Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Faridabad

Region: Haryana

Country: India

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 103.20.214.142
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 47235
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;103.20.214.142.			IN	A

;; AUTHORITY SECTION:
.			599	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022032301 1800 900 604800 86400

;; Query time: 69 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Mar 24 03:52:02 CST 2022
;; MSG SIZE  rcvd: 107
Host info
142.214.20.103.in-addr.arpa domain name pointer e2e-3-142.ssdcloudindia.net.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
142.214.20.103.in-addr.arpa	name = e2e-3-142.ssdcloudindia.net.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
103.141.138.121 attackspam
Oct 28 18:32:01 mail sshd\[31785\]: Invalid user 1234 from 103.141.138.121
Oct 28 18:32:01 mail sshd\[31785\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.141.138.121
Oct 28 18:32:03 mail sshd\[31785\]: Failed password for invalid user 1234 from 103.141.138.121 port 58347 ssh2
...
2019-10-29 03:59:05
45.125.193.139 attack
445/tcp
[2019-10-28]1pkt
2019-10-29 03:27:14
68.183.114.226 attackbotsspam
DATE:2019-10-28 19:03:36,IP:68.183.114.226,MATCHES:10,PORT:ssh
2019-10-29 03:36:37
37.193.47.184 attackbots
Chat Spam
2019-10-29 04:04:48
167.71.9.186 attackbotsspam
Mail/25/465/587-993/995 Probe, Reject, BadAuth, Hack, SPAM -
2019-10-29 03:32:51
167.71.251.221 attackspambots
Mail/25/465/587-993/995 Probe, Reject, BadAuth, Hack, SPAM -
2019-10-29 03:40:51
120.132.53.137 attackbotsspam
Oct 28 15:08:43 plusreed sshd[21253]: Invalid user timson from 120.132.53.137
...
2019-10-29 03:45:59
167.71.2.16 attackbotsspam
Mail/25/465/587-993/995 Probe, Reject, BadAuth, Hack, SPAM -
2019-10-29 04:03:38
178.128.52.97 attackbots
Oct 28 17:47:35 server sshd\[31541\]: Invalid user lynx from 178.128.52.97
Oct 28 17:47:35 server sshd\[31541\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.128.52.97 
Oct 28 17:47:38 server sshd\[31541\]: Failed password for invalid user lynx from 178.128.52.97 port 39278 ssh2
Oct 28 18:00:04 server sshd\[1764\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.128.52.97  user=root
Oct 28 18:00:07 server sshd\[1764\]: Failed password for root from 178.128.52.97 port 52932 ssh2
...
2019-10-29 03:51:13
223.89.43.164 attackspambots
Host Scan
2019-10-29 04:02:45
132.232.132.103 attackspambots
2019-10-28T07:36:50.5420551495-001 sshd\[14947\]: Failed password for invalid user recording from 132.232.132.103 port 48396 ssh2
2019-10-28T08:40:18.6680441495-001 sshd\[17412\]: Invalid user P@SSW0rD from 132.232.132.103 port 36946
2019-10-28T08:40:18.6756361495-001 sshd\[17412\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=132.232.132.103
2019-10-28T08:40:20.5539551495-001 sshd\[17412\]: Failed password for invalid user P@SSW0rD from 132.232.132.103 port 36946 ssh2
2019-10-28T08:45:39.6078161495-001 sshd\[17615\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=132.232.132.103  user=root
2019-10-28T08:45:42.2222821495-001 sshd\[17615\]: Failed password for root from 132.232.132.103 port 45386 ssh2
...
2019-10-29 03:49:18
210.140.10.53 attack
445/tcp 445/tcp 445/tcp...
[2019-08-27/10-28]15pkt,1pt.(tcp)
2019-10-29 03:40:31
218.235.29.87 attack
Oct 28 09:33:14 hpm sshd\[9043\]: Invalid user logcheck from 218.235.29.87
Oct 28 09:33:14 hpm sshd\[9043\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.235.29.87
Oct 28 09:33:16 hpm sshd\[9043\]: Failed password for invalid user logcheck from 218.235.29.87 port 37010 ssh2
Oct 28 09:37:40 hpm sshd\[9403\]: Invalid user admin from 218.235.29.87
Oct 28 09:37:40 hpm sshd\[9403\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.235.29.87
2019-10-29 03:48:16
185.34.33.2 attack
Triggered by Fail2Ban at Ares web server
2019-10-29 04:00:53
180.168.156.214 attackspambots
Oct 28 07:46:52 Tower sshd[37875]: Connection from 180.168.156.214 port 14756 on 192.168.10.220 port 22
Oct 28 07:46:54 Tower sshd[37875]: Failed password for root from 180.168.156.214 port 14756 ssh2
Oct 28 07:46:54 Tower sshd[37875]: Received disconnect from 180.168.156.214 port 14756:11: Bye Bye [preauth]
Oct 28 07:46:54 Tower sshd[37875]: Disconnected from authenticating user root 180.168.156.214 port 14756 [preauth]
2019-10-29 03:27:51

Recently Reported IPs

103.20.212.36 103.20.214.206 103.200.21.214 103.203.43.117
103.204.106.14 103.204.129.220 62.106.205.75 181.42.60.94
103.204.130.235 103.204.7.13 103.205.6.114 103.205.64.114
103.205.64.88 103.206.246.3 103.207.94.163 103.207.94.181
103.207.94.230 103.208.212.98 103.208.216.132 103.208.218.224