Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Gurugram

Region: Haryana

Country: India

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
IP Type Details Datetime
103.208.70.46 attack
20/8/25@23:53:39: FAIL: Alarm-Network address from=103.208.70.46
...
2020-08-26 15:06:26
Whois info:
% [whois.apnic.net]
% Whois data copyright terms    http://www.apnic.net/db/dbcopyright.html

% Information related to '103.208.70.0 - 103.208.70.255'

% Abuse contact for '103.208.70.0 - 103.208.70.255' is 'Smrutiranjan.Panda@tataplayfiber.com'

inetnum:        103.208.70.0 - 103.208.70.255
netname:        TATAPLAYBROADBAND-IN
descr:          TATASKYBB
country:        IN
admin-c:        TPBP1-AP
tech-c:         AT1406-AP
abuse-c:        AT1644-AP
status:         ALLOCATED NON-PORTABLE
mnt-by:         MAINT-TATAPLAYBROADBAND-IN
mnt-irt:        IRT-TATAPLAYBROADBAND-IN
last-modified:  2022-01-28T01:24:30Z
source:         APNIC

irt:            IRT-TATAPLAYBROADBAND-IN
address:        Unit 306, 3rd Floor, Windsor, Off. C.S.T. Road, Kalina Santacruz (East), Mumbai 400098
phone:          +91-9811918518
e-mail:         Smrutiranjan.Panda@tataplayfiber.com
abuse-mailbox:  Smrutiranjan.Panda@tataplayfiber.com
admin-c:        TPBP1-AP
tech-c:         TPBP1-AP
auth:           # Filtered
remarks:        smrutiranjan.panda@tataplayfiber.com was validated on 2025-11-28
mnt-by:         MAINT-TATAPLAYBROADBAND-IN
last-modified:  2025-11-28T08:48:59Z
source:         APNIC

role:           ABUSE TATASKYBROADBANDIN
address:        Office nos. 132 to 138, Regus Imperial Business Park Centre Pvt. Ltd., Block-A, Level-1
address:        Shiv Sagar Estate, Dr. Annie, Besant Road, Worli. Mumbai-400018, Maharashtra, India
country:        ZZ
phone:          +000000000
e-mail:         Vikas.Singh1@tataskybb.com
admin-c:        TPBP1-AP
tech-c:         TPBP1-AP
nic-hdl:        AT1406-AP
remarks:        Generated from irt object IRT-TATASKYBROADBAND-IN
remarks:        vikas.singh1@tataskybb.com was validated on 2022-01-03
abuse-mailbox:  Vikas.Singh1@tataskybb.com
mnt-by:         APNIC-ABUSE
last-modified:  2022-01-28T00:47:36Z
source:         APNIC

role:           ABUSE TATAPLAYBROADBANDIN
country:        ZZ
address:        Unit 306, 3rd Floor, Windsor, Off. C.S.T. Road, Kalina Santacruz (East), Mumbai 400098
phone:          +91-9811918518
e-mail:         Smrutiranjan.Panda@tataplayfiber.com
admin-c:        TPBP1-AP
tech-c:         TPBP1-AP
nic-hdl:        AT1644-AP
remarks:        Generated from irt object IRT-TATAPLAYBROADBAND-IN
remarks:        smrutiranjan.panda@tataplayfiber.com was validated on 2025-11-28
abuse-mailbox:  Smrutiranjan.Panda@tataplayfiber.com
mnt-by:         APNIC-ABUSE
last-modified:  2025-11-28T08:49:24Z
source:         APNIC

role:           Tata Play Broadband Private Limited Administrator
address:        Office nos. 132 to 138, Regus Imperial Business Park Centre Pvt. Ltd., Block-A, Level-1
address:        Shiv Sagar Estate, Dr. Annie, Besant Road, Worli. Mumbai-400018, Maharashtra, India
country:        IN
phone:          +91-9967139939
e-mail:         vikas.singh1@tataskybb.com
admin-c:        TPBP1-AP
tech-c:         TPBP1-AP
nic-hdl:        TPBP1-AP
notify:         vikas.singh1@tataskybb.com
mnt-by:         MAINT-TATAPLAYBROADBAND-IN
last-modified:  2022-01-28T00:59:15Z
source:         APNIC

% Information related to '103.208.70.0/24AS134674'

route:          103.208.70.0/24
origin:         AS134674
descr:          TATA PLAY BROADBAND PRIVATE LIMITED
                Unit 306, 3rd Floor, Windsor, Off. C.S.T. Road, Kalina
                Santacruz (East), Mumbai 400098
mnt-by:         MAINT-TATAPLAYBROADBAND-IN
last-modified:  2022-01-28T01:18:58Z
source:         APNIC

% This query was served by the APNIC Whois Service version 1.88.36-SNAPSHOT (WHOIS-AU5)
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 103.208.70.212
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 49501
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;103.208.70.212.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2026020600 1800 900 604800 86400

