Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Cambodia

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
IP Type Details Datetime
103.20.81.104 attackbots
Unauthorized connection attempt detected from IP address 103.20.81.104 to port 8080 [J]
2020-01-21 19:13:04
Whois info:
% [whois.apnic.net]
% Whois data copyright terms    http://www.apnic.net/db/dbcopyright.html

% Information related to '103.20.80.0 - 103.20.83.255'

% Abuse contact for '103.20.80.0 - 103.20.83.255' is 'abuse@megatruenet.com'

inetnum:        103.20.80.0 - 103.20.83.255
netname:        MEGATRUENET-KH
descr:          Mega Truenet Communication Co., Ltd.
country:        KH
org:            ORG-TCC4-AP
admin-c:        MTCC1-AP
tech-c:         MTCC1-AP
abuse-c:        AT1285-AP
status:         ALLOCATED PORTABLE
remarks:        --------------------------------------------------------
remarks:        To report network abuse, please contact mnt-irt
remarks:        For troubleshooting, please contact tech-c and admin-c
remarks:        Report invalid contact via www.apnic.net/invalidcontact
remarks:        --------------------------------------------------------
mnt-by:         APNIC-HM
mnt-lower:      MAINT-TRUENET-KH
mnt-routes:     MAINT-TRUENET-KH
mnt-irt:        IRT-TRUENET-KH
last-modified:  2022-11-07T04:32:47Z
source:         APNIC

irt:            IRT-TRUENET-KH
address:        Room 503,707 Monivong Road, Songkat Beong Keng Kong III , Khan Chamkamon, Phnom Penh
e-mail:         abuse@megatruenet.com
abuse-mailbox:  abuse@megatruenet.com
admin-c:        TCCA4-AP
tech-c:         TCCA4-AP
auth:           # Filtered
remarks:        megatruenet was validated on 2023-04-11
remarks:        abuse@megatruenet.com was validated on 2025-07-01
mnt-by:         MAINT-TRUENET-KH
last-modified:  2025-09-04T07:39:31Z
source:         APNIC

organisation:   ORG-TCC4-AP
org-name:       Mega Truenet Communication Co., Ltd.
org-type:       LIR
country:        KH
address:        Room 503,707 Monivong Road, Songkat Beong Keng Kong III , Kh
phone:          +855-976-851733
e-mail:         marx@megatruenet.com
mnt-ref:        APNIC-HM
mnt-by:         APNIC-HM
last-modified:  2023-09-05T02:17:56Z
source:         APNIC

role:           ABUSE TRUENETKH
country:        ZZ
address:        Room 503,707 Monivong Road, Songkat Beong Keng Kong III , Khan Chamkamon, Phnom Penh
phone:          +000000000
e-mail:         abuse@megatruenet.com
admin-c:        TCCA4-AP
tech-c:         TCCA4-AP
nic-hdl:        AT1285-AP
remarks:        Generated from irt object IRT-TRUENET-KH
remarks:        abuse@megatruenet.com was validated on 2025-07-01
abuse-mailbox:  abuse@megatruenet.com
mnt-by:         APNIC-ABUSE
last-modified:  2025-07-01T21:00:46Z
source:         APNIC

role:           Mega Truenet Communication Co. Ltd. - network administrator
address:        NO 6,Room A3-02,Strrm roleeet 289,Sangkat Boeng Kak2,Khan Tuol Kouk, Phnom Penh
country:        KH
phone:          +855-976-851733
e-mail:         network@megatruenet.com
admin-c:        MTCC1-AP
tech-c:         MTCC1-AP
nic-hdl:        MTCC1-AP
mnt-by:         MAINT-TRUENET-KH
last-modified:  2020-08-10T11:04:31Z
source:         APNIC

% Information related to '103.20.81.0/24AS139628'

route:          103.20.81.0/24
descr:          Mega Truenet Communication Co., Ltd.
origin:         AS139628
mnt-by:         MAINT-TRUENET-KH
last-modified:  2022-11-08T09:57:30Z
source:         APNIC

