Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: India

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
IP Type Details Datetime
103.70.145.215 attack
May  7 13:55:53 mail.srvfarm.net postfix/smtpd[882593]: NOQUEUE: reject: RCPT from unknown[103.70.145.215]: 554 5.7.1 Service unavailable; Client host [103.70.145.215] blocked using bl.spamcop.net; Blocked - see https://www.spamcop.net/bl.shtml?103.70.145.215; from= to= proto=ESMTP helo=
May  7 13:55:54 mail.srvfarm.net postfix/smtpd[882593]: NOQUEUE: reject: RCPT from unknown[103.70.145.215]: 554 5.7.1 Service unavailable; Client host [103.70.145.215] blocked using bl.spamcop.net; Blocked - see https://www.spamcop.net/bl.shtml?103.70.145.215; from= to= proto=ESMTP helo=
May  7 13:55:55 mail.srvfarm.net postfix/smtpd[882593]: NOQUEUE: reject: RCPT from unknown[103.70.145.215]: 554 5.7.1 Service unavailable; Client host [103.70.145.215] blocked using bl.spamcop.net; Blocked - see https://www.spamcop.net/bl.shtml?103.70.145.215; from= to=
2020-05-08 00:20:55
103.70.145.215 attackbots
email spam
2020-04-15 16:10:12
103.70.145.230 attackbotsspam
Unauthorized connection attempt detected from IP address 103.70.145.230 to port 23 [J]
2020-01-29 01:23:31
103.70.145.215 attack
email spam
2019-12-19 21:05:32
103.70.145.41 attackbotsspam
Fail2Ban Ban Triggered
2019-12-17 14:09:39
103.70.145.215 attackspam
Brute force attack stopped by firewall
2019-12-12 09:08:30
103.70.145.123 attackspam
2019-08-01 18:20:47 H=(liveus.it) [103.70.145.123]:41980 I=[192.147.25.65]:25 F= rejected RCPT : RBL: found in thrukfz5b56tq6xao6odgdyjrq.zen.dq.spamhaus.net (127.0.0.4, 127.0.0.3) (https://www.spamhaus.org/query/ip/103.70.145.123)
2019-08-01 18:20:48 H=(liveus.it) [103.70.145.123]:41980 I=[192.147.25.65]:25 F= rejected RCPT : RBL: found in thrukfz5b56tq6xao6odgdyjrq.zen.dq.spamhaus.net (127.0.0.4, 127.0.0.3) (https://www.spamhaus.org/query/ip/103.70.145.123)
2019-08-01 18:20:48 H=(liveus.it) [103.70.145.123]:41980 I=[192.147.25.65]:25 F= rejected RCPT : RBL: found in thrukfz5b56tq6xao6odgdyjrq.zen.dq.spamhaus.net (127.0.0.4, 127.0.0.3) (https://www.spamhaus.org/query/ip/103.70.145.123)
...
2019-08-02 11:21:29
103.70.145.207 attack
proto=tcp  .  spt=37963  .  dpt=25  .     (listed on Blocklist de  Jul 26)     (280)
2019-07-27 14:10:06
103.70.145.124 attack
SPF Fail sender not permitted to send mail for @21cncorp.com / Mail sent to address harvested from public web site
2019-07-18 18:06:42
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 103.70.145.42
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 361
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;103.70.145.42.			IN	A

;; AUTHORITY SECTION:
.			359	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022022500 1800 900 604800 86400

