Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: India

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
% [whois.apnic.net]
% Whois data copyright terms    http://www.apnic.net/db/dbcopyright.html

% Information related to '103.155.210.0 - 103.155.211.255'

% Abuse contact for '103.155.210.0 - 103.155.211.255' is 'jagdishpaliya@ucnindia.com'

inetnum:        103.155.210.0 - 103.155.211.255
netname:        UCNFNPL
descr:          Ucn Fibrenet Pvt Ltd
admin-c:        JP1516-AP
tech-c:         NA831-AP
country:        IN
mnt-by:         MAINT-IN-IRINN
mnt-lower:      MAINT-IN-IRINN
mnt-irt:        IRT-UCNFNPL-IN
mnt-routes:     MAINT-IN-UCNFNPL
mnt-routes:     MAINT-IN-IRINN
status:         ALLOCATED PORTABLE
last-modified:  2025-08-11T22:50:40Z
source:         APNIC

irt:            IRT-UCNFNPL-IN
address:        4th Floor, Milestone, Wardha Road, Ramdaspeth, Nagpur,Nagpur,Maharashtra-440012
e-mail:         ashutoshkane@ucnindia.com
abuse-mailbox:  jagdishpaliya@ucnindia.com
admin-c:        NA831-AP
tech-c:         NA831-AP
auth:           # Filtered
mnt-by:         MAINT-IN-UCNFNPL
mnt-by:         MAINT-IN-IRINN
last-modified:  2026-02-10T04:58:09Z
source:         APNIC

role:           network admin
address:        4th Floor, Milestone, Wardha Road, Ramdaspeth, Nagpur,Nagpur,Maharashtra-440012
country:        IN
phone:          +91 7126633999
e-mail:         jagdishpaliya@ucnindia.com
admin-c:        JP1516-AP
tech-c:         JP1516-AP
nic-hdl:        NA831-AP
mnt-by:         MAINT-IN-UCNFNPL
mnt-by:         MAINT-IN-IRINN
last-modified:  2025-09-27T10:03:28Z
source:         APNIC

person:         Jagdish paliya
address:        4th Floor, Milestone, Wardha Road, Ramdaspeth, Nagpur,Nagpur,Maharashtra-440012
country:        IN
phone:          +91 7126633999
e-mail:         jagdishpaliya@ucnindia.com
nic-hdl:        JP1516-AP
mnt-by:         MAINT-IN-UCNFNPL
mnt-by:         MAINT-IN-IRINN
last-modified:  2025-09-27T10:03:28Z
source:         APNIC

% Information related to '103.155.210.0/24AS133007'

route:          103.155.210.0/24
descr:          Ucn Fibrenet Pvt Ltd
mnt-routes:     MAINT-IN-UCNFNPL
mnt-by:         MAINT-IN-UCNFNPL
mnt-by:         MAINT-IN-IRINN
mnt-routes:     MAINT-IN-IRINN
origin:         AS133007
last-modified:  2025-12-14T22:22:34Z
source:         APNIC

% This query was served by the APNIC Whois Service version 1.88.36-SNAPSHOT (WHOIS-AU5)
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 103.155.210.152
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 40480
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;103.155.210.152.		IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2026032500 1800 900 604800 86400

