Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Mongolia

Internet Service Provider: MT Networks LLC

Hostname: unknown

Organization: unknown

Usage Type: Commercial

Comments:
Type Details Datetime
attack
2020-06-06T16:08:34.415721morrigan.ad5gb.com sshd[24490]: Disconnected from authenticating user root 103.139.146.34 port 37086 [preauth]
2020-06-06T16:12:28.110673morrigan.ad5gb.com sshd[2084]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.139.146.34  user=root
2020-06-06T16:12:29.801383morrigan.ad5gb.com sshd[2084]: Failed password for root from 103.139.146.34 port 40846 ssh2
2020-06-07 05:24:08
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 103.139.146.34
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 27091
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;103.139.146.34.			IN	A

;; AUTHORITY SECTION:
.			578	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2020060601 1800 900 604800 86400

;; Query time: 103 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Jun 07 05:24:05 CST 2020
;; MSG SIZE  rcvd: 118
Host info
Host 34.146.139.103.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 34.146.139.103.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
113.106.150.102 attack
Unauthorized connection attempt detected from IP address 113.106.150.102 to port 6379 [J]
2020-01-15 23:26:00
42.117.157.132 attackbots
Unauthorized connection attempt detected from IP address 42.117.157.132 to port 23 [J]
2020-01-15 23:01:33
116.62.247.38 attack
Unauthorized connection attempt detected from IP address 116.62.247.38 to port 23 [J]
2020-01-15 22:51:25
159.89.169.109 attack
Unauthorized connection attempt detected from IP address 159.89.169.109 to port 2220 [J]
2020-01-15 23:14:08
175.6.40.66 attackspam
Unauthorized connection attempt detected from IP address 175.6.40.66 to port 8080 [T]
2020-01-15 23:12:55
1.69.76.171 attackspam
Unauthorized connection attempt detected from IP address 1.69.76.171 to port 2323 [T]
2020-01-15 23:04:02
42.112.165.72 attackbots
Unauthorized connection attempt detected from IP address 42.112.165.72 to port 23 [J]
2020-01-15 23:02:05
51.158.25.170 attack
Firewall block UDP port 5082
2020-01-15 23:29:28
211.254.177.231 attackspam
unauthorized connection attempt
2020-01-15 23:08:09
94.73.199.57 attackbots
Unauthorized connection attempt detected from IP address 94.73.199.57 to port 9090 [T]
2020-01-15 22:54:47
42.236.82.246 attackspam
Unauthorized connection attempt detected from IP address 42.236.82.246 to port 1433 [J]
2020-01-15 22:59:55
113.141.64.224 attackbots
Unauthorized connection attempt detected from IP address 113.141.64.224 to port 1433 [J]
2020-01-15 22:51:58
1.69.235.168 attack
Unauthorized connection attempt detected from IP address 1.69.235.168 to port 23 [J]
2020-01-15 23:03:37
116.26.173.210 attackspam
Automatic report - Port Scan Attack
2020-01-15 23:24:29
111.75.222.141 attackspam
Unauthorized connection attempt detected from IP address 111.75.222.141 to port 1433 [T]
2020-01-15 23:27:51

Recently Reported IPs

103.40.19.172 103.20.188.166 31.31.198.159 213.106.190.223
140.182.251.218 3.21.158.132 186.46.202.131 171.226.133.66
31.173.24.215 185.20.227.24 183.182.115.147 157.194.109.211
199.89.74.181 36.68.155.28 18.234.166.8 180.249.119.51
178.62.252.220 103.219.205.249 201.234.237.227 178.172.235.94