Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Jakarta

Region: Jakarta

Country: Indonesia

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 111.94.150.204
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 46925
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;111.94.150.204.			IN	A

;; AUTHORITY SECTION:
.			493	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2020080200 1800 900 604800 86400

;; Query time: 12 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Aug 02 21:36:19 CST 2020
;; MSG SIZE  rcvd: 118
Host info
204.150.94.111.in-addr.arpa domain name pointer fm-dyn-111-94-150-204.fast.net.id.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
204.150.94.111.in-addr.arpa	name = fm-dyn-111-94-150-204.fast.net.id.

Authoritative answers can be found from:

Related IP info:
Related comments:
IP Type Details Datetime
49.231.16.105 attack
Unauthorized connection attempt from IP address 49.231.16.105 on Port 445(SMB)
2019-10-30 03:14:14
92.118.37.84 attack
MultiHost/MultiPort Probe, Scan, Hack -
2019-10-30 03:22:16
89.183.129.235 attack
SSH Scan
2019-10-30 03:20:18
128.199.162.108 attackbotsspam
Invalid user bot from 128.199.162.108 port 56862
2019-10-30 03:03:58
222.252.18.12 attackbots
Unauthorized connection attempt from IP address 222.252.18.12 on Port 445(SMB)
2019-10-30 03:38:23
178.62.214.85 attack
Oct 29 16:41:38 sauna sshd[76279]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.62.214.85
Oct 29 16:41:40 sauna sshd[76279]: Failed password for invalid user wh from 178.62.214.85 port 47388 ssh2
...
2019-10-30 03:05:51
187.75.252.224 attack
Unauthorized connection attempt from IP address 187.75.252.224 on Port 445(SMB)
2019-10-30 03:17:10
140.249.22.238 attackspambots
Oct 29 20:20:31 server sshd\[18129\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=140.249.22.238  user=root
Oct 29 20:20:33 server sshd\[18129\]: Failed password for root from 140.249.22.238 port 48172 ssh2
Oct 29 20:34:14 server sshd\[21055\]: Invalid user adit from 140.249.22.238
Oct 29 20:34:14 server sshd\[21055\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=140.249.22.238 
Oct 29 20:34:16 server sshd\[21055\]: Failed password for invalid user adit from 140.249.22.238 port 44428 ssh2
...
2019-10-30 03:02:31
142.93.108.212 attackbots
Wordpress brute-force
2019-10-30 03:32:23
106.75.165.187 attackspam
Oct 29 17:53:44 areeb-Workstation sshd[30603]: Failed password for root from 106.75.165.187 port 33332 ssh2
...
2019-10-30 03:10:41
208.109.53.185 attackbotsspam
www noscript
...
2019-10-30 03:08:33
187.72.60.125 attack
Unauthorized connection attempt from IP address 187.72.60.125 on Port 445(SMB)
2019-10-30 03:39:31
178.69.245.131 attack
Chat Spam
2019-10-30 03:05:03
64.71.32.86 attackspam
Automatic report - XMLRPC Attack
2019-10-30 03:27:39
34.82.20.42 attackbotsspam
WP_xmlrpc_attack
2019-10-30 03:12:42

Recently Reported IPs

218.249.218.21 16.8.223.38 12.64.130.29 185.213.20.224
177.39.142.108 102.39.226.238 5.180.220.47 59.125.145.88
114.243.32.169 173.34.250.153 190.171.31.11 59.156.193.44
136.87.186.110 166.242.192.0 197.253.91.143 6.169.33.224
135.75.124.179 122.51.89.155 49.233.176.98 47.93.22.225