Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Hong Kong

Internet Service Provider: RMP Protection Limited.

Hostname: unknown

Organization: unknown

Usage Type: Data Center/Web Hosting/Transit

Comments:
Type Details Datetime
attackspam
Dec 17 00:55:43 mercury smtpd[1197]: 239b4f231ab71666 smtp event=failed-command address=103.253.42.5 host=103.253.42.5 command="AUTH LOGIN" result="503 5.5.1 Invalid command: Command not supported"
...
2020-03-04 02:45:11
Comments on same subnet:
IP Type Details Datetime
103.253.42.54 attackspambots
2020-10-11 22:32:08 auth_plain authenticator failed for (User) [103.253.42.54]: 535 Incorrect authentication data (set_id=valdemar)
2020-10-11 22:41:28 auth_plain authenticator failed for (User) [103.253.42.54]: 535 Incorrect authentication data (set_id=it)
...
2020-10-12 04:40:30
103.253.42.54 attackspambots
Oct 11 13:05:13 mail postfix/smtpd\[20056\]: warning: unknown\[103.253.42.54\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6\
Oct 11 13:14:20 mail postfix/smtpd\[20336\]: warning: unknown\[103.253.42.54\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6\
Oct 11 13:23:38 mail postfix/smtpd\[20476\]: warning: unknown\[103.253.42.54\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6\
Oct 11 14:00:26 mail postfix/smtpd\[21780\]: warning: unknown\[103.253.42.54\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6\
2020-10-11 20:43:40
103.253.42.54 attack
Oct 11 05:34:29 mail postfix/smtpd\[4382\]: warning: unknown\[103.253.42.54\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6\
Oct 11 05:43:42 mail postfix/smtpd\[4743\]: warning: unknown\[103.253.42.54\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6\
Oct 11 06:19:19 mail postfix/smtpd\[5718\]: warning: unknown\[103.253.42.54\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6\
Oct 11 06:28:23 mail postfix/smtpd\[6058\]: warning: unknown\[103.253.42.54\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6\
2020-10-11 12:40:42
103.253.42.54 attackspambots
Rude login attack (140 tries in 1d)
2020-10-11 06:03:31
103.253.42.54 attack
Oct  9 17:55:26 mail postfix/smtpd\[24164\]: warning: unknown\[103.253.42.54\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6\
Oct  9 18:34:12 mail postfix/smtpd\[25529\]: warning: unknown\[103.253.42.54\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6\
Oct  9 18:43:37 mail postfix/smtpd\[25889\]: warning: unknown\[103.253.42.54\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6\
Oct  9 18:52:52 mail postfix/smtpd\[25491\]: warning: unknown\[103.253.42.54\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6\
2020-10-10 01:30:48
103.253.42.54 attackbotsspam
Oct  9 10:09:26 mail postfix/smtpd\[6559\]: warning: unknown\[103.253.42.54\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6\
Oct  9 10:18:48 mail postfix/smtpd\[6347\]: warning: unknown\[103.253.42.54\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6\
Oct  9 10:28:08 mail postfix/smtpd\[7298\]: warning: unknown\[103.253.42.54\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6\
Oct  9 11:05:22 mail postfix/smtpd\[8555\]: warning: unknown\[103.253.42.54\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6\
2020-10-09 17:15:40
103.253.42.54 attackbots
Rude login attack (149 tries in 1d)
2020-10-08 07:10:25
103.253.42.54 attackspam
Oct  7 16:26:20 mail postfix/smtpd\[9111\]: warning: unknown\[103.253.42.54\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6\
Oct  7 16:35:37 mail postfix/smtpd\[9632\]: warning: unknown\[103.253.42.54\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6\
Oct  7 16:44:47 mail postfix/smtpd\[9811\]: warning: unknown\[103.253.42.54\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6\
Oct  7 17:21:50 mail postfix/smtpd\[10924\]: warning: unknown\[103.253.42.54\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6\
2020-10-07 23:35:42
103.253.42.54 attack
Oct  7 08:42:28 mail postfix/smtpd\[22798\]: warning: unknown\[103.253.42.54\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6\
Oct  7 08:51:36 mail postfix/smtpd\[23474\]: warning: unknown\[103.253.42.54\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6\
Oct  7 09:28:53 mail postfix/smtpd\[25061\]: warning: unknown\[103.253.42.54\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6\
Oct  7 09:38:13 mail postfix/smtpd\[25256\]: warning: unknown\[103.253.42.54\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6\
2020-10-07 15:40:31
103.253.42.54 attackspambots
2020-10-05T19:24:44.787021beta postfix/smtpd[16684]: warning: unknown[103.253.42.54]: SASL LOGIN authentication failed: authentication failure
2020-10-05T19:34:10.688492beta postfix/smtpd[16820]: warning: unknown[103.253.42.54]: SASL LOGIN authentication failed: authentication failure
2020-10-05T19:43:34.019721beta postfix/smtpd[16888]: warning: unknown[103.253.42.54]: SASL LOGIN authentication failed: authentication failure
...
2020-10-06 03:00:43
103.253.42.54 attackbots
Oct  5 11:41:28 mail postfix/smtpd\[26937\]: warning: unknown\[103.253.42.54\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6\
Oct  5 12:18:33 mail postfix/smtpd\[28287\]: warning: unknown\[103.253.42.54\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6\
Oct  5 12:27:52 mail postfix/smtpd\[28565\]: warning: unknown\[103.253.42.54\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6\
Oct  5 12:37:22 mail postfix/smtpd\[28828\]: warning: unknown\[103.253.42.54\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6\
2020-10-05 18:51:12
103.253.42.58 attackbotsspam
RDPBruteCAu
2020-10-04 02:39:26
103.253.42.58 attack
RDPBruteCAu
2020-10-03 18:28:13
103.253.42.54 attackbots
$f2bV_matches
2020-10-02 06:03:00
103.253.42.54 attack
2020-10-01T14:41:45.621554beta postfix/smtpd[22559]: warning: unknown[103.253.42.54]: SASL LOGIN authentication failed: authentication failure
2020-10-01T14:50:32.516934beta postfix/smtpd[22680]: warning: unknown[103.253.42.54]: SASL LOGIN authentication failed: authentication failure
2020-10-01T14:59:33.314648beta postfix/smtpd[22765]: warning: unknown[103.253.42.54]: SASL LOGIN authentication failed: authentication failure
...
2020-10-01 22:26:05
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 103.253.42.5
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 8707
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;103.253.42.5.			IN	A

