Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Viet Nam

Internet Service Provider: Ehome Technology Trading Company Limited

Hostname: unknown

Organization: unknown

Usage Type: Commercial

Comments:
Type Details Datetime
attack
Aug  9 17:24:27 scw-tender-jepsen sshd[6249]: Failed password for root from 103.142.139.114 port 44872 ssh2
2020-08-10 03:01:23
attackspambots
Aug  8 11:50:17 firewall sshd[3802]: Failed password for root from 103.142.139.114 port 35988 ssh2
Aug  8 11:54:24 firewall sshd[3934]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.142.139.114  user=root
Aug  8 11:54:26 firewall sshd[3934]: Failed password for root from 103.142.139.114 port 55024 ssh2
...
2020-08-09 01:45:19
attackspam
SSH Invalid Login
2020-07-30 06:12:52
attackbotsspam
Jul 17 09:49:28 jane sshd[8069]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.142.139.114 
Jul 17 09:49:30 jane sshd[8069]: Failed password for invalid user radio from 103.142.139.114 port 58218 ssh2
...
2020-07-17 17:58:29
attackspambots
SSH invalid-user multiple login try
2020-07-15 09:00:22
attack
Jul 14 07:05:35 vps687878 sshd\[30706\]: Failed password for invalid user jan from 103.142.139.114 port 54902 ssh2
Jul 14 07:08:12 vps687878 sshd\[31141\]: Invalid user testi from 103.142.139.114 port 46724
Jul 14 07:08:12 vps687878 sshd\[31141\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.142.139.114
Jul 14 07:08:15 vps687878 sshd\[31141\]: Failed password for invalid user testi from 103.142.139.114 port 46724 ssh2
Jul 14 07:10:51 vps687878 sshd\[31509\]: Invalid user ellis from 103.142.139.114 port 38542
Jul 14 07:10:51 vps687878 sshd\[31509\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.142.139.114
...
2020-07-14 13:30:13
attackspambots
B: Abusive ssh attack
2020-07-10 15:57:15
attack
SSH brutforce
2020-07-09 01:58:13
attackspambots
Jul  5 07:55:52 game-panel sshd[21639]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.142.139.114
Jul  5 07:55:54 game-panel sshd[21639]: Failed password for invalid user lxy from 103.142.139.114 port 51784 ssh2
Jul  5 08:01:22 game-panel sshd[21914]: Failed password for root from 103.142.139.114 port 60708 ssh2
2020-07-05 18:13:38
attackbotsspam
Jun 29 14:39:31 piServer sshd[29719]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.142.139.114 
Jun 29 14:39:33 piServer sshd[29719]: Failed password for invalid user externo from 103.142.139.114 port 43026 ssh2
Jun 29 14:44:06 piServer sshd[30097]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.142.139.114 
...
2020-06-29 20:51:25
attackbots
2020-06-25T08:41:11.727866mail.csmailer.org sshd[15523]: Failed password for root from 103.142.139.114 port 60652 ssh2
2020-06-25T08:42:12.146750mail.csmailer.org sshd[15770]: Invalid user uwsgi from 103.142.139.114 port 43902
2020-06-25T08:42:12.149515mail.csmailer.org sshd[15770]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.142.139.114
2020-06-25T08:42:12.146750mail.csmailer.org sshd[15770]: Invalid user uwsgi from 103.142.139.114 port 43902
2020-06-25T08:42:14.006177mail.csmailer.org sshd[15770]: Failed password for invalid user uwsgi from 103.142.139.114 port 43902 ssh2
...
2020-06-25 16:42:30
attack
Lines containing failures of 103.142.139.114
Jun  8 05:24:31 shared10 sshd[16746]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.142.139.114  user=r.r
Jun  8 05:24:33 shared10 sshd[16746]: Failed password for r.r from 103.142.139.114 port 40140 ssh2
Jun  8 05:24:33 shared10 sshd[16746]: Received disconnect from 103.142.139.114 port 40140:11: Bye Bye [preauth]
Jun  8 05:24:33 shared10 sshd[16746]: Disconnected from authenticating user r.r 103.142.139.114 port 40140 [preauth]
Jun  8 05:36:13 shared10 sshd[22224]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.142.139.114  user=r.r
Jun  8 05:36:15 shared10 sshd[22224]: Failed password for r.r from 103.142.139.114 port 53128 ssh2
Jun  8 05:36:15 shared10 sshd[22224]: Received disconnect from 103.142.139.114 port 53128:11: Bye Bye [preauth]
Jun  8 05:36:15 shared10 sshd[22224]: Disconnected from authenticating user r.r 103.142.139.114 p........
------------------------------
2020-06-08 20:00:15
attack
5x Failed Password
2020-06-07 17:36:46
attack
Jun  5 22:27:35 cdc sshd[24534]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.142.139.114  user=root
Jun  5 22:27:37 cdc sshd[24534]: Failed password for invalid user root from 103.142.139.114 port 44986 ssh2
2020-06-06 10:09:27
Comments on same subnet:
IP Type Details Datetime
103.142.139.32 attackspam
Unauthorized connection attempt from IP address 103.142.139.32 on Port 445(SMB)
2020-02-14 09:08:07
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 103.142.139.114
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 50859
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;103.142.139.114.		IN	A

