Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: None

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
IP Type Details Datetime
103.139.45.122 attack
Sep 29 09:21:08 ns308116 postfix/smtpd[2008]: warning: unknown[103.139.45.122]: SASL LOGIN authentication failed: authentication failure
Sep 29 09:21:08 ns308116 postfix/smtpd[2008]: warning: unknown[103.139.45.122]: SASL LOGIN authentication failed: authentication failure
Sep 29 09:21:10 ns308116 postfix/smtpd[2008]: warning: unknown[103.139.45.122]: SASL LOGIN authentication failed: authentication failure
Sep 29 09:21:10 ns308116 postfix/smtpd[2008]: warning: unknown[103.139.45.122]: SASL LOGIN authentication failed: authentication failure
Sep 29 09:21:11 ns308116 postfix/smtpd[2008]: warning: unknown[103.139.45.122]: SASL LOGIN authentication failed: authentication failure
Sep 29 09:21:11 ns308116 postfix/smtpd[2008]: warning: unknown[103.139.45.122]: SASL LOGIN authentication failed: authentication failure
...
2020-09-29 22:56:18
103.139.45.122 attack
MAIL: User Login Brute Force Attempt
2020-09-29 15:15:19
103.139.45.122 attackbotsspam
Sep 13 15:53:55 localhost postfix/smtpd\[15747\]: warning: unknown\[103.139.45.122\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Sep 13 15:54:05 localhost postfix/smtpd\[15735\]: warning: unknown\[103.139.45.122\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Sep 13 15:54:19 localhost postfix/smtpd\[15747\]: warning: unknown\[103.139.45.122\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Sep 13 15:54:37 localhost postfix/smtpd\[15747\]: warning: unknown\[103.139.45.122\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Sep 13 15:54:46 localhost postfix/smtpd\[15735\]: warning: unknown\[103.139.45.122\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
...
2020-09-14 00:57:14
103.139.45.122 attack
Sep 12 20:11:56 Host-KLAX-C postfix/smtpd[146495]: lost connection after AUTH from unknown[103.139.45.122]
Sep 12 20:11:59 Host-KLAX-C postfix/smtpd[146495]: lost connection after AUTH from unknown[103.139.45.122]
Sep 12 20:12:02 Host-KLAX-C postfix/smtpd[146495]: lost connection after AUTH from unknown[103.139.45.122]
Sep 12 20:12:05 Host-KLAX-C postfix/smtpd[146495]: lost connection after AUTH from unknown[103.139.45.122]
Sep 12 20:12:07 Host-KLAX-C postfix/smtpd[146495]: lost connection after AUTH from unknown[103.139.45.122]
Sep 12 20:12:09 Host-KLAX-C postfix/smtpd[146495]: lost connection after AUTH from unknown[103.139.45.122]
Sep 12 20:12:12 Host-KLAX-C postfix/smtpd[146495]: lost connection after AUTH from unknown[103.139.45.122]
Sep 12 20:12:14 Host-KLAX-C postfix/smtpd[146495]: lost connection after AUTH from unknown[103.139.45.122]
Sep 12 20:12:15 Host-KLAX-C postfix/smtpd[146495]: lost connection after AUTH from unknown[103.139.45.122]
Sep 12 20:12:17 Host-KLAX-C postfix/s
...
2020-09-13 16:47:14
103.139.45.75 attack
MAIL: User Login Brute Force Attempt
2020-09-01 00:54:36
103.139.45.244 attackbotsspam
Aug  1 14:17:47 localhost postfix/smtpd\[595\]: warning: unknown\[103.139.45.244\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Aug  1 14:17:55 localhost postfix/smtpd\[415\]: warning: unknown\[103.139.45.244\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Aug  1 14:18:07 localhost postfix/smtpd\[595\]: warning: unknown\[103.139.45.244\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Aug  1 14:18:24 localhost postfix/smtpd\[595\]: warning: unknown\[103.139.45.244\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Aug  1 14:18:33 localhost postfix/smtpd\[415\]: warning: unknown\[103.139.45.244\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
...
2020-08-02 01:28:50
103.139.45.129 attack
" "
2020-07-01 10:06:34
103.139.45.185 attackspambots
Unauthorized connection attempt detected from IP address 103.139.45.185 to port 3389 [T]
2020-06-09 16:34:46
103.139.45.228 attack
MultiHost/MultiPort Probe, Scan, Hack -
2020-05-25 00:39:18
103.139.45.118 attack
Fail2Ban Ban Triggered
2020-05-21 20:39:50
103.139.45.115 attackbotsspam
Scan detected 2020.05.01 21:11:22
blocked until 2020.05.26 17:42:45
by Honeypot
2020-05-02 19:09:49
103.139.45.115 attack
Spam detected 2020.05.01 21:11:28
blocked until 2020.05.26 17:42:51
by HoneyPot
2020-05-02 03:14:57
103.139.45.115 attack
2020-04-24T21:57:55.872081linuxbox-skyline auth[56146]: pam_unix(dovecot:auth): authentication failure; logname= uid=0 euid=0 tty=dovecot ruser=web3 rhost=103.139.45.115
...
2020-04-25 13:20:54
103.139.45.115 attackbotsspam
Port Scan: Events[2] countPorts[1]: 25 ..
2020-04-19 01:07:55
103.139.45.115 attack
abuse
2020-04-14 16:34:55
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 103.139.45.164
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 32398
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;103.139.45.164.			IN	A

