Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Indonesia

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 103.130.139.186
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 504
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;103.130.139.186.		IN	A

;; AUTHORITY SECTION:
.			323	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022022500 1800 900 604800 86400

;; Query time: 18 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 25 16:32:41 CST 2022
;; MSG SIZE  rcvd: 108
Host info
186.139.130.103.in-addr.arpa domain name pointer ip-139-186.primacom.id.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
186.139.130.103.in-addr.arpa	name = ip-139-186.primacom.id.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
159.65.41.159 attack
invalid user 111 from 159.65.41.159 port 43884 ssh2
2020-10-06 17:01:04
182.61.25.229 attackspambots
SSH login attempts.
2020-10-06 17:23:13
60.248.129.252 attackspam
445/tcp 445/tcp
[2020-08-07/10-05]2pkt
2020-10-06 17:06:55
62.112.11.8 attackspambots
Cowrie Honeypot: 10 unauthorised SSH/Telnet login attempts between 2020-10-06T06:40:10Z and 2020-10-06T08:10:32Z
2020-10-06 16:55:58
121.178.235.245 attack
Automatic report - Banned IP Access
2020-10-06 17:08:57
195.58.38.183 attack
Telnet/23 MH Probe, Scan, BF, Hack -
2020-10-06 16:57:48
189.162.99.17 attackspam
Lines containing failures of 189.162.99.17
Oct  5 23:42:48 penfold sshd[13714]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=189.162.99.17  user=r.r
Oct  5 23:42:49 penfold sshd[13714]: Failed password for r.r from 189.162.99.17 port 57490 ssh2
Oct  5 23:42:50 penfold sshd[13714]: Received disconnect from 189.162.99.17 port 57490:11: Bye Bye [preauth]
Oct  5 23:42:50 penfold sshd[13714]: Disconnected from authenticating user r.r 189.162.99.17 port 57490 [preauth]
Oct  6 00:10:38 penfold sshd[15166]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=189.162.99.17  user=r.r
Oct  6 00:10:40 penfold sshd[15166]: Failed password for r.r from 189.162.99.17 port 38462 ssh2
Oct  6 00:10:41 penfold sshd[15166]: Received disconnect from 189.162.99.17 port 38462:11: Bye Bye [preauth]
Oct  6 00:10:41 penfold sshd[15166]: Disconnected from authenticating user r.r 189.162.99.17 port 38462 [preauth]
Oct  6........
------------------------------
2020-10-06 17:33:05
211.23.114.197 attackspambots
445/tcp 445/tcp
[2020-08-06/10-05]2pkt
2020-10-06 16:58:37
223.231.124.99 attack
1601930345 - 10/05/2020 22:39:05 Host: 223.231.124.99/223.231.124.99 Port: 445 TCP Blocked
2020-10-06 17:38:27
147.139.6.81 attackspambots
20 attempts against mh-ssh on river
2020-10-06 17:02:01
211.100.47.208 attackbots
139/tcp 139/tcp
[2020-08-30/10-05]2pkt
2020-10-06 17:12:44
139.255.86.19 attack
Icarus honeypot on github
2020-10-06 17:36:02
196.52.43.122 attackspam
Found on   CINS badguys     / proto=6  .  srcport=55544  .  dstport=37777  .     (1018)
2020-10-06 17:29:58
104.40.197.65 attackspam
445/tcp 1433/tcp...
[2020-08-17/10-05]7pkt,2pt.(tcp)
2020-10-06 17:16:30
145.239.87.35 attackspambots
SSH login attempts.
2020-10-06 16:55:18

Recently Reported IPs

103.130.138.106 103.130.140.188 103.130.140.214 103.130.143.132
103.130.138.62 103.130.143.191 103.130.143.25 1.2.202.210
103.130.143.34 103.130.143.184 103.130.143.82 103.130.143.41
103.130.143.94 103.130.144.99 103.130.157.134 103.130.156.70
103.130.166.233 103.130.143.92 103.130.157.158 1.2.202.215