;; AUTHORITY SECTION:
.			554	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2020060501 1800 900 604800 86400

;; Query time: 51 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Jun 06 10:09:21 CST 2020
;; MSG SIZE  rcvd: 119
Host info
Host 114.139.142.103.in-addr.arpa not found: 2(SERVFAIL)
Nslookup info:
;; Got SERVFAIL reply from 100.100.2.138, trying next server
;; Got SERVFAIL reply from 100.100.2.138, trying next server
Server:		100.100.2.136
Address:	100.100.2.136#53

** server can't find 114.139.142.103.in-addr.arpa: SERVFAIL

Related IP info:
Related comments:
IP Type Details Datetime
117.240.32.74 attack
[portscan] tcp/23 [TELNET]
*(RWIN=41435)(04301449)
2020-05-01 01:10:40
147.203.238.18 attackspambots
[portscan] udp/1900 [ssdp]
*(RWIN=-)(04301449)
2020-05-01 01:07:40
171.6.89.195 attack
[portscan] tcp/81 [alter-web/web-proxy]
*(RWIN=45969)(04301449)
2020-05-01 01:05:20
45.185.208.112 attackspam
1433/tcp
[2020-04-30]1pkt
2020-05-01 00:54:57
98.128.130.63 attackbotsspam
Port scan: Attack repeated for 24 hours
2020-05-01 00:49:37
209.141.37.175 attackspam
Invalid user fake from 209.141.37.175 port 50320
2020-05-01 00:33:29
218.102.109.142 attackspambots
[portscan] tcp/23 [TELNET]
[scan/connect: 2 time(s)]
*(RWIN=54151,40586)(04301449)
2020-05-01 00:58:37
162.243.145.91 attackbots
[portscan] tcp/143 [IMAP]
*(RWIN=65535)(04301449)
2020-05-01 01:05:37
175.9.252.46 attack
[portscan] tcp/23 [TELNET]
*(RWIN=37912)(04301449)
2020-05-01 01:04:53
128.74.131.113 attackbotsspam
" "
2020-05-01 00:42:59
223.18.222.177 attackspam
[portscan] tcp/23 [TELNET]
*(RWIN=55390)(04301449)
2020-05-01 00:30:21
60.162.23.222 attackspam
Unauthorized connection attempt detected from IP address 60.162.23.222 to port 445
2020-05-01 00:52:36
125.227.98.52 attackspambots
[portscan] tcp/23 [TELNET]
*(RWIN=2946)(04301449)
2020-05-01 01:08:55
218.207.138.156 attack
Unauthorized connection attempt detected from IP address 218.207.138.156 to port 1433
2020-05-01 00:58:07
211.140.94.24 attackbots
trying to access non-authorized port
2020-05-01 00:33:12

Recently Reported IPs

1.175.65.66 176.122.2.11 202.120.58.24 104.245.32.232
88.242.199.253 122.117.171.42 49.235.206.30 188.24.1.202
97.37.246.200 51.15.19.218 103.129.221.18 134.122.91.66
114.235.48.222 91.224.223.193 182.252.81.5 42.114.96.59
86.61.209.213 74.112.10.104 182.122.18.61 158.159.95.242