Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: China

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
IP Type Details Datetime
103.139.212.208 attackbotsspam
[H1.VM10] Blocked by UFW
2020-10-01 03:04:53
103.139.212.208 attackspambots
[H1.VM10] Blocked by UFW
2020-09-30 19:18:22
103.139.212.205 attackbots
Found on   Alienvault    / proto=6  .  srcport=4051  .  dstport=8443  .     (3339)
2020-09-25 07:10:18
103.139.212.213 attackspam
443
2020-09-02 05:08:44
103.139.219.20 attackbotsspam
Sep  1 14:21:28 inter-technics sshd[19038]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.139.219.20  user=ts3
Sep  1 14:21:29 inter-technics sshd[19038]: Failed password for ts3 from 103.139.219.20 port 33042 ssh2
Sep  1 14:29:33 inter-technics sshd[19391]: Invalid user nexus from 103.139.219.20 port 40660
Sep  1 14:29:33 inter-technics sshd[19391]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.139.219.20
Sep  1 14:29:33 inter-technics sshd[19391]: Invalid user nexus from 103.139.219.20 port 40660
Sep  1 14:29:35 inter-technics sshd[19391]: Failed password for invalid user nexus from 103.139.219.20 port 40660 ssh2
...
2020-09-02 01:17:21
103.139.212.212 attackspambots
SCAN: Host Sweep CloudCIX Reconnaissance Scan Detected, PTR: PTR record not found
2020-09-01 02:36:38
103.139.212.8 attack
Attempted connection to port 1433.
2020-08-27 17:28:54
103.139.212.213 attackspam
Excessive Port-Scanning
2020-08-23 12:05:32
103.139.219.20 attack
$f2bV_matches
2020-08-19 16:42:30
103.139.208.128 attackbotsspam
Port Scan
...
2020-08-18 19:08:36
103.139.219.20 attackbotsspam
Aug 17 03:58:46 IngegnereFirenze sshd[9061]: Failed password for invalid user administrator from 103.139.219.20 port 40654 ssh2
...
2020-08-17 14:19:18
103.139.219.20 attackbotsspam
Bruteforce detected by fail2ban
2020-08-15 07:26:01
103.139.219.20 attack
Aug  7 00:56:38 jane sshd[30273]: Failed password for root from 103.139.219.20 port 44166 ssh2
...
2020-08-07 07:36:11
103.139.219.20 attack
Aug  4 20:30:57 haigwepa sshd[326]: Failed password for root from 103.139.219.20 port 37648 ssh2
...
2020-08-05 03:55:00
103.139.219.20 attack
SSH Brute Force
2020-08-01 15:39:15
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 103.139.2.44
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 50652
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;103.139.2.44.			IN	A

;; AUTHORITY SECTION:
.			505	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022022601 1800 900 604800 86400