;; AUTHORITY SECTION:
.			416	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2020030300 1800 900 604800 86400

;; Query time: 181 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Mar 04 02:45:05 CST 2020
;; MSG SIZE  rcvd: 116
Host info
Host 5.42.253.103.in-addr.arpa not found: 2(SERVFAIL)
Nslookup info:
;; Got SERVFAIL reply from 100.100.2.138, trying next server
;; Got SERVFAIL reply from 100.100.2.138, trying next server
Server:		100.100.2.136
Address:	100.100.2.136#53

** server can't find 5.42.253.103.in-addr.arpa: SERVFAIL

Related IP info:
Related comments:
IP Type Details Datetime
45.142.195.5 attack
Sep 22 00:35:45 webserver postfix/smtpd\[10956\]: warning: unknown\[45.142.195.5\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Sep 22 00:36:53 webserver postfix/smtpd\[10956\]: warning: unknown\[45.142.195.5\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Sep 22 00:38:03 webserver postfix/smtpd\[7152\]: warning: unknown\[45.142.195.5\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Sep 22 00:39:15 webserver postfix/smtpd\[10956\]: warning: unknown\[45.142.195.5\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Sep 22 00:40:24 webserver postfix/smtpd\[11291\]: warning: unknown\[45.142.195.5\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
...
2019-09-22 06:51:29
37.193.108.101 attackbots
Sep 21 12:57:29 tdfoods sshd\[28722\]: Invalid user adm from 37.193.108.101
Sep 21 12:57:29 tdfoods sshd\[28722\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=l37-193-108-101.novotelecom.ru
Sep 21 12:57:30 tdfoods sshd\[28722\]: Failed password for invalid user adm from 37.193.108.101 port 17644 ssh2
Sep 21 13:02:01 tdfoods sshd\[29121\]: Invalid user tarmo from 37.193.108.101
Sep 21 13:02:01 tdfoods sshd\[29121\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=l37-193-108-101.novotelecom.ru
2019-09-22 07:10:07
211.157.189.54 attack
Sep 22 00:34:04 MK-Soft-VM4 sshd[26911]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=211.157.189.54 
Sep 22 00:34:06 MK-Soft-VM4 sshd[26911]: Failed password for invalid user s0931 from 211.157.189.54 port 48336 ssh2
...
2019-09-22 07:06:28
106.12.90.250 attack
F2B jail: sshd. Time: 2019-09-22 00:45:15, Reported by: VKReport
2019-09-22 06:55:39
5.39.67.11 attackbotsspam
Sep 22 00:49:53 SilenceServices sshd[5450]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=5.39.67.11
Sep 22 00:49:53 SilenceServices sshd[5451]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=5.39.67.11
2019-09-22 06:50:07
5.101.140.227 attackspambots
Sep 21 19:13:07 ny01 sshd[15453]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=5.101.140.227
Sep 21 19:13:08 ny01 sshd[15453]: Failed password for invalid user map from 5.101.140.227 port 54412 ssh2
Sep 21 19:17:43 ny01 sshd[16577]: Failed password for root from 5.101.140.227 port 40440 ssh2
2019-09-22 07:17:45
91.194.211.40 attack