;; Query time: 10 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Mar 25 14:30:37 CST 2026
;; MSG SIZE  rcvd: 108
Host info
152.210.155.103.in-addr.arpa domain name pointer j152.ucndns.in.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
152.210.155.103.in-addr.arpa	name = j152.ucndns.in.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
123.207.86.68 attack
Sep  3 13:30:45 v22019058497090703 sshd[13588]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=123.207.86.68
Sep  3 13:30:47 v22019058497090703 sshd[13588]: Failed password for invalid user lk from 123.207.86.68 port 48624 ssh2
Sep  3 13:35:28 v22019058497090703 sshd[13910]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=123.207.86.68
...
2019-09-04 01:40:45
185.211.245.170 attackspam
Sep  3 14:15:48 flomail postfix/smtps/smtpd[20165]: warning: unknown[185.211.245.170]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
2019-09-04 01:03:06
36.67.59.189 attack
Unauthorized connection attempt from IP address 36.67.59.189 on Port 445(SMB)
2019-09-04 01:47:55
89.165.119.206 attackspam
Unauthorized connection attempt from IP address 89.165.119.206 on Port 445(SMB)
2019-09-04 01:17:05
95.9.36.91 attackspam
Unauthorized connection attempt from IP address 95.9.36.91 on Port 445(SMB)
2019-09-04 00:58:58
188.19.11.200 attack
Unauthorized connection attempt from IP address 188.19.11.200 on Port 445(SMB)
2019-09-04 01:19:23
163.172.98.236 attackspam
2019-09-03T14:25:27.313808abusebot-3.cloudsearch.cf sshd\[5048\]: Invalid user robbie from 163.172.98.236 port 59364
2019-09-03T14:25:27.319303abusebot-3.cloudsearch.cf sshd\[5048\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=163.172.98.236
2019-09-04 01:24:47
192.42.116.22 attack
Sep  3 17:42:50 MK-Soft-VM6 sshd\[11574\]: Invalid user utilisateur from 192.42.116.22 port 45216
Sep  3 17:42:50 MK-Soft-VM6 sshd\[11574\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=192.42.116.22
Sep  3 17:42:52 MK-Soft-VM6 sshd\[11574\]: Failed password for invalid user utilisateur from 192.42.116.22 port 45216 ssh2
...
2019-09-04 01:50:36
91.106.78.16 attack
Unauthorized connection attempt from IP address 91.106.78.16 on Port 445(SMB)
2019-09-04 01:52:02
108.222.68.232 attackbotsspam
Sep  3 14:36:46 MK-Soft-VM5 sshd\[12537\]: Invalid user 123 from 108.222.68.232 port 42428
Sep  3 14:36:46 MK-Soft-VM5 sshd\[12537\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=108.222.68.232
Sep  3 14:36:48 MK-Soft-VM5 sshd\[12537\]: Failed password for invalid user 123 from 108.222.68.232 port 42428 ssh2
...
2019-09-04 01:10:40
120.52.152.17 attackspam
MultiHost/MultiPort Probe, Scan, Hack -
2019-09-04 01:14:09
49.88.112.116 attackspam
2019-09-03T11:33:11.173294abusebot.cloudsearch.cf sshd\[6192\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.88.112.116  user=root
2019-09-04 01:46:55
106.12.109.188 attackbots
Sep  2 22:36:39 lcdev sshd\[25903\]: Invalid user lin from 106.12.109.188
Sep  2 22:36:39 lcdev sshd\[25903\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.109.188
Sep  2 22:36:41 lcdev sshd\[25903\]: Failed password for invalid user lin from 106.12.109.188 port 56502 ssh2
Sep  2 22:41:24 lcdev sshd\[26430\]: Invalid user admin from 106.12.109.188
Sep  2 22:41:24 lcdev sshd\[26430\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.109.188
2019-09-04 01:07:03
51.79.20.92 attackspam
Calling not existent HTTP content (400 or 404).
2019-09-04 01:18:59
109.165.100.81 attackspambots
Unauthorized connection attempt from IP address 109.165.100.81 on Port 445(SMB)
2019-09-04 01:38:33

Recently Reported IPs

47.117.98.111 10.252.229.207 20.64.105.156 178.128.115.151
228.246.242.206 2606:4700:10::6816:4931 2606:4700:10::6816:2492 2606:4700:10::ac43:2017
2606:4700:20::681a:798 2606:4700:10::ac43:1538 121.230.89.39 2606:4700:10::6816:1566
2606:4700:10::6816:205 2606:4700:10::6814:4765 110.78.158.127 204.152.221.14
8.217.174.206 172.94.9.63 240a:42ba:1a20:675:90b5:3a57:3fc5:c2d2 66.132.195.123