Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: None

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 114.103.21.53
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 1784
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;114.103.21.53.			IN	A

;; AUTHORITY SECTION:
.			595	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022030400 1800 900 604800 86400

;; Query time: 71 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Mar 04 14:31:56 CST 2022
;; MSG SIZE  rcvd: 106
Host info
Host 53.21.103.114.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 53.21.103.114.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
178.62.75.60 attackbotsspam
Invalid user helen from 178.62.75.60 port 48056
2019-10-27 01:57:41
104.40.3.249 attack
Invalid user support from 104.40.3.249 port 23744
2019-10-27 01:41:21
186.122.149.38 attack
Oct 26 19:13:35 lnxmail61 sshd[910]: Failed password for root from 186.122.149.38 port 47622 ssh2
Oct 26 19:13:35 lnxmail61 sshd[910]: Failed password for root from 186.122.149.38 port 47622 ssh2
2019-10-27 01:26:20
218.2.108.162 attack
Oct 26 00:51:09 server sshd\[10606\]: Failed password for root from 218.2.108.162 port 26136 ssh2
Oct 26 17:26:47 server sshd\[11129\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.2.108.162  user=root
Oct 26 17:26:49 server sshd\[11129\]: Failed password for root from 218.2.108.162 port 17602 ssh2
Oct 26 17:49:41 server sshd\[17709\]: Invalid user victoria from 218.2.108.162
Oct 26 17:49:41 server sshd\[17709\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.2.108.162 
...
2019-10-27 01:24:56
27.100.26.165 attack
Oct 26 19:46:44 [munged] sshd[10247]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=27.100.26.165
2019-10-27 01:49:44
51.77.230.125 attackbots
Invalid user zimbra from 51.77.230.125 port 49738
2019-10-27 01:45:34
132.145.90.84 attackspam
Oct 26 16:33:12 work-partkepr sshd\[1890\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=132.145.90.84  user=root
Oct 26 16:33:14 work-partkepr sshd\[1890\]: Failed password for root from 132.145.90.84 port 36980 ssh2
...
2019-10-27 02:01:17
203.190.55.213 attackspambots
Oct 26 17:38:12 legacy sshd[15883]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=203.190.55.213
Oct 26 17:38:14 legacy sshd[15883]: Failed password for invalid user sa123456789 from 203.190.55.213 port 36989 ssh2
Oct 26 17:42:21 legacy sshd[16010]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=203.190.55.213
...
2019-10-27 01:25:43
180.250.162.9 attackspam
Invalid user usuario from 180.250.162.9 port 60464
2019-10-27 01:28:02
111.230.249.77 attackspambots
Invalid user ekalavya from 111.230.249.77 port 47268
2019-10-27 01:37:24
157.230.42.76 attackbotsspam
Invalid user server from 157.230.42.76 port 48081
2019-10-27 01:59:03
69.176.95.240 attackspambots
2019-10-26T17:05:39.051850abusebot-5.cloudsearch.cf sshd\[20867\]: Invalid user carl from 69.176.95.240 port 40327
2019-10-27 01:43:43
104.131.55.236 attackbotsspam
Oct 26 15:20:22 localhost sshd[2840]: Invalid user Program2017 from 104.131.55.236 port 59049
Oct 26 15:20:22 localhost sshd[2840]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.131.55.236 
Oct 26 15:20:22 localhost sshd[2840]: Invalid user Program2017 from 104.131.55.236 port 59049
Oct 26 15:20:24 localhost sshd[2840]: Failed password for invalid user Program2017 from 104.131.55.236 port 59049 ssh2
Oct 26 15:24:25 localhost sshd[2897]: Invalid user a from 104.131.55.236 port 50073
2019-10-27 01:40:45
106.12.13.143 attackspambots
ssh failed login
2019-10-27 02:07:26
106.13.144.78 attackbotsspam
Oct 27 00:43:08 webhost01 sshd[3400]: Failed password for root from 106.13.144.78 port 57140 ssh2
Oct 27 00:48:42 webhost01 sshd[3428]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.144.78
...
2019-10-27 02:04:44

Recently Reported IPs

114.103.21.45 114.103.21.216 114.103.21.69 114.103.21.67
114.103.21.31 114.103.21.6 114.103.21.49 113.250.154.197
114.103.21.85 114.103.21.94 114.103.23.21 114.103.23.235
114.103.222.202 114.103.21.72 113.250.154.240 114.103.23.91
114.103.29.133 114.103.47.87 114.103.46.26 114.103.60.129