Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: None

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 103.14.128.1
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 15720
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;103.14.128.1.			IN	A

;; AUTHORITY SECTION:
.			538	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022051801 1800 900 604800 86400

;; Query time: 468 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu May 19 02:50:37 CST 2022
;; MSG SIZE  rcvd: 105
Host info
Host 1.128.14.103.in-addr.arpa not found: 2(SERVFAIL)
Nslookup info:
server can't find 103.14.128.1.in-addr.arpa: SERVFAIL
Related IP info:
Related comments:
IP Type Details Datetime
1.69.20.131 attackspam
SSH login attempts.
2020-03-28 01:16:13
106.13.111.19 attackspambots
Mar 27 17:31:50 *** sshd[32615]: Invalid user epmd from 106.13.111.19
2020-03-28 01:34:21
118.70.128.82 attack
Unauthorized connection attempt from IP address 118.70.128.82 on Port 445(SMB)
2020-03-28 01:32:52
106.13.13.149 attackbots
Mar 21 05:27:59 itv-usvr-01 sshd[24213]: Invalid user brooklyn from 106.13.13.149
Mar 21 05:27:59 itv-usvr-01 sshd[24213]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.13.149
Mar 21 05:27:59 itv-usvr-01 sshd[24213]: Invalid user brooklyn from 106.13.13.149
Mar 21 05:28:00 itv-usvr-01 sshd[24213]: Failed password for invalid user brooklyn from 106.13.13.149 port 36672 ssh2
Mar 21 05:36:56 itv-usvr-01 sshd[24567]: Invalid user de from 106.13.13.149
2020-03-28 01:32:35
106.13.147.223 attackbotsspam
Invalid user chelsey from 106.13.147.223 port 58454
2020-03-28 01:19:43
45.133.96.254 attackspam
Unauthorized connection attempt from IP address 45.133.96.254 on Port 445(SMB)
2020-03-28 01:40:10
192.82.93.3 attack
Unauthorized connection attempt from IP address 192.82.93.3 on Port 445(SMB)
2020-03-28 01:41:06
37.252.72.91 attack
SSH login attempts.
2020-03-28 01:40:28
67.195.204.77 attack
SSH login attempts.
2020-03-28 01:07:29
160.16.226.158 attackspam
Mar 27 16:51:54 vpn01 sshd[14330]: Failed password for root from 160.16.226.158 port 43534 ssh2
...
2020-03-28 01:13:10
217.182.169.183 attack
Invalid user snk from 217.182.169.183 port 34980
2020-03-28 01:43:57
110.78.153.118 attackspam
Unauthorized connection attempt from IP address 110.78.153.118 on Port 445(SMB)
2020-03-28 01:23:41
171.238.43.54 attackbots
Unauthorized connection attempt from IP address 171.238.43.54 on Port 445(SMB)
2020-03-28 01:19:24
180.97.250.66 attack
SSH login attempts.
2020-03-28 01:09:13
111.231.139.30 attackspambots
Brute-force attempt banned
2020-03-28 01:04:30

Recently Reported IPs

103.14.123.157 103.14.128.5 103.14.129.129 103.14.129.131
103.14.129.135 103.14.130.11 103.14.14.164 103.14.14.89
103.14.196.33 168.192.62.170 103.14.198.163 103.14.20.106
103.14.251.16 103.14.33.83 103.14.34.129 103.14.34.78
103.14.40.190 103.14.41.17 103.14.99.122 103.14.99.37