Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: China

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
IP Type Details Datetime
103.139.212.208 attackbotsspam
[H1.VM10] Blocked by UFW
2020-10-01 03:04:53
103.139.212.208 attackspambots
[H1.VM10] Blocked by UFW
2020-09-30 19:18:22
103.139.212.205 attackbots
Found on   Alienvault    / proto=6  .  srcport=4051  .  dstport=8443  .     (3339)
2020-09-25 07:10:18
103.139.212.213 attackspam
443
2020-09-02 05:08:44
103.139.219.20 attackbotsspam
Sep  1 14:21:28 inter-technics sshd[19038]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.139.219.20  user=ts3
Sep  1 14:21:29 inter-technics sshd[19038]: Failed password for ts3 from 103.139.219.20 port 33042 ssh2
Sep  1 14:29:33 inter-technics sshd[19391]: Invalid user nexus from 103.139.219.20 port 40660
Sep  1 14:29:33 inter-technics sshd[19391]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.139.219.20
Sep  1 14:29:33 inter-technics sshd[19391]: Invalid user nexus from 103.139.219.20 port 40660
Sep  1 14:29:35 inter-technics sshd[19391]: Failed password for invalid user nexus from 103.139.219.20 port 40660 ssh2
...
2020-09-02 01:17:21
103.139.212.212 attackspambots
SCAN: Host Sweep CloudCIX Reconnaissance Scan Detected, PTR: PTR record not found
2020-09-01 02:36:38
103.139.212.8 attack
Attempted connection to port 1433.
2020-08-27 17:28:54
103.139.212.213 attackspam
Excessive Port-Scanning
2020-08-23 12:05:32
103.139.219.20 attack
$f2bV_matches
2020-08-19 16:42:30
103.139.208.128 attackbotsspam
Port Scan
...
2020-08-18 19:08:36
103.139.219.20 attackbotsspam
Aug 17 03:58:46 IngegnereFirenze sshd[9061]: Failed password for invalid user administrator from 103.139.219.20 port 40654 ssh2
...
2020-08-17 14:19:18
103.139.219.20 attackbotsspam
Bruteforce detected by fail2ban
2020-08-15 07:26:01
103.139.219.20 attack
Aug  7 00:56:38 jane sshd[30273]: Failed password for root from 103.139.219.20 port 44166 ssh2
...
2020-08-07 07:36:11
103.139.219.20 attack
Aug  4 20:30:57 haigwepa sshd[326]: Failed password for root from 103.139.219.20 port 37648 ssh2
...
2020-08-05 03:55:00
103.139.219.20 attack
SSH Brute Force
2020-08-01 15:39:15
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 103.139.2.122
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 31529
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;103.139.2.122.			IN	A

;; AUTHORITY SECTION:
.			599	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022052401 1800 900 604800 86400

;; Query time: 17 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed May 25 03:17:48 CST 2022
;; MSG SIZE  rcvd: 106
Host info
Host 122.2.139.103.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 122.2.139.103.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
157.48.92.140 attack
Unauthorized connection attempt from IP address 157.48.92.140 on Port 445(SMB)
2019-11-19 06:44:52
168.121.4.210 attackspam
Honeypot attack, port: 23, PTR: 168-121-4-210.granditelecom.com.br.
2019-11-19 07:10:34
43.239.122.4 attack
43.239.122.4 Hit the server 1600 times in a few seconds
then switched to other IP's same network for about 90,000 hits
.12
.13
.14
.15
.6
.5

all on the same page.
2019-11-19 06:39:11
175.6.32.128 attackspam
Nov 18 22:41:38 marvibiene sshd[5616]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=175.6.32.128  user=mysql
Nov 18 22:41:40 marvibiene sshd[5616]: Failed password for mysql from 175.6.32.128 port 37769 ssh2
Nov 18 22:54:26 marvibiene sshd[5741]: Invalid user vana from 175.6.32.128 port 56754
...
2019-11-19 07:08:41
42.239.160.154 attackspambots
port 23 attempt blocked
2019-11-19 07:11:39
177.75.137.75 attackbotsspam
Automatic report - Port Scan Attack
2019-11-19 07:02:58
175.140.61.100 attackspam
Automatic report - Port Scan Attack
2019-11-19 07:00:53
39.107.64.158 attackspambots
web exploits
...
2019-11-19 07:08:14
88.214.11.29 attackbots
Unauthorized connection attempt from IP address 88.214.11.29 on Port 445(SMB)
2019-11-19 06:42:47
186.112.85.98 attackbotsspam
Unauthorized connection attempt from IP address 186.112.85.98 on Port 445(SMB)
2019-11-19 06:49:28
180.163.220.100 attackbots
Automatic report - Banned IP Access
2019-11-19 07:14:44
186.208.181.59 attack
Unauthorized connection attempt from IP address 186.208.181.59 on Port 445(SMB)
2019-11-19 06:35:46
185.176.27.254 attackbots
11/18/2019-18:05:30.159786 185.176.27.254 Protocol: 6 ET SCAN NMAP -sS window 1024
2019-11-19 07:13:06
210.202.8.119 attackbots
www.lust-auf-land.com 210.202.8.119 \[18/Nov/2019:22:04:47 +0100\] "POST /wp-login.php HTTP/1.1" 200 6438 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0"
www.lust-auf-land.com 210.202.8.119 \[18/Nov/2019:22:04:50 +0100\] "POST /wp-login.php HTTP/1.1" 200 6399 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0"
www.lust-auf-land.com 210.202.8.119 \[18/Nov/2019:22:04:51 +0100\] "POST /xmlrpc.php HTTP/1.1" 200 4097 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0"
2019-11-19 06:47:22
31.163.174.16 attackbots
Honeypot attack, port: 23, PTR: ws16.zone31-163-174.zaural.ru.
2019-11-19 07:12:45

Recently Reported IPs

103.138.88.65 103.139.45.231 103.139.75.35 103.14.15.241
103.14.33.17 103.14.33.68 103.14.35.115 103.140.130.245
103.141.142.153 103.144.178.39 103.144.178.42 103.144.178.43
103.144.178.46 103.144.178.48 103.144.178.52 103.144.178.53
103.144.178.54 103.144.178.60 103.144.178.7 103.144.178.72