12946]: Failed password for invalid user vmail from 139.99.98.248 port 41060 ssh2
...
2020-01-08 07:54:00

Recently Reported IPs

103.105.254.225 103.105.254.60 103.105.254.71 103.105.52.202
103.105.53.128 103.105.53.130 103.105.53.173 103.105.55.138
103.105.55.152 103.105.55.159 103.105.55.160 103.105.55.47
103.105.55.48 103.105.55.49 103.105.55.71 103.106.101.206
103.106.158.215 103.106.177.83 103.106.219.211 103.106.238.145