Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Tokyo

Region: Tokyo

Country: Japan

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 157.103.12.2
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 8481
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;157.103.12.2.			IN	A

;; AUTHORITY SECTION:
.			554	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2020060100 1800 900 604800 86400

;; Query time: 56 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Jun 01 23:52:57 CST 2020
;; MSG SIZE  rcvd: 116
Host info
Host 2.12.103.157.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		100.100.2.138
Address:	100.100.2.138#53

** server can't find 2.12.103.157.in-addr.arpa.: NXDOMAIN

Related IP info:
Related comments:
IP Type Details Datetime
218.92.0.211 attackspambots
Jul 24 18:46:20 mx sshd[114909]: Failed password for root from 218.92.0.211 port 50339 ssh2
Jul 24 18:47:51 mx sshd[114917]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.211  user=root
Jul 24 18:47:53 mx sshd[114917]: Failed password for root from 218.92.0.211 port 61973 ssh2
Jul 24 18:49:19 mx sshd[114925]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.211  user=root
Jul 24 18:49:20 mx sshd[114925]: Failed password for root from 218.92.0.211 port 30326 ssh2
...
2020-07-25 01:02:48
80.233.41.153 attackbotsspam
Honeypot attack, port: 445, PTR: PTR record not found
2020-07-25 01:11:20
191.55.190.18 attackspambots
Unauthorized connection attempt from IP address 191.55.190.18 on Port 445(SMB)
2020-07-25 01:05:40
212.83.132.45 attackbots
[2020-07-24 12:48:29] NOTICE[1277] chan_sip.c: Registration from '"523"' failed for '212.83.132.45:7448' - Wrong password
[2020-07-24 12:48:29] SECURITY[1295] res_security_log.c: SecurityEvent="InvalidPassword",EventTV="2020-07-24T12:48:29.389-0400",Severity="Error",Service="SIP",EventVersion="2",AccountID="523",SessionID="0x7f17545b1d48",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/212.83.132.45/7448",Challenge="566938af",ReceivedChallenge="566938af",ReceivedHash="77387e5cd20df164f70bc9cf6b831e5a"
[2020-07-24 12:50:42] NOTICE[1277] chan_sip.c: Registration from '"529"' failed for '212.83.132.45:7765' - Wrong password
[2020-07-24 12:50:42] SECURITY[1295] res_security_log.c: SecurityEvent="InvalidPassword",EventTV="2020-07-24T12:50:42.925-0400",Severity="Error",Service="SIP",EventVersion="2",AccountID="529",SessionID="0x7f17542ea028",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/212.83.132
...
2020-07-25 01:12:15
91.228.32.2 attackspambots
Jul 24 12:26:29 mail.srvfarm.net postfix/smtps/smtpd[2229335]: warning: unknown[91.228.32.2]: SASL PLAIN authentication failed: 
Jul 24 12:26:29 mail.srvfarm.net postfix/smtps/smtpd[2229335]: lost connection after AUTH from unknown[91.228.32.2]
Jul 24 12:28:21 mail.srvfarm.net postfix/smtps/smtpd[2232829]: warning: unknown[91.228.32.2]: SASL PLAIN authentication failed: 
Jul 24 12:28:21 mail.srvfarm.net postfix/smtps/smtpd[2232829]: lost connection after AUTH from unknown[91.228.32.2]
Jul 24 12:31:54 mail.srvfarm.net postfix/smtps/smtpd[2232829]: warning: unknown[91.228.32.2]: SASL PLAIN authentication failed:
2020-07-25 01:29:34
14.37.145.34 attack
Honeypot attack, port: 81, PTR: PTR record not found
2020-07-25 01:07:08
185.82.255.29 attackspambots
Automatic report - Port Scan Attack
2020-07-25 01:12:53
91.192.206.41 attackbots
Brute force attempt
2020-07-25 01:13:07
179.184.34.186 attackbotsspam
Unauthorized connection attempt from IP address 179.184.34.186 on Port 445(SMB)
2020-07-25 01:03:39
201.151.62.150 attackbots
Unauthorized connection attempt from IP address 201.151.62.150 on Port 445(SMB)
2020-07-25 01:35:26
96.126.118.13 attack
Jul 24 12:38:38 mail.srvfarm.net postfix/smtpd[2229631]: lost connection after RCPT from hw118-13.mailset.cn[96.126.118.13]
Jul 24 12:38:44 mail.srvfarm.net postfix/smtpd[2229640]: lost connection after RCPT from hw118-13.mailset.cn[96.126.118.13]
Jul 24 12:38:52 mail.srvfarm.net postfix/smtpd[2229495]: lost connection after RCPT from hw118-13.mailset.cn[96.126.118.13]
Jul 24 12:38:52 mail.srvfarm.net postfix/smtpd[2229628]: lost connection after RCPT from hw118-13.mailset.cn[96.126.118.13]
Jul 24 12:39:12 mail.srvfarm.net postfix/smtpd[2229628]: lost connection after RCPT from hw118-13.mailset.cn[96.126.118.13]
2020-07-25 01:28:18
200.66.117.134 attackspam
Jul 24 12:27:58 mail.srvfarm.net postfix/smtpd[2217477]: warning: unknown[200.66.117.134]: SASL PLAIN authentication failed: 
Jul 24 12:27:58 mail.srvfarm.net postfix/smtpd[2217477]: lost connection after AUTH from unknown[200.66.117.134]
Jul 24 12:35:26 mail.srvfarm.net postfix/smtps/smtpd[2233237]: warning: unknown[200.66.117.134]: SASL PLAIN authentication failed: 
Jul 24 12:35:27 mail.srvfarm.net postfix/smtps/smtpd[2233237]: lost connection after AUTH from unknown[200.66.117.134]
Jul 24 12:35:32 mail.srvfarm.net postfix/smtps/smtpd[2233107]: warning: unknown[200.66.117.134]: SASL PLAIN authentication failed:
2020-07-25 01:18:49
182.180.126.49 attackspambots
Honeypot attack, port: 445, PTR: PTR record not found
2020-07-25 01:03:13
101.89.110.204 attack
Connection to SSH Honeypot - Detected by HoneypotDB
2020-07-25 01:41:21
54.38.159.106 attackbots
Lines containing failures of 54.38.159.106
2020-07-20 10:46:17 dovecot_login authenticator failed for vps-d3fc4ca1.vps.ovh.net (USER) [54.38.159.106]: 535 Incorrect authentication data (set_id=cumplmsameargaasta193)


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=54.38.159.106
2020-07-25 01:33:06

Recently Reported IPs

48.176.6.247 215.234.225.135 96.3.108.170 144.193.196.222
36.177.190.51 197.18.220.200 147.34.140.55 5.142.195.90
46.188.1.35 209.77.140.54 198.90.97.171 194.2.143.255
220.241.120.214 59.155.14.73 141.213.242.132 136.255.48.192
70.37.59.249 205.238.195.67 117.161.193.41 110.219.156.137