Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Viet Nam

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 103.63.121.42
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 35121
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;103.63.121.42.			IN	A

;; AUTHORITY SECTION:
.			599	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022011001 1800 900 604800 86400

;; Query time: 17 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Jan 11 02:19:20 CST 2022
;; MSG SIZE  rcvd: 106
Host info
42.121.63.103.in-addr.arpa domain name pointer static.cmcti.vn.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
42.121.63.103.in-addr.arpa	name = static.cmcti.vn.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
205.185.113.140 attack
SSH Brute-Forcing (server2)
2020-07-11 07:41:52
222.186.190.2 attackbotsspam
Jul 10 16:42:03 dignus sshd[21427]: Failed password for root from 222.186.190.2 port 64232 ssh2
Jul 10 16:42:06 dignus sshd[21427]: Failed password for root from 222.186.190.2 port 64232 ssh2
Jul 10 16:42:10 dignus sshd[21427]: Failed password for root from 222.186.190.2 port 64232 ssh2
Jul 10 16:42:13 dignus sshd[21427]: Failed password for root from 222.186.190.2 port 64232 ssh2
Jul 10 16:42:17 dignus sshd[21427]: Failed password for root from 222.186.190.2 port 64232 ssh2
...
2020-07-11 07:44:06
161.35.40.86 attackspam
(sshd) Failed SSH login from 161.35.40.86 (GB/United Kingdom/-): 5 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: Jul 10 22:59:27 amsweb01 sshd[18342]: Invalid user sida from 161.35.40.86 port 37116
Jul 10 22:59:30 amsweb01 sshd[18342]: Failed password for invalid user sida from 161.35.40.86 port 37116 ssh2
Jul 10 23:10:43 amsweb01 sshd[20486]: Invalid user laouwayi from 161.35.40.86 port 58760
Jul 10 23:10:45 amsweb01 sshd[20486]: Failed password for invalid user laouwayi from 161.35.40.86 port 58760 ssh2
Jul 10 23:13:37 amsweb01 sshd[20884]: Invalid user wpuser from 161.35.40.86 port 55742
2020-07-11 08:02:41
114.242.153.10 attackbotsspam
odoo8
...
2020-07-11 07:57:22
68.183.35.255 attack
SSH brute force
2020-07-11 07:59:21
114.4.227.194 attack
SSH Invalid Login
2020-07-11 07:23:40
112.85.42.180 attack
Jul 10 22:38:14 rush sshd[30171]: Failed password for root from 112.85.42.180 port 32286 ssh2
Jul 10 22:38:27 rush sshd[30171]: error: maximum authentication attempts exceeded for root from 112.85.42.180 port 32286 ssh2 [preauth]
Jul 10 22:38:34 rush sshd[30173]: Failed password for root from 112.85.42.180 port 48840 ssh2
...
2020-07-11 07:28:11
23.98.71.97 attack
Invalid user mi from 23.98.71.97 port 1024
2020-07-11 07:46:41
47.91.165.233 attackbots
Attempt to hack Wordpress Login, XMLRPC or other login
2020-07-11 07:34:08
201.184.183.26 attack
SSH bruteforce
2020-07-11 07:37:45
71.66.216.3 attack
Hit honeypot r.
2020-07-11 07:48:14
212.70.149.50 attackbots
Rude login attack (530 tries in 1d)
2020-07-11 07:54:53
122.152.213.85 attackbotsspam
Jul 10 04:46:33 Tower sshd[38766]: refused connect from 220.123.241.30 (220.123.241.30)
Jul 10 18:44:08 Tower sshd[38766]: Connection from 122.152.213.85 port 56828 on 192.168.10.220 port 22 rdomain ""
Jul 10 18:44:09 Tower sshd[38766]: Invalid user oracle from 122.152.213.85 port 56828
Jul 10 18:44:09 Tower sshd[38766]: error: Could not get shadow information for NOUSER
Jul 10 18:44:09 Tower sshd[38766]: Failed password for invalid user oracle from 122.152.213.85 port 56828 ssh2
Jul 10 18:44:10 Tower sshd[38766]: Received disconnect from 122.152.213.85 port 56828:11: Bye Bye [preauth]
Jul 10 18:44:10 Tower sshd[38766]: Disconnected from invalid user oracle 122.152.213.85 port 56828 [preauth]
2020-07-11 08:00:24
106.12.210.77 attackbotsspam
Jul 10 22:48:32 scw-6657dc sshd[15380]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.210.77
Jul 10 22:48:32 scw-6657dc sshd[15380]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.210.77
Jul 10 22:48:34 scw-6657dc sshd[15380]: Failed password for invalid user liuhuan from 106.12.210.77 port 37466 ssh2
...
2020-07-11 07:24:37
68.175.104.100 attackbotsspam
port scan and connect, tcp 23 (telnet)
2020-07-11 07:57:42

Recently Reported IPs

105.225.220.233 2.14.148.99 23.250.15.126 244.181.222.255
107.32.137.105 21.227.184.160 125.64.143.198 122.186.142.140
211.138.61.169 11.90.150.227 255.101.161.160 9.167.44.117
158.89.42.58 136.141.32.75 243.18.199.14 187.79.186.214
154.146.41.193 140.153.143.226 162.48.195.117 138.128.0.255