Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: China

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
IP Type Details Datetime
103.139.212.208 attackbotsspam
[H1.VM10] Blocked by UFW
2020-10-01 03:04:53
103.139.212.208 attackspambots
[H1.VM10] Blocked by UFW
2020-09-30 19:18:22
103.139.212.205 attackbots
Found on   Alienvault    / proto=6  .  srcport=4051  .  dstport=8443  .     (3339)
2020-09-25 07:10:18
103.139.212.213 attackspam
443
2020-09-02 05:08:44
103.139.219.20 attackbotsspam
Sep  1 14:21:28 inter-technics sshd[19038]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.139.219.20  user=ts3
Sep  1 14:21:29 inter-technics sshd[19038]: Failed password for ts3 from 103.139.219.20 port 33042 ssh2
Sep  1 14:29:33 inter-technics sshd[19391]: Invalid user nexus from 103.139.219.20 port 40660
Sep  1 14:29:33 inter-technics sshd[19391]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.139.219.20
Sep  1 14:29:33 inter-technics sshd[19391]: Invalid user nexus from 103.139.219.20 port 40660
Sep  1 14:29:35 inter-technics sshd[19391]: Failed password for invalid user nexus from 103.139.219.20 port 40660 ssh2
...
2020-09-02 01:17:21
103.139.212.212 attackspambots
SCAN: Host Sweep CloudCIX Reconnaissance Scan Detected, PTR: PTR record not found
2020-09-01 02:36:38
103.139.212.8 attack
Attempted connection to port 1433.
2020-08-27 17:28:54
103.139.212.213 attackspam
Excessive Port-Scanning
2020-08-23 12:05:32
103.139.219.20 attack
$f2bV_matches
2020-08-19 16:42:30
103.139.208.128 attackbotsspam
Port Scan
...
2020-08-18 19:08:36
103.139.219.20 attackbotsspam
Aug 17 03:58:46 IngegnereFirenze sshd[9061]: Failed password for invalid user administrator from 103.139.219.20 port 40654 ssh2
...
2020-08-17 14:19:18
103.139.219.20 attackbotsspam
Bruteforce detected by fail2ban
2020-08-15 07:26:01
103.139.219.20 attack
Aug  7 00:56:38 jane sshd[30273]: Failed password for root from 103.139.219.20 port 44166 ssh2
...
2020-08-07 07:36:11
103.139.219.20 attack
Aug  4 20:30:57 haigwepa sshd[326]: Failed password for root from 103.139.219.20 port 37648 ssh2
...
2020-08-05 03:55:00
103.139.219.20 attack
SSH Brute Force
2020-08-01 15:39:15
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 103.139.2.142
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 41018
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;103.139.2.142.			IN	A

;; AUTHORITY SECTION:
.			217	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022041001 1800 900 604800 86400

