Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Japan

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
% [whois.apnic.net]
% Whois data copyright terms    http://www.apnic.net/db/dbcopyright.html

% Information related to '103.25.103.0 - 103.25.103.255'

% Abuse contact for '103.25.103.0 - 103.25.103.255' is 'support@global-na.net'

inetnum:        103.25.103.0 - 103.25.103.255
netname:        NTT_Communications_Corporation
descr:          NTT Communications Corporation
country:        JP
admin-c:        SM1178-AP
tech-c:         SM1178-AP
abuse-c:        SM1178-AP
status:         ALLOCATED NON-PORTABLE
mnt-by:         MAINT-GLOBAL-NA-JP
mnt-irt:        IRT-GLOBAL-NA-JP
last-modified:  2026-04-05T11:13:40Z
remarks:        For SPAM/ABUSE Issue:info@zlidc.net
source:         APNIC

irt:            IRT-GLOBAL-NA-JP
address:        Mimoza-Building 3F Minami-Ootsuka2-11-10 Toshima-ku Tokyo Japan 170-0005
e-mail:         support@global-na.net
abuse-mailbox:  support@global-na.net
admin-c:        GNAI1-AP
tech-c:         GNAI1-AP
auth:           # Filtered
remarks:        support@global-na.net was validated on 2025-12-30
mnt-by:         MAINT-GLOBAL-NA-JP
last-modified:  2025-12-30T14:10:44Z
source:         APNIC

person:         Sachie Mochimaru
address:        Mimoza-Building 3F Minami-Ootsuka2-11-10, Toshima-ku Tokyo 170-0005
country:        JP
phone:          +81-3-6682-5901
e-mail:         sachie.mochimaru@global-na.net
nic-hdl:        SM1178-AP
abuse-mailbox:  abuse@global-na.net
mnt-by:         MAINT-GLOBAL-NA-JP
last-modified:  2015-06-15T07:23:19Z
source:         APNIC

% Information related to '103.25.103.0/24AS148996'

route:          103.25.103.0/24
origin:         AS148996
descr:          Global Network Agency Inc.
                Mimoza-Building 3F Minami-Ootsuka2-11-10
mnt-by:         MAINT-GLOBAL-NA-JP
last-modified:  2025-11-04T08:00:24Z
source:         APNIC

% Information related to '103.25.103.0/24AS23532'

route:          103.25.103.0/24
origin:         AS23532
descr:          Global Network Agency Inc.
                Mimoza-Building 3F Minami-Ootsuka2-11-10
mnt-by:         MAINT-GLOBAL-NA-JP
last-modified:  2025-11-10T00:57:26Z
source:         APNIC

% Information related to '103.25.103.0/24AS2914'

route:          103.25.103.0/24
origin:         AS2914
descr:          NTT Communications Corporation
mnt-by:         MAINT-GLOBAL-NA-JP
last-modified:  2026-04-05T11:31:10Z
source:         APNIC

% Information related to '103.25.103.0/24AS400342'

route:          103.25.103.0/24
origin:         AS400342
descr:          Global Network Agency Inc.
                Mimoza-Building 3F Minami-Ootsuka2-11-10
mnt-by:         MAINT-GLOBAL-NA-JP
last-modified:  2025-11-10T00:57:06Z
source:         APNIC

% This query was served by the APNIC Whois Service version 1.88.48 (WHOIS-AU5)
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 103.25.103.252
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 44818
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;103.25.103.252.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2026042600 1800 900 604800 86400

;; Query time: 8 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Apr 26 22:07:47 CST 2026
;; MSG SIZE  rcvd: 107
Host info
b'Host 252.103.25.103.in-addr.arpa not found: 2(SERVFAIL)
'
Nslookup info:
server can't find 103.25.103.252.in-addr.arpa: SERVFAIL
Related IP info:
Related comments:
IP Type Details Datetime
91.146.131.31 attackspambots
23/tcp
[2020-09-30]1pkt
2020-10-01 13:03:44
120.53.12.94 attackspambots
Sep 30 21:25:59 ws22vmsma01 sshd[114773]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=120.53.12.94
Sep 30 21:26:01 ws22vmsma01 sshd[114773]: Failed password for invalid user ruser from 120.53.12.94 port 60874 ssh2
...
2020-10-01 12:55:57
178.62.50.201 attackspam
$f2bV_matches
2020-10-01 12:57:08
189.90.114.37 attack
Sep 30 20:41:05 staging sshd[159079]: Invalid user git from 189.90.114.37 port 27425
Sep 30 20:41:05 staging sshd[159079]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=189.90.114.37 
Sep 30 20:41:05 staging sshd[159079]: Invalid user git from 189.90.114.37 port 27425
Sep 30 20:41:07 staging sshd[159079]: Failed password for invalid user git from 189.90.114.37 port 27425 ssh2
...
2020-10-01 13:20:19
119.187.233.240 attackspambots
23/tcp
[2020-09-30]1pkt
2020-10-01 12:48:04
175.142.188.174 attackbotsspam
20/9/30@16:41:03: FAIL: IoT-Telnet address from=175.142.188.174
...
2020-10-01 13:24:51
115.97.80.9 attackbotsspam
Portscan detected
2020-10-01 13:15:24
106.53.127.49 attack
(sshd) Failed SSH login from 106.53.127.49 (CN/China/-): 5 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: Oct  1 00:36:23 optimus sshd[6884]: Invalid user anita from 106.53.127.49
Oct  1 00:36:23 optimus sshd[6884]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.53.127.49 
Oct  1 00:36:26 optimus sshd[6884]: Failed password for invalid user anita from 106.53.127.49 port 38960 ssh2
Oct  1 00:41:21 optimus sshd[8595]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.53.127.49  user=root
Oct  1 00:41:24 optimus sshd[8595]: Failed password for root from 106.53.127.49 port 33860 ssh2
2020-10-01 13:18:09
192.143.64.73 attackbotsspam
Lines containing failures of 192.143.64.73
Sep 30 22:28:20 shared11 sshd[8297]: Did not receive identification string from 192.143.64.73 port 54782
Sep 30 22:28:24 shared11 sshd[8305]: Invalid user system from 192.143.64.73 port 55109
Sep 30 22:28:28 shared11 sshd[8305]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=192.143.64.73
Sep 30 22:28:30 shared11 sshd[8305]: Failed password for invalid user system from 192.143.64.73 port 55109 ssh2


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=192.143.64.73
2020-10-01 12:51:10
95.9.158.113 attack
445/tcp
[2020-09-30]1pkt
2020-10-01 13:01:49
89.22.23.155 attackbots
445/tcp
[2020-09-30]1pkt
2020-10-01 12:53:43
190.207.172.55 attack
445/tcp 445/tcp
[2020-09-30]2pkt
2020-10-01 13:04:41
139.155.39.22 attackbots
2020-10-01 02:45:36,042 fail2ban.actions: WARNING [ssh] Ban 139.155.39.22
2020-10-01 12:49:09
51.13.64.82 attackspambots
[N3.H3.VM3] Port Scanner Detected Blocked by UFW
2020-10-01 13:08:22
175.0.164.136 attackspambots
ssh brute force
2020-10-01 12:55:40

Recently Reported IPs

223.160.232.206 205.185.116.229 110.78.158.88 2606:4700:10::6816:4548
94.103.57.94 207.181.1.174 125.124.228.141 124.131.0.243
213.180.203.21 175.150.7.80 20.111.57.15 203.88.204.212
38.248.95.254 104.236.111.168 2606:4700:10::6814:7181 66.132.172.34
66.132.195.32 2606:4700:10::6816:4323 64.89.160.132 165.227.34.92