Sep 21 23:34:26 fr01 sshd[30508]: Invalid user zn from 91.194.211.40
Sep 21 23:34:26 fr01 sshd[30508]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=91.194.211.40
Sep 21 23:34:26 fr01 sshd[30508]: Invalid user zn from 91.194.211.40
Sep 21 23:34:29 fr01 sshd[30508]: Failed password for invalid user zn from 91.194.211.40 port 48530 ssh2
...
2019-09-22 06:43:30
158.69.113.76 attackspam
detected by Fail2Ban
2019-09-22 06:46:15
156.202.148.73 attackbotsspam
scan z
2019-09-22 06:44:56
103.45.99.214 attackspambots
Sep 22 00:59:13 dedicated sshd[24249]: Invalid user gp from 103.45.99.214 port 34962
2019-09-22 07:01:45
77.92.125.16 attack
47 failed attempt(s) in the last 24h
2019-09-22 06:59:20
222.186.175.6 attack
Sep 22 00:55:46 vpn01 sshd\[2558\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.175.6  user=root
Sep 22 00:55:48 vpn01 sshd\[2558\]: Failed password for root from 222.186.175.6 port 38082 ssh2
Sep 22 00:56:04 vpn01 sshd\[2558\]: Failed password for root from 222.186.175.6 port 38082 ssh2
2019-09-22 06:58:27
222.186.180.21 attack
2019-09-22T05:42:28.618981enmeeting.mahidol.ac.th sshd\[10430\]: User root from 222.186.180.21 not allowed because not listed in AllowUsers
2019-09-22T05:42:29.878553enmeeting.mahidol.ac.th sshd\[10430\]: Failed none for invalid user root from 222.186.180.21 port 59010 ssh2
2019-09-22T05:42:31.246323enmeeting.mahidol.ac.th sshd\[10430\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.180.21  user=root
...
2019-09-22 06:45:51
185.53.88.92 attack
\[2019-09-21 18:51:03\] SECURITY\[2283\] res_security_log.c: SecurityEvent="FailedACL",EventTV="2019-09-21T18:51:03.388-0400",Severity="Error",Service="SIP",EventVersion="1",AccountID="9011441603976936",SessionID="0x7fcd8c00c098",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/185.53.88.92/58448",ACLName="no_extension_match"
\[2019-09-21 18:53:56\] SECURITY\[2283\] res_security_log.c: SecurityEvent="FailedACL",EventTV="2019-09-21T18:53:56.451-0400",Severity="Error",Service="SIP",EventVersion="1",AccountID="011441603976936",SessionID="0x7fcd8c1b16c8",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/185.53.88.92/60618",ACLName="no_extension_match"
\[2019-09-21 18:56:36\] SECURITY\[2283\] res_security_log.c: SecurityEvent="FailedACL",EventTV="2019-09-21T18:56:36.712-0400",Severity="Error",Service="SIP",EventVersion="1",AccountID="9011441603976936",SessionID="0x7fcd8c1b16c8",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/185.53.88.92/52851",ACLName="no_exte
2019-09-22 07:13:20
217.182.73.36 attackspam
fail2ban honeypot
2019-09-22 07:14:50

Recently Reported IPs

105.12.2.92 103.12.161.196 49.145.235.132 171.35.172.44
132.144.178.222 162.223.226.188 115.216.56.39 47.103.9.234
115.207.107.147 101.51.59.228 95.47.49.250 208.33.226.110
103.136.43.174 49.235.21.109 45.183.172.20 103.119.141.203
103.100.83.238 101.108.4.36 105.108.229.177 103.216.2.202