;; Query time: 67 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Apr 11 06:59:32 CST 2022
;; MSG SIZE  rcvd: 106
Host info
Host 142.2.139.103.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 142.2.139.103.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
103.94.130.4 attack
Sep  8 10:09:45 root sshd[10120]: Failed password for root from 103.94.130.4 port 59833 ssh2
Sep  8 10:26:38 root sshd[10243]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.94.130.4 
Sep  8 10:26:40 root sshd[10243]: Failed password for invalid user test from 103.94.130.4 port 53390 ssh2
...
2019-09-08 18:13:58
103.9.159.59 attack
Sep  8 00:53:51 php1 sshd\[8805\]: Invalid user teamspeakpass from 103.9.159.59
Sep  8 00:53:51 php1 sshd\[8805\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.9.159.59
Sep  8 00:53:52 php1 sshd\[8805\]: Failed password for invalid user teamspeakpass from 103.9.159.59 port 60052 ssh2
Sep  8 00:59:56 php1 sshd\[9827\]: Invalid user sftpuser123 from 103.9.159.59
Sep  8 00:59:56 php1 sshd\[9827\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.9.159.59
2019-09-08 19:09:14
218.92.0.206 attackbots
Sep  8 11:18:19 MK-Soft-Root1 sshd\[4039\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.206  user=root
Sep  8 11:18:22 MK-Soft-Root1 sshd\[4039\]: Failed password for root from 218.92.0.206 port 29348 ssh2
Sep  8 11:18:24 MK-Soft-Root1 sshd\[4039\]: Failed password for root from 218.92.0.206 port 29348 ssh2
...
2019-09-08 18:03:47
179.185.79.83 attack
Sep  7 22:53:04 lcprod sshd\[32569\]: Invalid user ircbot from 179.185.79.83
Sep  7 22:53:04 lcprod sshd\[32569\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=179.185.79.83.static.gvt.net.br
Sep  7 22:53:06 lcprod sshd\[32569\]: Failed password for invalid user ircbot from 179.185.79.83 port 44798 ssh2
Sep  7 22:59:06 lcprod sshd\[768\]: Invalid user git from 179.185.79.83
Sep  7 22:59:06 lcprod sshd\[768\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=179.185.79.83.static.gvt.net.br
2019-09-08 17:51:05
134.209.208.104 attackbotsspam
scan z
2019-09-08 18:00:46
42.115.76.156 attackspam
2323/tcp 23/tcp...
[2019-07-09/09-08]4pkt,2pt.(tcp)
2019-09-08 18:45:36
95.14.156.128 attackspam
Caught in portsentry honeypot
2019-09-08 18:26:50
122.228.19.80 attackspambots
08.09.2019 10:27:04 Connection to port 4070 blocked by firewall
2019-09-08 18:53:37
83.244.54.230 attack
proto=tcp  .  spt=58830  .  dpt=25  .     (listed on     Github Combined on 3 lists )     (818)
2019-09-08 18:08:38
113.125.19.85 attackspambots
Sep  8 12:38:34 eventyay sshd[28118]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=113.125.19.85
Sep  8 12:38:36 eventyay sshd[28118]: Failed password for invalid user dspace from 113.125.19.85 port 48036 ssh2
Sep  8 12:42:25 eventyay sshd[28209]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=113.125.19.85
...
2019-09-08 18:58:57
122.154.46.5 attack
Sep  8 13:13:02 pkdns2 sshd\[33488\]: Invalid user demo@123 from 122.154.46.5Sep  8 13:13:03 pkdns2 sshd\[33488\]: Failed password for invalid user demo@123 from 122.154.46.5 port 41700 ssh2Sep  8 13:17:58 pkdns2 sshd\[33722\]: Invalid user 123456 from 122.154.46.5Sep  8 13:17:59 pkdns2 sshd\[33722\]: Failed password for invalid user 123456 from 122.154.46.5 port 56912 ssh2Sep  8 13:22:54 pkdns2 sshd\[33958\]: Invalid user 1q2w3e4r from 122.154.46.5Sep  8 13:22:56 pkdns2 sshd\[33958\]: Failed password for invalid user 1q2w3e4r from 122.154.46.5 port 43890 ssh2
...
2019-09-08 18:54:02
45.136.109.38 attackbots
09/08/2019-05:38:12.116651 45.136.109.38 Protocol: 6 ET SCAN NMAP -sS window 1024
2019-09-08 18:15:58
177.125.40.182 attackspambots
proto=tcp  .  spt=49187  .  dpt=25  .     (listed on     Github Combined on 3 lists )     (820)
2019-09-08 18:04:18
138.68.94.173 attack
$f2bV_matches_ltvn
2019-09-08 17:48:33
45.125.63.46 attackspam
Mail sent to address hacked/leaked from Last.fm
2019-09-08 19:05:18

Recently Reported IPs

103.139.103.146 103.139.203.3 103.139.233.11 103.139.244.90
103.139.245.108 103.139.3.6 103.139.48.100 103.139.48.102
103.139.48.115 103.139.48.116 103.139.48.128 103.139.48.131
103.139.48.163 103.139.48.17 103.139.48.175 43.191.105.149
103.139.48.177 103.139.48.193 103.139.48.200 103.139.48.46