;; AUTHORITY SECTION:
.			402	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022022601 1800 900 604800 86400

;; Query time: 19 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Feb 27 03:02:04 CST 2022
;; MSG SIZE  rcvd: 107
Host info
Host 164.45.139.103.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 164.45.139.103.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
219.73.101.194 attackbotsspam
Jul 10 21:41:55 [host] sshd[12686]: Invalid user vikas from 219.73.101.194
Jul 10 21:41:55 [host] sshd[12686]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=219.73.101.194
Jul 10 21:41:56 [host] sshd[12686]: Failed password for invalid user vikas from 219.73.101.194 port 60092 ssh2
2019-07-11 05:22:54
5.188.115.64 attackbotsspam
Jul 11 01:41:56 areeb-Workstation sshd\[27612\]: Invalid user spike from 5.188.115.64
Jul 11 01:41:56 areeb-Workstation sshd\[27612\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=5.188.115.64
Jul 11 01:41:59 areeb-Workstation sshd\[27612\]: Failed password for invalid user spike from 5.188.115.64 port 35786 ssh2
...
2019-07-11 05:20:33
118.25.7.123 attackspam
Jul 10 21:00:51 uapps sshd[11823]: Failed password for invalid user diamond from 118.25.7.123 port 57806 ssh2
Jul 10 21:00:51 uapps sshd[11823]: Received disconnect from 118.25.7.123: 11: Bye Bye [preauth]


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=118.25.7.123
2019-07-11 05:19:50
185.233.117.156 attackbotsspam
Jul 10 20:48:24 XXXXXX sshd[52046]: Invalid user hadoop from 185.233.117.156 port 40150
2019-07-11 05:47:30
94.191.99.159 attackbotsspam
Jul 10 20:58:49 rpi sshd[12463]: Failed password for root from 94.191.99.159 port 53396 ssh2
2019-07-11 05:11:51
188.105.105.239 attack
SSH Brute Force
2019-07-11 05:33:42
115.79.7.22 attackbotsspam
Unauthorized IMAP connection attempt
2019-07-11 05:46:42
209.217.192.148 attackbots
Jul 10 22:31:03 ubuntu-2gb-nbg1-dc3-1 sshd[4590]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=209.217.192.148
Jul 10 22:31:05 ubuntu-2gb-nbg1-dc3-1 sshd[4590]: Failed password for invalid user we from 209.217.192.148 port 37908 ssh2
...
2019-07-11 05:10:07
186.206.129.160 attackbots
Invalid user norman from 186.206.129.160 port 54523
2019-07-11 05:45:20
71.237.171.150 attackspambots
$f2bV_matches
2019-07-11 05:07:50
123.206.174.21 attackspambots
$f2bV_matches
2019-07-11 05:44:34
158.140.135.231 attackspambots
Jul 10 21:05:00 linuxrulz sshd[30591]: Invalid user test from 158.140.135.231 port 18828
Jul 10 21:05:00 linuxrulz sshd[30591]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=158.140.135.231
Jul 10 21:05:02 linuxrulz sshd[30591]: Failed password for invalid user test from 158.140.135.231 port 18828 ssh2
Jul 10 21:05:02 linuxrulz sshd[30591]: Received disconnect from 158.140.135.231 port 18828:11: Bye Bye [preauth]
Jul 10 21:05:02 linuxrulz sshd[30591]: Disconnected from 158.140.135.231 port 18828 [preauth]


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=158.140.135.231
2019-07-11 05:25:33
190.151.105.182 attack
Jul 10 22:30:20 lnxded64 sshd[8213]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=190.151.105.182
Jul 10 22:30:20 lnxded64 sshd[8213]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=190.151.105.182
2019-07-11 05:18:26
173.82.245.187 attackspambots
Jul 10 22:29:18 mail sshd[4238]: Invalid user pasquale from 173.82.245.187
Jul 10 22:29:18 mail sshd[4238]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=173.82.245.187
Jul 10 22:29:18 mail sshd[4238]: Invalid user pasquale from 173.82.245.187
Jul 10 22:29:20 mail sshd[4238]: Failed password for invalid user pasquale from 173.82.245.187 port 33738 ssh2
Jul 10 22:35:25 mail sshd[5101]: Invalid user weblogic from 173.82.245.187
...
2019-07-11 05:34:55
141.85.13.6 attackbots
Jul 10 22:53:53 ns341937 sshd[23381]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=141.85.13.6
Jul 10 22:53:55 ns341937 sshd[23381]: Failed password for invalid user deploy from 141.85.13.6 port 49630 ssh2
Jul 10 22:57:16 ns341937 sshd[24270]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=141.85.13.6
...
2019-07-11 05:24:17

Recently Reported IPs

103.139.44.166 103.139.46.30 103.139.47.34 103.139.188.253
103.139.67.72 103.139.56.178 103.14.12.13 103.14.12.143
103.139.47.46 103.14.15.43 103.14.15.56 183.232.198.252
103.14.142.226 103.14.232.82 103.14.234.126 103.14.234.149
103.14.234.117 103.14.234.45 103.14.235.109 103.14.235.114