Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Afghanistan

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 103.41.8.142
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 21982
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;103.41.8.142.			IN	A

;; AUTHORITY SECTION:
.			600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022022501 1800 900 604800 86400

;; Query time: 24 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Feb 26 02:24:39 CST 2022
;; MSG SIZE  rcvd: 105
Host info
Host 142.8.41.103.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 142.8.41.103.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
187.178.173.161 attackspambots
Dec  7 01:08:57 webhost01 sshd[26656]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=187.178.173.161
Dec  7 01:08:59 webhost01 sshd[26656]: Failed password for invalid user busalacc from 187.178.173.161 port 60536 ssh2
...
2019-12-07 02:26:53
138.197.120.219 attackbots
Dec  6 16:17:00 mail1 sshd\[20105\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.197.120.219  user=news
Dec  6 16:17:01 mail1 sshd\[20105\]: Failed password for news from 138.197.120.219 port 50482 ssh2
Dec  6 16:27:32 mail1 sshd\[24744\]: Invalid user rpc from 138.197.120.219 port 49248
Dec  6 16:27:32 mail1 sshd\[24744\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.197.120.219
Dec  6 16:27:34 mail1 sshd\[24744\]: Failed password for invalid user rpc from 138.197.120.219 port 49248 ssh2
...
2019-12-07 02:10:39
167.71.133.157 attackbotsspam
2019-12-06T16:58:25.884528abusebot-3.cloudsearch.cf sshd\[1985\]: Invalid user ruddock from 167.71.133.157 port 57148
2019-12-07 02:16:18
117.149.164.157 attackspam
(Dec  6)  LEN=40 TOS=0x04 TTL=48 ID=20868 TCP DPT=8080 WINDOW=51477 SYN 
 (Dec  6)  LEN=40 TOS=0x04 TTL=50 ID=44872 TCP DPT=8080 WINDOW=51477 SYN 
 (Dec  5)  LEN=40 TOS=0x04 TTL=48 ID=36087 TCP DPT=8080 WINDOW=8582 SYN 
 (Dec  5)  LEN=40 TOS=0x04 TTL=49 ID=51019 TCP DPT=8080 WINDOW=51477 SYN 
 (Dec  5)  LEN=40 TOS=0x04 TTL=49 ID=59954 TCP DPT=8080 WINDOW=8582 SYN 
 (Dec  3)  LEN=40 TOS=0x04 TTL=50 ID=38978 TCP DPT=8080 WINDOW=8582 SYN 
 (Dec  3)  LEN=40 TOS=0x04 TTL=50 ID=28080 TCP DPT=8080 WINDOW=8582 SYN 
 (Dec  3)  LEN=40 TOS=0x04 TTL=48 ID=52818 TCP DPT=8080 WINDOW=51477 SYN 
 (Dec  2)  LEN=40 TOS=0x04 TTL=50 ID=21838 TCP DPT=8080 WINDOW=51477 SYN
2019-12-07 01:54:35
168.121.103.126 attackspambots
Telnet/23 MH Probe, BF, Hack -
2019-12-07 02:25:44
185.234.216.144 attackspam
smtp attack
2019-12-07 02:27:29
111.119.178.147 attackbotsspam
111.119.178.147 - - \[06/Dec/2019:15:48:30 +0100\] "POST /wp-login.php HTTP/1.0" 200 7524 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0"
111.119.178.147 - - \[06/Dec/2019:15:48:36 +0100\] "POST /wp-login.php HTTP/1.0" 200 7391 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0"
111.119.178.147 - - \[06/Dec/2019:15:48:41 +0100\] "POST /wp-login.php HTTP/1.0" 200 7387 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0"
2019-12-07 01:52:11
183.82.2.251 attackspam
Brute-force attempt banned
2019-12-07 02:17:39
177.138.49.58 attackspambots
Telnet/23 MH Probe, BF, Hack -
2019-12-07 02:22:36
46.43.49.90 attack
Dec  6 18:17:39 lnxweb61 sshd[2294]: Failed password for root from 46.43.49.90 port 55113 ssh2
Dec  6 18:27:14 lnxweb61 sshd[10344]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=46.43.49.90
Dec  6 18:27:16 lnxweb61 sshd[10344]: Failed password for invalid user bot from 46.43.49.90 port 51672 ssh2
2019-12-07 01:57:47
45.125.66.184 attack
Dec  6 11:35:52 web1 postfix/smtpd[8167]: warning: unknown[45.125.66.184]: SASL LOGIN authentication failed: authentication failure
...
2019-12-07 02:16:48
159.65.111.89 attackspambots
Dec  6 14:48:25 l02a sshd[28309]: Invalid user sheik from 159.65.111.89
Dec  6 14:48:25 l02a sshd[28309]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.65.111.89 
Dec  6 14:48:25 l02a sshd[28309]: Invalid user sheik from 159.65.111.89
Dec  6 14:48:27 l02a sshd[28309]: Failed password for invalid user sheik from 159.65.111.89 port 34120 ssh2
2019-12-07 02:14:34
54.240.6.58 attack
Try access to SMTP/POP/IMAP server.
2019-12-07 02:19:33
122.51.159.172 attack
Unauthorized SSH login attempts
2019-12-07 02:02:55
141.98.10.70 attackspambots
2019-12-06 dovecot_login authenticator failed for \(User\) \[141.98.10.70\]: 535 Incorrect authentication data \(set_id=mail@**REMOVED**.**REMOVED**\)
2019-12-06 dovecot_login authenticator failed for \(User\) \[141.98.10.70\]: 535 Incorrect authentication data \(set_id=mail@**REMOVED**.**REMOVED**\)
2019-12-06 dovecot_login authenticator failed for \(User\) \[141.98.10.70\]: 535 Incorrect authentication data \(set_id=mail@**REMOVED**.**REMOVED**\)
2019-12-07 01:53:15

Recently Reported IPs

103.41.8.26 103.41.8.246 15.219.149.130 103.41.96.186
103.41.30.141 103.41.28.237 103.41.28.46 103.41.96.46
103.41.28.226 120.211.129.13 103.41.96.94 103.41.96.6
103.42.1.101 103.42.1.3 103.42.1.22 103.42.1.17
103.41.98.137 103.41.99.249 103.41.98.203 103.41.98.41