Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Indonesia

Internet Service Provider: PT. Internetwork Komunikasi Indonesia

Hostname: unknown

Organization: unknown

Usage Type: Commercial

Comments:
Type Details Datetime
attackspam
Unauthorized connection attempt from IP address 103.138.68.74 on Port 445(SMB)
2020-09-04 00:39:29
attackbots
Unauthorized connection attempt from IP address 103.138.68.74 on Port 445(SMB)
2020-09-03 16:05:18
attackspambots
Unauthorized connection attempt from IP address 103.138.68.74 on Port 445(SMB)
2020-09-03 08:14:15
attackspambots
Unauthorized connection attempt from IP address 103.138.68.74 on Port 445(SMB)
2020-08-01 14:20:17
attackbotsspam
Unauthorized connection attempt from IP address 103.138.68.74 on Port 445(SMB)
2020-04-01 01:01:44
attack
Attempt to attack host OS, exploiting network vulnerabilities, on 11-10-2019 20:00:21.
2019-10-12 09:55:11
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 103.138.68.74
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 6269
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;103.138.68.74.			IN	A

;; AUTHORITY SECTION:
.			574	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019101101 1800 900 604800 86400

;; Query time: 112 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Oct 12 09:55:07 CST 2019
;; MSG SIZE  rcvd: 117
Host info
74.68.138.103.in-addr.arpa domain name pointer 74.68.138.103.internetwork.net.id.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
74.68.138.103.in-addr.arpa	name = 74.68.138.103.internetwork.net.id.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
68.183.160.63 attackbots
2019-11-22T14:06:36.283776shield sshd\[702\]: Invalid user sumit from 68.183.160.63 port 41128
2019-11-22T14:06:36.290677shield sshd\[702\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=68.183.160.63
2019-11-22T14:06:38.399806shield sshd\[702\]: Failed password for invalid user sumit from 68.183.160.63 port 41128 ssh2
2019-11-22T14:09:53.403350shield sshd\[1647\]: Invalid user sumit from 68.183.160.63 port 57218
2019-11-22T14:09:53.407799shield sshd\[1647\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=68.183.160.63
2019-11-22 22:23:56
112.186.77.118 attack
Nov 22 12:43:28 andromeda sshd\[34567\]: Invalid user db from 112.186.77.118 port 49776
Nov 22 12:43:28 andromeda sshd\[34567\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.186.77.118
Nov 22 12:43:30 andromeda sshd\[34567\]: Failed password for invalid user db from 112.186.77.118 port 49776 ssh2
2019-11-22 21:47:25
102.70.10.6 attackbots
Brute force attempt
2019-11-22 22:05:26
212.21.66.6 attack
Automatic report - Banned IP Access
2019-11-22 22:01:06
125.142.173.157 attackbotsspam
Nov 22 07:18:26 ns3367391 proftpd[5767]: 127.0.0.1 (125.142.173.157[125.142.173.157]) - USER anonymous: no such user found from 125.142.173.157 [125.142.173.157] to 37.187.78.186:21
Nov 22 07:18:28 ns3367391 proftpd[5770]: 127.0.0.1 (125.142.173.157[125.142.173.157]) - USER yourdailypornvideos: no such user found from 125.142.173.157 [125.142.173.157] to 37.187.78.186:21
...
2019-11-22 21:59:48
192.99.47.10 attackspam
Automatic report - Banned IP Access
2019-11-22 21:56:04
129.211.117.101 attack
Invalid user telcel1 from 129.211.117.101 port 55455
2019-11-22 21:46:30
103.139.45.88 attackbotsspam
2019-11-22T07:18:48.981346[munged] sshd[8010]: error: Received disconnect from 103.139.45.88 port 53191:3: com.jcraft.jsch.JSchException: Auth fail [preauth]
2019-11-22 21:45:42
188.133.160.22 attackspam
spam FO
2019-11-22 22:03:30
118.69.174.108 attackspambots
Automatic report - XMLRPC Attack
2019-11-22 21:54:22
54.37.226.173 attack
Invalid user uucp from 54.37.226.173 port 38362
2019-11-22 22:02:34
152.32.96.209 attack
Attempts to probe for or exploit a Drupal site on url: /wp-login.php. Reported by the module https://www.drupal.org/project/abuseipdb.
2019-11-22 21:54:05
129.211.110.175 attackbots
Nov 22 14:49:19 MK-Soft-VM6 sshd[6194]: Failed password for backup from 129.211.110.175 port 49062 ssh2
...
2019-11-22 21:58:02
178.156.202.252 attackbotsspam
php WP PHPmyadamin ABUSE blocked for 12h
2019-11-22 21:51:38
104.211.216.173 attack
CyberHackers.eu > SSH Bruteforce attempt!
2019-11-22 22:08:59

Recently Reported IPs

182.161.44.192 82.178.3.108 178.162.194.22 52.27.255.247
49.51.155.205 92.184.100.149 172.105.123.228 43.110.14.191
106.13.179.170 101.53.137.128 34.76.63.183 122.117.236.236
223.73.116.131 172.202.6.178 27.76.144.145 208.83.39.76
126.60.196.229 167.97.16.172 14.166.99.226 31.40.140.204