Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Mongolia

Internet Service Provider: unknown

Hostname: unknown

Organization: Mongolia Telecom

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
IP Type Details Datetime
103.242.47.46 attackbots
Unauthorized connection attempt detected from IP address 103.242.47.46 to port 445 [T]
2020-04-29 18:36:19
103.242.47.66 attackspam
Port 1433 Scan
2020-02-07 03:26:02
103.242.47.246 attackspam
Unauthorized IMAP connection attempt
2020-01-23 08:30:43
Whois info:
b
Dig info:

; <<>> DiG 9.10.3-P4-Ubuntu <<>> 103.242.47.42
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 34799
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;103.242.47.42.			IN	A

;; AUTHORITY SECTION:
.			3600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019050401 1800 900 604800 86400

;; Query time: 315 msec
;; SERVER: 67.207.67.3#53(67.207.67.3)
;; WHEN: Sun May 05 02:10:24 +08 2019
;; MSG SIZE  rcvd: 117

Host info
42.47.242.103.in-addr.arpa domain name pointer brbnd47-42.mng.net.
Nslookup info:
Server:		67.207.67.3
Address:	67.207.67.3#53

Non-authoritative answer:
42.47.242.103.in-addr.arpa	name = brbnd47-42.mng.net.

Authoritative answers can be found from:

Related IP info:
Related comments:
IP Type Details Datetime
200.252.29.130 attackspam
Bruteforce detected by fail2ban
2020-10-07 07:06:45
143.110.184.96 attackspambots
SP-Scan 58145:3389 detected 2020.10.05 19:37:45
blocked until 2020.11.24 11:40:32
2020-10-07 07:21:07
159.89.53.183 attackbotsspam
Port Scan
...
2020-10-07 07:01:42
125.87.84.242 attackbotsspam
Oct  6 04:27:51 w sshd[24634]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=125.87.84.242  user=r.r
Oct  6 04:27:53 w sshd[24634]: Failed password for r.r from 125.87.84.242 port 47995 ssh2
Oct  6 04:28:01 w sshd[24634]: Received disconnect from 125.87.84.242 port 47995:11: Bye Bye [preauth]
Oct  6 04:28:01 w sshd[24634]: Disconnected from 125.87.84.242 port 47995 [preauth]
Oct  6 04:33:34 w sshd[24657]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=125.87.84.242  user=r.r


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=125.87.84.242
2020-10-07 07:03:47
102.47.62.246 attackspam
Port probing on unauthorized port 23
2020-10-07 07:15:58
58.209.197.206 attackbots
$f2bV_matches
2020-10-07 07:23:55
222.186.42.213 attack
Oct  6 20:13:15 shivevps sshd[1379]: Failed password for root from 222.186.42.213 port 12356 ssh2
Oct  6 20:13:22 shivevps sshd[1381]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.42.213  user=root
Oct  6 20:13:24 shivevps sshd[1381]: Failed password for root from 222.186.42.213 port 55737 ssh2
...
2020-10-07 07:18:20
106.13.215.17 attackspam
"fail2ban match"
2020-10-07 07:04:18
161.35.61.129 attackspambots
[N3.H3.VM3] Port Scanner Detected Blocked by UFW
2020-10-07 06:57:57
179.252.114.253 attack
Unauthorized connection attempt from IP address 179.252.114.253 on Port 445(SMB)
2020-10-07 07:17:00
176.113.115.214 attackbotsspam
Scanning unused Default website or suspicious access to valid sites from IP marked as abusive
2020-10-07 07:00:47
134.101.138.47 attackbots
Oct  5 22:38:37 alaska sshd[29486]: refused connect from 134.101.138.47 (134.101.138.47)
Oct  5 22:38:43 alaska sshd[29496]: refused connect from 134.101.138.47 (134.101.138.47)
Oct  5 22:38:48 alaska sshd[29506]: refused connect from 134.101.138.47 (134.101.138.47)
Oct  5 22:38:53 alaska sshd[29527]: refused connect from 134.101.138.47 (134.101.138.47)
Oct  5 22:38:59 alaska sshd[29537]: refused connect from 134.101.138.47 (134.101.138.47)


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=134.101.138.47
2020-10-07 07:31:13
139.219.11.254 attackspambots
2020-10-07T04:24:28.732143billing sshd[11343]: Failed password for root from 139.219.11.254 port 58792 ssh2
2020-10-07T04:29:16.495199billing sshd[22178]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.219.11.254  user=root
2020-10-07T04:29:18.811131billing sshd[22178]: Failed password for root from 139.219.11.254 port 60970 ssh2
...
2020-10-07 07:24:26
109.73.42.146 attack
20/10/5@16:41:06: FAIL: Alarm-Network address from=109.73.42.146
...
2020-10-07 07:26:11
52.163.127.48 attackspambots
2020-10-06T06:24:23.065268hostname sshd[130367]: Failed password for root from 52.163.127.48 port 48552 ssh2
...
2020-10-07 07:36:22

Recently Reported IPs

41.51.227.215 3.202.208.97 76.233.78.31 83.9.105.109
2.20.217.110 2400:4a00:a000:0:a9e:1ff:fe41:348c 80.189.177.52 103.136.42.61
112.160.217.138 45.72.175.208 103.94.76.20 113.188.167.132
38.138.41.242 62.173.148.50 83.138.175.183 190.112.224.132
189.6.44.224 211.108.130.72 165.49.129.156 52.57.194.190