Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Indonesia

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 103.214.53.89
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 25359
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;103.214.53.89.			IN	A

;; AUTHORITY SECTION:
.			90	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022022500 1800 900 604800 86400

;; Query time: 58 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Feb 26 01:04:50 CST 2022
;; MSG SIZE  rcvd: 106
Host info
89.53.214.103.in-addr.arpa domain name pointer 103.214.53-89.maxmedia.co.id.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
89.53.214.103.in-addr.arpa	name = 103.214.53-89.maxmedia.co.id.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
202.84.37.154 attackspam
Unauthorized connection attempt detected from IP address 202.84.37.154 to port 1433 [J]
2020-01-08 07:32:03
49.235.55.29 attack
Unauthorized connection attempt detected from IP address 49.235.55.29 to port 2220 [J]
2020-01-08 07:28:26
124.107.173.181 attackspambots
1578431900 - 01/07/2020 22:18:20 Host: 124.107.173.181/124.107.173.181 Port: 445 TCP Blocked
2020-01-08 07:20:40
124.227.7.16 attackbots
Unauthorized connection attempt detected from IP address 124.227.7.16 to port 1433 [J]
2020-01-08 07:59:15
49.74.219.26 attack
Jan  8 00:31:13 [host] sshd[7498]: Invalid user admin from 49.74.219.26
Jan  8 00:31:13 [host] sshd[7498]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.74.219.26
Jan  8 00:31:15 [host] sshd[7498]: Failed password for invalid user admin from 49.74.219.26 port 23272 ssh2
2020-01-08 07:44:32
1.54.66.5 attackbots
Unauthorized connection attempt detected from IP address 1.54.66.5 to port 23 [T]
2020-01-08 07:34:34
88.214.26.39 attack
200107 16:04:18 [Warning] Access denied for user 'magento'@'88.214.26.39' (using password: YES)
200107 16:04:21 [Warning] Access denied for user 'magento'@'88.214.26.39' (using password: YES)
200107 16:04:24 [Warning] Access denied for user 'magento'@'88.214.26.39' (using password: YES)
...
2020-01-08 07:46:10
40.124.4.131 attackspambots
Jan  7 21:18:14 powerpi2 sshd[2447]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=40.124.4.131
Jan  7 21:18:14 powerpi2 sshd[2447]: Invalid user postgres from 40.124.4.131 port 34506
Jan  7 21:18:16 powerpi2 sshd[2447]: Failed password for invalid user postgres from 40.124.4.131 port 34506 ssh2
...
2020-01-08 07:21:35
200.66.39.6 attackspam
Fail2Ban Ban Triggered
2020-01-08 07:51:00
104.131.139.147 attack
WordPress wp-login brute force :: 104.131.139.147 0.168 BYPASS [07/Jan/2020:21:18:15  0000] [censored_4] "POST /wp-login.php HTTP/1.1" 200 2100 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
2020-01-08 07:24:03
31.42.254.24 attackbots
Jan  7 22:17:48 icecube postfix/smtpd[21873]: NOQUEUE: reject: RCPT from unknown[31.42.254.24]: 554 5.7.1 Service unavailable; Client host [31.42.254.24] blocked using zen.spamhaus.org; https://www.spamhaus.org/sbl/query/SBLCSS / https://www.spamhaus.org/query/ip/31.42.254.24; from= to= proto=ESMTP helo=
2020-01-08 07:43:50
78.153.49.38 attackspambots
SASL PLAIN auth failed: ruser=...
2020-01-08 07:48:14
115.248.198.106 attackbotsspam
Unauthorized connection attempt detected from IP address 115.248.198.106 to port 2220 [J]
2020-01-08 07:50:06
180.250.210.133 attackbotsspam
Jan  8 00:22:37 legacy sshd[6908]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.250.210.133
Jan  8 00:22:39 legacy sshd[6908]: Failed password for invalid user avahi from 180.250.210.133 port 50269 ssh2
Jan  8 00:24:42 legacy sshd[7029]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.250.210.133
...
2020-01-08 07:38:51
222.186.31.83 attack
Jan  8 00:49:33 eventyay sshd[16146]: Failed password for root from 222.186.31.83 port 42807 ssh2
Jan  8 00:49:35 eventyay sshd[16146]: Failed password for root from 222.186.31.83 port 42807 ssh2
Jan  8 00:49:37 eventyay sshd[16146]: Failed password for root from 222.186.31.83 port 42807 ssh2
...
2020-01-08 07:53:26

Recently Reported IPs

103.214.53.5 103.214.53.93 83.68.236.121 103.214.53.97
103.214.53.98 103.214.54.131 103.214.54.134 103.214.54.150
103.214.54.190 103.214.54.2 40.45.194.235 103.214.54.38
103.214.54.70 103.214.54.90 103.214.55.154 103.214.55.46
103.214.55.50 103.214.55.54 241.64.118.245 103.214.55.58