Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Jombang

Region: East Java

Country: Indonesia

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
IP Type Details Datetime
103.242.106.119 attack
Unauthorized connection attempt detected from IP address 103.242.106.119 to port 445 [T]
2020-08-14 02:50:40
103.242.106.139 attack
20/5/3@23:58:59: FAIL: Alarm-Network address from=103.242.106.139
...
2020-05-04 12:17:15
103.242.106.2 attackbotsspam
Feb 28 05:50:41 grey postfix/smtpd\[23504\]: NOQUEUE: reject: RCPT from unknown\[103.242.106.2\]: 554 5.7.1 Service unavailable\; Client host \[103.242.106.2\] blocked using bl.spamcop.net\; Blocked - see https://www.spamcop.net/bl.shtml\?103.242.106.2\; from=\ to=\ proto=ESMTP helo=\<\[103.242.106.2\]\>
...
2020-02-28 19:05:09
103.242.106.172 attackbots
Jan 15 04:39:27 XXXXXX sshd[55063]: Invalid user guest from 103.242.106.172 port 50849
2020-01-15 15:04:56
Whois info:
b
Dig info:

; <<>> DiG 9.10.3-P4-Ubuntu <<>> 103.242.106.149
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 38035
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;103.242.106.149.		IN	A

;; AUTHORITY SECTION:
.			198	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2020121100 1800 900 604800 86400

;; Query time: 21 msec
;; SERVER: 183.60.82.98#53(183.60.82.98)
;; WHEN: Sat Dec 12 01:49:34 CST 2020
;; MSG SIZE  rcvd: 119

Host info
Host 149.106.242.103.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 149.106.242.103.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
170.130.212.99 attack
2020-07-26 22:57:59.555410-0500  localhost smtpd[64643]: NOQUEUE: reject: RCPT from unknown[170.130.212.99]: 450 4.7.25 Client host rejected: cannot find your hostname, [170.130.212.99]; from= to= proto=ESMTP helo=
2020-07-27 12:15:52
196.6.103.2 attackbotsspam
Ban For 3 Days, Multiple Unauthorized connection attempt, error 401
2020-07-27 12:24:33
222.186.175.212 attack
Jul 27 07:19:43 ift sshd\[62370\]: Failed password for root from 222.186.175.212 port 21952 ssh2Jul 27 07:19:47 ift sshd\[62370\]: Failed password for root from 222.186.175.212 port 21952 ssh2Jul 27 07:19:58 ift sshd\[62370\]: Failed password for root from 222.186.175.212 port 21952 ssh2Jul 27 07:20:12 ift sshd\[62627\]: Failed password for root from 222.186.175.212 port 25712 ssh2Jul 27 07:20:47 ift sshd\[62693\]: Failed password for root from 222.186.175.212 port 24558 ssh2
...
2020-07-27 12:26:16
106.52.96.247 attack
Invalid user ftpuser from 106.52.96.247 port 55172
2020-07-27 08:17:03
150.109.115.108 attackbotsspam
Jul 26 21:15:52 dignus sshd[10943]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=150.109.115.108
Jul 26 21:15:54 dignus sshd[10943]: Failed password for invalid user chris from 150.109.115.108 port 36468 ssh2
Jul 26 21:19:29 dignus sshd[11442]: Invalid user work from 150.109.115.108 port 37492
Jul 26 21:19:29 dignus sshd[11442]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=150.109.115.108
Jul 26 21:19:30 dignus sshd[11442]: Failed password for invalid user work from 150.109.115.108 port 37492 ssh2
...
2020-07-27 12:20:02
122.52.48.92 attackspam
Scanned 3 times in the last 24 hours on port 22
2020-07-27 08:16:43
222.186.171.247 attack
$f2bV_matches
2020-07-27 08:17:19
113.125.132.53 attackbots
Jul 26 23:56:36 Tower sshd[9351]: Connection from 113.125.132.53 port 33918 on 192.168.10.220 port 22 rdomain ""
Jul 26 23:56:38 Tower sshd[9351]: Invalid user gg from 113.125.132.53 port 33918
Jul 26 23:56:38 Tower sshd[9351]: error: Could not get shadow information for NOUSER
Jul 26 23:56:38 Tower sshd[9351]: Failed password for invalid user gg from 113.125.132.53 port 33918 ssh2
Jul 26 23:56:39 Tower sshd[9351]: Received disconnect from 113.125.132.53 port 33918:11: Bye Bye [preauth]
Jul 26 23:56:39 Tower sshd[9351]: Disconnected from invalid user gg 113.125.132.53 port 33918 [preauth]
2020-07-27 12:24:50
167.71.237.144 attackspambots
Jul 27 05:51:38 eventyay sshd[17189]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.71.237.144
Jul 27 05:51:40 eventyay sshd[17189]: Failed password for invalid user burian from 167.71.237.144 port 50668 ssh2
Jul 27 05:56:36 eventyay sshd[17358]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.71.237.144
...
2020-07-27 12:28:18
88.22.118.244 attackbotsspam
Jul 27 00:08:36 ny01 sshd[28963]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=88.22.118.244
Jul 27 00:08:38 ny01 sshd[28963]: Failed password for invalid user rb from 88.22.118.244 port 51340 ssh2
Jul 27 00:12:34 ny01 sshd[29809]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=88.22.118.244
2020-07-27 12:15:10
152.231.140.150 attackbotsspam
SSH brute force
2020-07-27 08:18:16
222.186.190.14 attackbots
Jul 27 09:23:30 gw1 sshd[26089]: Failed password for root from 222.186.190.14 port 27837 ssh2
...
2020-07-27 12:31:38
195.142.104.101 attack
27.07.2020 05:57:03 - RDP Login Fail Detected by 
https://www.elinox.de/RDP-Wächter
2020-07-27 12:10:44
222.186.30.57 attackbotsspam
SSH Bruteforce Attempt on Honeypot
2020-07-27 12:23:57
63.82.55.38 attack
E-Mail Spam (RBL) [REJECTED]
2020-07-27 08:18:41

Recently Reported IPs

1.53.199.95 111.90.150.04 83.36.38.152 87.123.201.41
78.119.108.189 18.214.186.11 23.7.202.241 174.129.124.7
172.250.102.188 37.154.102.118 109.94.160.0 185.200.108.252
183.81.156.154 196.54.16.164 46.114.33.115 77.205.142.81
64.19.74.158 174.21.130.203 58.234.219.22 146.247.255.178