;; Query time: 10 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 06 17:37:02 CST 2026
;; MSG SIZE  rcvd: 107
Host info
Host 212.70.208.103.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 212.70.208.103.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
181.226.255.172 attackspam
Honeypot attack, port: 5555, PTR: PTR record not found
2019-07-03 22:52:38
89.248.160.193 attackspambots
MultiHost/MultiPort Probe, Scan, Hack -
2019-07-03 23:12:23
103.242.175.78 attackspambots
Jul  3 16:47:06 lnxmail61 sshd[9260]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.242.175.78
2019-07-03 23:00:38
37.142.253.226 attackbots
port scan and connect, tcp 23 (telnet)
2019-07-03 22:48:20
54.38.226.197 attack
blogonese.net 54.38.226.197 \[03/Jul/2019:15:28:13 +0200\] "POST /wp-login.php HTTP/1.1" 200 5772 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0"
blogonese.net 54.38.226.197 \[03/Jul/2019:15:28:13 +0200\] "POST /wp-login.php HTTP/1.1" 200 5732 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0"
2019-07-03 22:21:49
211.236.192.234 attack
2019-07-03T13:26:18.797406abusebot-2.cloudsearch.cf sshd\[4226\]: Invalid user admin from 211.236.192.234 port 58049
2019-07-03 23:14:06
221.226.90.126 attackspam
Jul  3 15:26:19 host sshd\[64736\]: Invalid user exim from 221.226.90.126 port 43014
Jul  3 15:26:19 host sshd\[64736\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=221.226.90.126
...
2019-07-03 23:12:51
153.36.236.242 attackbots
Jul  3 21:35:15 lcl-usvr-01 sshd[1797]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=153.36.236.242  user=root
Jul  3 21:35:17 lcl-usvr-01 sshd[1797]: Failed password for root from 153.36.236.242 port 12641 ssh2
2019-07-03 22:46:17
14.63.169.33 attack
Jul  3 14:40:06 xm3 sshd[18252]: Failed password for invalid user anthony from 14.63.169.33 port 47174 ssh2
Jul  3 14:40:06 xm3 sshd[18252]: Received disconnect from 14.63.169.33: 11: Bye Bye [preauth]
Jul  3 14:54:00 xm3 sshd[15251]: Failed password for invalid user Waschlappen from 14.63.169.33 port 60981 ssh2
Jul  3 14:54:00 xm3 sshd[15251]: Received disconnect from 14.63.169.33: 11: Bye Bye [preauth]
Jul  3 14:57:00 xm3 sshd[23753]: Failed password for invalid user xian from 14.63.169.33 port 45561 ssh2
Jul  3 14:57:00 xm3 sshd[23753]: Received disconnect from 14.63.169.33: 11: Bye Bye [preauth]
Jul  3 14:59:54 xm3 sshd[27763]: Failed password for invalid user mie from 14.63.169.33 port 58374 ssh2
Jul  3 14:59:55 xm3 sshd[27763]: Received disconnect from 14.63.169.33: 11: Bye Bye [preauth]


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=14.63.169.33
2019-07-03 23:13:23
190.43.59.43 attackspam
Triggered by Fail2Ban
2019-07-03 22:41:03
207.180.222.254 attackbots
Jul  3 14:51:06 keyhelp sshd[2064]: Invalid user temp from 207.180.222.254
Jul  3 14:51:06 keyhelp sshd[2064]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=207.180.222.254
Jul  3 14:51:08 keyhelp sshd[2064]: Failed password for invalid user temp from 207.180.222.254 port 56076 ssh2
Jul  3 14:51:08 keyhelp sshd[2064]: Received disconnect from 207.180.222.254 port 56076:11: Bye Bye [preauth]
Jul  3 14:51:08 keyhelp sshd[2064]: Disconnected from 207.180.222.254 port 56076 [preauth]


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=207.180.222.254
2019-07-03 23:18:57
92.156.164.115 attackspambots
LGS,WP GET /wp-login.php
2019-07-03 22:56:12
5.75.116.8 attackbots
port scan and connect, tcp 23 (telnet)
2019-07-03 23:23:54
41.162.90.68 attackspambots
Jul  3 15:27:41 ncomp sshd[29134]: Invalid user xtra from 41.162.90.68
Jul  3 15:27:41 ncomp sshd[29134]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=41.162.90.68
Jul  3 15:27:41 ncomp sshd[29134]: Invalid user xtra from 41.162.90.68
Jul  3 15:27:43 ncomp sshd[29134]: Failed password for invalid user xtra from 41.162.90.68 port 37404 ssh2
2019-07-03 22:33:38
132.148.129.180 attackbots
Jul  3 15:27:28 * sshd[15950]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=132.148.129.180
Jul  3 15:27:29 * sshd[15950]: Failed password for invalid user kasandra from 132.148.129.180 port 36442 ssh2
2019-07-03 22:42:18

Recently Reported IPs

167.71.248.1 159.223.71.126 66.90.98.106 162.216.149.65
49.153.165.66 217.168.244.241 20.65.110.35 157.238.154.183
198.235.24.179 8.215.41.147 106.54.176.158 8.129.86.52
211.175.22.22 57.135.128.105 46.201.41.112 106.11.31.25
52.146.21.82 1.4.134.5 94.231.206.4 94.231.206.35