;; Query time: 16 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Feb 27 10:37:29 CST 2022
;; MSG SIZE  rcvd: 105
Host info
Host 44.2.139.103.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 44.2.139.103.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
95.179.20.57 attack
Automatic report - Port Scan Attack
2019-10-14 19:53:36
186.213.129.159 attack
Attempt to attack host OS, exploiting network vulnerabilities, on 14-10-2019 04:45:18.
2019-10-14 19:40:41
36.230.51.117 attackspam
Honeypot attack, port: 23, PTR: 36-230-51-117.dynamic-ip.hinet.net.
2019-10-14 19:47:03
123.31.30.199 attackbots
ThinkPHP Remote Code Execution Vulnerability
2019-10-14 19:47:22
62.210.149.30 attack
\[2019-10-14 07:23:42\] SECURITY\[1898\] res_security_log.c: SecurityEvent="FailedACL",EventTV="2019-10-14T07:23:42.692-0400",Severity="Error",Service="SIP",EventVersion="1",AccountID="90015183806824",SessionID="0x7fc3ac5226d8",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/62.210.149.30/52044",ACLName="no_extension_match"
\[2019-10-14 07:23:55\] SECURITY\[1898\] res_security_log.c: SecurityEvent="FailedACL",EventTV="2019-10-14T07:23:55.517-0400",Severity="Error",Service="SIP",EventVersion="1",AccountID="0015183806824",SessionID="0x7fc3ac2ed548",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/62.210.149.30/64749",ACLName="no_extension_match"
\[2019-10-14 07:24:09\] SECURITY\[1898\] res_security_log.c: SecurityEvent="FailedACL",EventTV="2019-10-14T07:24:09.499-0400",Severity="Error",Service="SIP",EventVersion="1",AccountID="00015183806824",SessionID="0x7fc3ac00c388",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/62.210.149.30/61310",ACLName="no_extensi
2019-10-14 19:38:33
222.186.169.192 attackspambots
Oct 14 13:57:48 MK-Soft-Root2 sshd[3381]: Failed password for root from 222.186.169.192 port 9668 ssh2
Oct 14 13:57:54 MK-Soft-Root2 sshd[3381]: Failed password for root from 222.186.169.192 port 9668 ssh2
...
2019-10-14 19:59:22
221.140.151.235 attack
$f2bV_matches
2019-10-14 19:35:53
193.32.163.182 attackbots
Automatic report - Port Scan
2019-10-14 19:57:06
151.80.41.124 attack
Oct 14 13:56:15 vps647732 sshd[14752]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=151.80.41.124
Oct 14 13:56:17 vps647732 sshd[14752]: Failed password for invalid user Passwort!2 from 151.80.41.124 port 55774 ssh2
...
2019-10-14 20:05:55
142.44.160.173 attackbotsspam
Oct 14 07:05:48 minden010 sshd[11208]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.44.160.173
Oct 14 07:05:50 minden010 sshd[11208]: Failed password for invalid user Santos123 from 142.44.160.173 port 53238 ssh2
Oct 14 07:10:04 minden010 sshd[16033]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.44.160.173
...
2019-10-14 19:52:22
84.254.28.47 attack
Oct 13 23:57:01 lvps87-230-18-106 sshd[16147]: reveeclipse mapping checking getaddrinfo for ipa47.28.tellas.gr [84.254.28.47] failed - POSSIBLE BREAK-IN ATTEMPT!
Oct 13 23:57:01 lvps87-230-18-106 sshd[16147]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=84.254.28.47  user=r.r
Oct 13 23:57:03 lvps87-230-18-106 sshd[16147]: Failed password for r.r from 84.254.28.47 port 51581 ssh2
Oct 13 23:57:03 lvps87-230-18-106 sshd[16147]: Received disconnect from 84.254.28.47: 11: Bye Bye [preauth]
Oct 14 00:07:05 lvps87-230-18-106 sshd[16248]: reveeclipse mapping checking getaddrinfo for ipa47.28.tellas.gr [84.254.28.47] failed - POSSIBLE BREAK-IN ATTEMPT!
Oct 14 00:07:05 lvps87-230-18-106 sshd[16248]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=84.254.28.47  user=r.r
Oct 14 00:07:07 lvps87-230-18-106 sshd[16248]: Failed password for r.r from 84.254.28.47 port 56090 ssh2
Oct 14 00:07:07 lvps87-230........
-------------------------------
2019-10-14 19:30:41
58.215.198.2 attackbotsspam
Automatic report - Banned IP Access
2019-10-14 19:25:50
207.154.206.212 attackbots
2019-10-14T11:56:22.787807abusebot-8.cloudsearch.cf sshd\[22332\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=207.154.206.212  user=root
2019-10-14 20:01:51
142.93.215.102 attack
2019-10-14T11:56:29.656839abusebot-5.cloudsearch.cf sshd\[21912\]: Invalid user webmaster from 142.93.215.102 port 33878
2019-10-14 19:57:27
74.63.255.150 attack
Honeypot attack, port: 445, PTR: 150-255-63-74.static.reverse.lstn.net.
2019-10-14 19:51:05

Recently Reported IPs

103.139.2.217 103.140.253.187 103.142.24.49 103.143.0.35
103.141.131.71 103.143.182.143 103.144.14.79 103.142.108.213
103.143.190.124 103.144.169.135 103.143.209.126 103.144.14.147
103.144.175.54 103.144.170.225 103.142.198.210 103.144.178.64
103.144.15.122 103.144.176.243 103.153.58.77 103.153.36.169