% This query was served by the APNIC Whois Service version 1.88.36-SNAPSHOT (WHOIS-AU5)
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 103.20.81.67
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 25692
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;103.20.81.67.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025092600 1800 900 604800 86400

;; Query time: 82 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Sep 26 17:49:03 CST 2025
;; MSG SIZE  rcvd: 105
Host info
Host 67.81.20.103.in-addr.arpa not found: 2(SERVFAIL)
Nslookup info:
server can't find 103.20.81.67.in-addr.arpa: SERVFAIL
Related IP info:
Related comments:
IP Type Details Datetime
106.157.27.200 attackbotsspam
Unauthorized connection attempt detected from IP address 106.157.27.200 to port 23 [T]
2020-04-17 12:33:19
64.225.42.124 attackbots
64.225.42.124 - - [17/Apr/2020:05:58:59 +0200] "GET /wp-login.php HTTP/1.1" 200 5879 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
64.225.42.124 - - [17/Apr/2020:05:59:01 +0200] "POST /wp-login.php HTTP/1.1" 200 6778 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
64.225.42.124 - - [17/Apr/2020:05:59:03 +0200] "POST /xmlrpc.php HTTP/1.1" 200 427 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
2020-04-17 12:36:33
41.66.244.86 attackspam
Apr 17 06:16:40 mout sshd[29943]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=41.66.244.86  user=root
Apr 17 06:16:42 mout sshd[29943]: Failed password for root from 41.66.244.86 port 43384 ssh2
2020-04-17 12:27:55
3.130.29.157 attackbotsspam
Apr 17 06:40:25 vps647732 sshd[4173]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=3.130.29.157
Apr 17 06:40:27 vps647732 sshd[4173]: Failed password for invalid user tu from 3.130.29.157 port 49756 ssh2
...
2020-04-17 12:45:25
150.109.23.36 attack
Honeypot hit.
2020-04-17 13:02:21
152.136.114.118 attackbots
SSH Brute-Force reported by Fail2Ban
2020-04-17 12:45:50
46.165.230.5 attackspambots
sshd jail - ssh hack attempt
2020-04-17 12:30:18
189.126.67.230 attackspam
postfix (unknown user, SPF fail or relay access denied)
2020-04-17 13:03:56
196.27.115.50 attackbotsspam
$f2bV_matches
2020-04-17 12:50:22
118.244.206.195 attackspam
SSH bruteforce
2020-04-17 12:31:06
191.191.98.243 attackspambots
SSH brute force attempt
2020-04-17 12:35:26
77.42.75.179 attackbots
Automatic report - Port Scan Attack
2020-04-17 12:36:20
212.100.155.154 attackspam
Apr 16 18:27:57 hpm sshd\[30404\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=212.100.155.154  user=root
Apr 16 18:27:59 hpm sshd\[30404\]: Failed password for root from 212.100.155.154 port 37962 ssh2
Apr 16 18:32:01 hpm sshd\[30926\]: Invalid user cr from 212.100.155.154
Apr 16 18:32:01 hpm sshd\[30926\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=212.100.155.154
Apr 16 18:32:02 hpm sshd\[30926\]: Failed password for invalid user cr from 212.100.155.154 port 47238 ssh2
2020-04-17 12:32:38
190.85.34.142 attackspam
SSH login attempts brute force.
2020-04-17 12:43:54
139.199.82.171 attack
2020-04-17T05:52:10.896508librenms sshd[17554]: Failed password for invalid user test10 from 139.199.82.171 port 38000 ssh2
2020-04-17T05:58:49.126988librenms sshd[18081]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.199.82.171  user=root
2020-04-17T05:58:51.586014librenms sshd[18081]: Failed password for root from 139.199.82.171 port 40982 ssh2
...
2020-04-17 12:47:40

Recently Reported IPs

36.148.113.162 65.145.188.133 20.80.80.29 192.168.41.14
13.89.121.92 183.10.99.69 183.24.166.138 183.21.244.200
82.147.88.84 144.172.97.117 1.10.245.86 113.95.133.220
209.38.100.53 14.212.111.7 194.50.91.19 122.245.187.231
99.209.99.82 170.64.147.31 10.0.10.99 117.70.138.106