Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Kuala Lumpur

Region: Kuala Lumpur

Country: Malaysia

Internet Service Provider: unknown

Hostname: unknown

Organization: Universiti Pertahanan Nasional Malaysia

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:

; <<>> DiG 9.10.3-P4-Ubuntu <<>> 103.127.50.100
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 35427
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;103.127.50.100.			IN	A

;; AUTHORITY SECTION:
.			3600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019041400 1800 900 604800 86400

;; Query time: 2 msec
;; SERVER: 67.207.67.3#53(67.207.67.3)
;; WHEN: Sun Apr 14 23:22:15 +08 2019
;; MSG SIZE  rcvd: 118

Host info
Host 100.50.127.103.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		67.207.67.3
Address:	67.207.67.3#53

** server can't find 100.50.127.103.in-addr.arpa: NXDOMAIN

Related IP info:
Related comments:
IP Type Details Datetime
110.49.71.240 attack
Fail2Ban - SSH Bruteforce Attempt
2019-09-29 20:13:41
106.52.57.120 attackspambots
Sep 27 09:03:41 h2040555 sshd[29251]: Invalid user XXX from 106.52.57.120
Sep 27 09:03:41 h2040555 sshd[29251]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.52.57.120 
Sep 27 09:03:43 h2040555 sshd[29251]: Failed password for invalid user XXX from 106.52.57.120 port 44860 ssh2
Sep 27 09:03:44 h2040555 sshd[29251]: Received disconnect from 106.52.57.120: 11: Bye Bye [preauth]
Sep 27 09:22:50 h2040555 sshd[29480]: Invalid user admin from 106.52.57.120
Sep 27 09:22:50 h2040555 sshd[29480]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.52.57.120 
Sep 27 09:22:52 h2040555 sshd[29480]: Failed password for invalid user admin from 106.52.57.120 port 48008 ssh2
Sep 27 09:22:53 h2040555 sshd[29480]: Received disconnect from 106.52.57.120: 11: Bye Bye [preauth]
Sep 27 09:30:40 h2040555 sshd[29626]: Invalid user appuser from 106.52.57.120
Sep 27 09:30:40 h2040555 sshd[29626]: pam_unix(sshd:........
-------------------------------
2019-09-29 19:54:08
179.43.134.156 attack
09/29/2019-05:45:36.408092 179.43.134.156 Protocol: 6 ET TOR Known Tor Exit Node Traffic group 25
2019-09-29 20:01:57
172.105.11.111 attack
UTC: 2019-09-28 port: 21/tcp
2019-09-29 19:55:46
139.199.166.104 attackbots
Invalid user bandit from 139.199.166.104 port 60458
2019-09-29 19:49:23
211.152.47.90 attackspam
Sep 29 07:21:45 ny01 sshd[4292]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=211.152.47.90
Sep 29 07:21:47 ny01 sshd[4292]: Failed password for invalid user admin from 211.152.47.90 port 37918 ssh2
Sep 29 07:27:21 ny01 sshd[5529]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=211.152.47.90
2019-09-29 19:42:34
152.136.95.118 attack
Automatic report - Banned IP Access
2019-09-29 19:48:39
190.148.52.60 attack
Attempt to attack host OS, exploiting network vulnerabilities, on 29-09-2019 04:45:21.
2019-09-29 20:12:31
223.243.29.102 attackbots
Sep 29 14:49:44 pkdns2 sshd\[39017\]: Invalid user atom from 223.243.29.102Sep 29 14:49:46 pkdns2 sshd\[39017\]: Failed password for invalid user atom from 223.243.29.102 port 57476 ssh2Sep 29 14:53:24 pkdns2 sshd\[39202\]: Invalid user mauricio from 223.243.29.102Sep 29 14:53:26 pkdns2 sshd\[39202\]: Failed password for invalid user mauricio from 223.243.29.102 port 58390 ssh2Sep 29 14:57:11 pkdns2 sshd\[39394\]: Invalid user nr from 223.243.29.102Sep 29 14:57:13 pkdns2 sshd\[39394\]: Failed password for invalid user nr from 223.243.29.102 port 59300 ssh2
...
2019-09-29 20:05:41
222.186.175.217 attackspam
frenzy
2019-09-29 20:14:40
124.158.126.229 attack
Scanning random ports - tries to find possible vulnerable services
2019-09-29 19:57:50
84.101.59.24 attackspambots
Lines containing failures of 84.101.59.24
Sep 27 06:46:53 shared03 sshd[27008]: Invalid user pi from 84.101.59.24 port 42896
Sep 27 06:46:53 shared03 sshd[27009]: Invalid user pi from 84.101.59.24 port 42902
Sep 27 06:46:53 shared03 sshd[27008]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=84.101.59.24
Sep 27 06:46:53 shared03 sshd[27009]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=84.101.59.24


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=84.101.59.24
2019-09-29 19:47:48
171.236.151.82 attackbotsspam
Chat Spam
2019-09-29 19:38:19
71.42.189.140 attackspambots
22/tcp 22/tcp
[2019-09-20/29]2pkt
2019-09-29 20:00:50
186.67.203.22 attack
port scan and connect, tcp 22 (ssh)
2019-09-29 19:44:20

Recently Reported IPs

113.20.86.115 41.74.112.9 111.125.67.180 205.185.49.130
46.176.48.69 190.129.163.78 129.204.20.210 179.55.107.65
163.172.218.12 190.85.234.215 119.27.170.189 189.50.105.104
116.107.190.158 83.47.235.220 191.55.12.147 2.238.192.200
190.244.171.35 5.39.121.21 202.189.254.250 36.79.2.216