Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: China

Internet Service Provider: ChinaNet Yunnan Province Network

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
Type Details Datetime
attackspam
Unauthorized connection attempt from IP address 116.55.103.37 on Port 445(SMB)
2020-09-02 14:59:40
attackspambots
Unauthorized connection attempt from IP address 116.55.103.37 on Port 445(SMB)
2020-09-02 08:01:01
attackbots
1598616344 - 08/28/2020 14:05:44 Host: 116.55.103.37/116.55.103.37 Port: 445 TCP Blocked
2020-08-29 00:31:42
attackbotsspam
Unauthorized connection attempt detected from IP address 116.55.103.37 to port 445
2020-05-31 03:41:31
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 116.55.103.37
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 59530
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;116.55.103.37.			IN	A

;; AUTHORITY SECTION:
.			153	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2020053000 1800 900 604800 86400

;; Query time: 107 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun May 31 03:41:28 CST 2020
;; MSG SIZE  rcvd: 117
Host info
37.103.55.116.in-addr.arpa domain name pointer 37.103.55.116.broad.km.yn.dynamic.163data.com.cn.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
37.103.55.116.in-addr.arpa	name = 37.103.55.116.broad.km.yn.dynamic.163data.com.cn.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
219.78.164.67 attack
unauthorized connection attempt
2020-01-09 21:04:07
194.132.236.215 attackspam
unauthorized connection attempt
2020-01-09 21:04:30
178.44.93.153 attackbots
Telnet/23 MH Probe, BF, Hack -
2020-01-09 21:36:49
144.34.198.168 attackbotsspam
Jan  9 14:10:55 MK-Soft-VM7 sshd[13610]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=144.34.198.168 
Jan  9 14:10:57 MK-Soft-VM7 sshd[13610]: Failed password for invalid user gcy from 144.34.198.168 port 49827 ssh2
...
2020-01-09 21:31:41
121.180.155.147 attack
unauthorized connection attempt
2020-01-09 21:00:13
222.186.175.161 attackspambots
SSH Brute Force, server-1 sshd[22017]: Failed password for root from 222.186.175.161 port 19020 ssh2
2020-01-09 21:35:46
189.154.63.29 attack
unauthorized connection attempt
2020-01-09 21:01:54
222.103.57.99 attack
unauthorized connection attempt
2020-01-09 21:03:42
117.50.101.117 attackbotsspam
unauthorized connection attempt
2020-01-09 21:10:26
24.160.6.156 attackbotsspam
2020-01-09 08:11:00,810 fail2ban.actions        [1799]: NOTICE  [sshd] Ban 24.160.6.156
2020-01-09 21:26:07
171.221.217.145 attack
Automatic report - Banned IP Access
2020-01-09 21:14:42
14.233.45.5 attackspam
1578575456 - 01/09/2020 14:10:56 Host: 14.233.45.5/14.233.45.5 Port: 445 TCP Blocked
2020-01-09 21:33:16
113.254.69.66 attack
unauthorized connection attempt
2020-01-09 21:02:35
45.141.84.21 attackbots
OS-WINDOWS Microsoft Windows Terminal server RDP over non-standard port attempt
2020-01-09 21:19:47
128.201.180.26 attackbots
unauthorized connection attempt
2020-01-09 21:09:27

Recently Reported IPs

50.36.173.244 46.37.39.21 45.83.65.84 36.255.135.224
34.228.189.205 31.25.132.230 27.184.49.161 5.27.210.70
3.7.252.183 223.10.179.253 222.212.154.185 222.113.184.148
218.144.106.106 202.38.173.121 197.234.196.54 197.89.188.90
190.204.90.62 189.182.212.47 189.54.0.212 187.56.118.188