;; Query time: 66 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 25 18:29:42 CST 2022
;; MSG SIZE  rcvd: 106
Host info
Host 42.145.70.103.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 42.145.70.103.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
54.37.136.87 attackspambots
Apr  6 12:43:59 localhost sshd[12256]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=87.ip-54-37-136.eu  user=root
Apr  6 12:44:01 localhost sshd[12256]: Failed password for root from 54.37.136.87 port 59998 ssh2
...
2020-04-06 19:14:59
185.176.27.110 attackbotsspam
04/06/2020-06:25:58.442656 185.176.27.110 Protocol: 6 ET SCAN NMAP -sS window 1024
2020-04-06 19:13:46
162.243.133.220 attackbots
1586144996 - 04/06/2020 05:49:56 Host: zg-0312c-449.stretchoid.com/162.243.133.220 Port: 623 UDP Blocked
2020-04-06 18:51:50
92.118.37.58 attackbots
Apr  6 13:04:16 debian-2gb-nbg1-2 kernel: \[8430082.680743\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=92.118.37.58 DST=195.201.40.59 LEN=40 TOS=0x00 PREC=0x00 TTL=247 ID=25403 PROTO=TCP SPT=51122 DPT=20003 WINDOW=1024 RES=0x00 SYN URGP=0
2020-04-06 19:10:54
142.44.160.173 attack
Apr  6 12:31:58 host sshd[23180]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=173.ip-142-44-160.net  user=root
Apr  6 12:32:01 host sshd[23180]: Failed password for root from 142.44.160.173 port 49794 ssh2
...
2020-04-06 18:41:02
62.171.172.225 attackbotsspam
Apr  6 12:50:19 tor-proxy-04 sshd\[23464\]: Invalid user cron from 62.171.172.225 port 55086
Apr  6 12:52:10 tor-proxy-04 sshd\[23468\]: User backup from 62.171.172.225 not allowed because not listed in AllowUsers
Apr  6 12:54:01 tor-proxy-04 sshd\[23478\]: Invalid user zabbix from 62.171.172.225 port 33018
...
2020-04-06 18:56:14
106.13.75.97 attack
Apr  6 05:38:29 server sshd[7692]: Failed password for root from 106.13.75.97 port 52788 ssh2
Apr  6 05:44:01 server sshd[10038]: Failed password for root from 106.13.75.97 port 57684 ssh2
Apr  6 05:49:23 server sshd[11388]: Failed password for root from 106.13.75.97 port 34342 ssh2
2020-04-06 19:13:27
106.75.250.195 attackspam
2020-04-06T05:46:52.070448abusebot-4.cloudsearch.cf sshd[4554]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.75.250.195  user=root
2020-04-06T05:46:53.496320abusebot-4.cloudsearch.cf sshd[4554]: Failed password for root from 106.75.250.195 port 56488 ssh2
2020-04-06T05:50:33.398533abusebot-4.cloudsearch.cf sshd[4830]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.75.250.195  user=root
2020-04-06T05:50:35.496904abusebot-4.cloudsearch.cf sshd[4830]: Failed password for root from 106.75.250.195 port 51746 ssh2
2020-04-06T05:53:23.948965abusebot-4.cloudsearch.cf sshd[5009]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.75.250.195  user=root
2020-04-06T05:53:25.720822abusebot-4.cloudsearch.cf sshd[5009]: Failed password for root from 106.75.250.195 port 47006 ssh2
2020-04-06T05:56:46.458380abusebot-4.cloudsearch.cf sshd[5269]: pam_unix(sshd:auth): authen
...
2020-04-06 19:18:25
192.99.175.189 attackspam
Automatic report - Banned IP Access
2020-04-06 18:54:08
125.99.173.162 attackspam
$f2bV_matches
2020-04-06 19:01:06
40.77.167.140 attackspambots
inbound access attempt
2020-04-06 19:07:14
191.237.251.21 attack
Apr  6 05:42:02 vpn01 sshd[28649]: Failed password for root from 191.237.251.21 port 54176 ssh2
...
2020-04-06 18:50:47
212.64.71.132 attack
Apr  6 06:48:12 vps647732 sshd[18269]: Failed password for root from 212.64.71.132 port 39576 ssh2
...
2020-04-06 19:03:26
106.12.208.245 attackbotsspam
2020-04-06T07:45:47.991678ionos.janbro.de sshd[64388]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.208.245  user=root
2020-04-06T07:45:49.941273ionos.janbro.de sshd[64388]: Failed password for root from 106.12.208.245 port 41644 ssh2
2020-04-06T07:48:04.262078ionos.janbro.de sshd[64399]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.208.245  user=root
2020-04-06T07:48:06.680464ionos.janbro.de sshd[64399]: Failed password for root from 106.12.208.245 port 40924 ssh2
2020-04-06T07:50:16.365006ionos.janbro.de sshd[64404]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.208.245  user=root
2020-04-06T07:50:18.569055ionos.janbro.de sshd[64404]: Failed password for root from 106.12.208.245 port 40206 ssh2
2020-04-06T07:52:33.045035ionos.janbro.de sshd[64416]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=10
...
2020-04-06 19:18:47
165.22.143.3 attack
Apr  6 09:43:58 marvibiene sshd[48104]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.22.143.3  user=root
Apr  6 09:44:00 marvibiene sshd[48104]: Failed password for root from 165.22.143.3 port 48484 ssh2
Apr  6 09:47:49 marvibiene sshd[48185]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.22.143.3  user=root
Apr  6 09:47:51 marvibiene sshd[48185]: Failed password for root from 165.22.143.3 port 50530 ssh2
...
2020-04-06 18:52:36

Recently Reported IPs

103.70.145.40 103.70.145.77 103.70.145.84 103.70.145.70
103.70.145.66 103.70.146.10 103.70.146.102 103.70.146.106
103.70.145.93 103.70.145.90 103.70.146.123 103.70.146.118
101.108.242.138 103.70.146.126 103.70.146.140 103.70.146.143
103.70.146.14 103.70.146.162 103.70.146.210 103.70.146.166