Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Semarang

Region: Jawa Tengah

Country: Indonesia

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
% [whois.apnic.net]
% Whois data copyright terms    http://www.apnic.net/db/dbcopyright.html

% Information related to '114.10.16.0 - 114.10.31.255'

% Abuse contact for '114.10.16.0 - 114.10.31.255' is 'hostmaster@ioh.co.id'

inetnum:        114.10.16.0 - 114.10.31.255
netname:        IOH-B2B-ID
descr:          IOH B2B
descr:          INDOSAT's Corporate Customer
descr:          JAKARTA
country:        ID
admin-c:        IH151-AP
tech-c:         IH151-AP
abuse-c:        AI687-AP
status:         ASSIGNED NON-PORTABLE
remarks:        For abuse and spam report please contact abuse@ioh.co.id
mnt-by:         MAINT-ID-INDOSAT-INP
mnt-irt:        IRT-INDOSAT-INP-ID
last-modified:  2023-12-25T01:21:54Z
source:         APNIC

irt:            IRT-INDOSAT-INP-ID
address:        PT Indosat
address:        Jl. Medan Merdeka Barat 21
address:        Jakarta Pusat
e-mail:         hostmaster@ioh.co.id
abuse-mailbox:  hostmaster@ioh.co.id
admin-c:        IH151-AP
tech-c:         IH151-AP
auth:           # Filtered
remarks:        hostmaster@ioh.co.id is
remarks:        hostmaster@ioh.co.id was validated on 2025-09-09
mnt-by:         MAINT-ID-INDOSAT-INP
last-modified:  2025-11-18T00:26:20Z
source:         APNIC

role:           ABUSE INDOSATINPID
country:        ZZ
address:        PT Indosat
address:        Jl. Medan Merdeka Barat 21
address:        Jakarta Pusat
phone:          +000000000
e-mail:         hostmaster@ioh.co.id
admin-c:        IH151-AP
tech-c:         IH151-AP
nic-hdl:        AI687-AP
remarks:        Generated from irt object IRT-INDOSAT-INP-ID
remarks:        hostmaster@ioh.co.id was validated on 2025-09-09
abuse-mailbox:  hostmaster@ioh.co.id
mnt-by:         APNIC-ABUSE
last-modified:  2025-09-09T07:26:35Z
source:         APNIC

person:         INDOSAT INP Hostmaster
nic-hdl:        IH151-AP
e-mail:         hostmaster@ioh.co.id
address:        PT Indosat
address:        Jl. Medan Merdeka Barat 21
address:        Jakarta Pusat
phone:          +62-21-30072088
+               62-8557897897
fax-no:         +62-21-30001073
country:        ID
mnt-by:         MAINT-ID-INDOSAT-INP
last-modified:  2022-07-26T06:54:47Z
source:         APNIC

% Information related to '114.10.20.0/24AS4761'

route:          114.10.20.0/24
origin:         AS4761
descr:          PT. INDOSAT Tbk
                Indosat Head Office
                Jl. Medan Merdeka Barat no. 21
mnt-by:         MAINT-ID-INDOSAT-INP
last-modified:  2020-11-26T14:31:13Z
source:         APNIC

% This query was served by the APNIC Whois Service version 1.88.36-SNAPSHOT (WHOIS-AU5)
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 114.10.20.114
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 41940
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;114.10.20.114.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2026020101 1800 900 604800 86400

;; Query time: 10 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Feb 02 06:00:34 CST 2026
;; MSG SIZE  rcvd: 106
Host info
b'Host 114.20.10.114.in-addr.arpa not found: 2(SERVFAIL)
'
Nslookup info:
server can't find 114.10.20.114.in-addr.arpa: SERVFAIL
Related IP info:
Related comments:
IP Type Details Datetime
149.56.15.98 attackspam
Repeated brute force against a port
2020-08-18 07:02:08
182.71.111.138 attack
Aug 17 02:08:01 server6 sshd[25870]: reveeclipse mapping checking getaddrinfo for nsg-static-138.111.71.182.airtel.in [182.71.111.138] failed - POSSIBLE BREAK-IN ATTEMPT!
Aug 17 02:08:04 server6 sshd[25870]: Failed password for invalid user kernel from 182.71.111.138 port 32879 ssh2
Aug 17 02:08:04 server6 sshd[25870]: Received disconnect from 182.71.111.138: 11: Bye Bye [preauth]
Aug 17 02:09:26 server6 sshd[26387]: reveeclipse mapping checking getaddrinfo for nsg-static-138.111.71.182.airtel.in [182.71.111.138] failed - POSSIBLE BREAK-IN ATTEMPT!
Aug 17 02:09:28 server6 sshd[26387]: Failed password for invalid user ksl from 182.71.111.138 port 40839 ssh2
Aug 17 02:09:28 server6 sshd[26387]: Received disconnect from 182.71.111.138: 11: Bye Bye [preauth]
Aug 17 02:09:53 server6 sshd[26500]: reveeclipse mapping checking getaddrinfo for nsg-static-138.111.71.182.airtel.in [182.71.111.138] failed - POSSIBLE BREAK-IN ATTEMPT!
Aug 17 02:09:56 server6 sshd[26500]: Failed pass........
-------------------------------
2020-08-18 07:10:25
111.175.186.150 attackspam
Invalid user dokku from 111.175.186.150 port 9068
2020-08-18 07:12:29
190.90.147.82 attackbotsspam
1597695930 - 08/17/2020 22:25:30 Host: 190.90.147.82/190.90.147.82 Port: 445 TCP Blocked
2020-08-18 07:08:57
167.71.236.116 attackbotsspam
Aug 18 00:56:49 ns382633 sshd\[19610\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.71.236.116  user=root
Aug 18 00:56:50 ns382633 sshd\[19610\]: Failed password for root from 167.71.236.116 port 37746 ssh2
Aug 18 01:14:56 ns382633 sshd\[22672\]: Invalid user vnc from 167.71.236.116 port 52090
Aug 18 01:14:56 ns382633 sshd\[22672\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.71.236.116
Aug 18 01:14:59 ns382633 sshd\[22672\]: Failed password for invalid user vnc from 167.71.236.116 port 52090 ssh2
2020-08-18 07:23:12
62.234.193.119 attackbotsspam
Invalid user l from 62.234.193.119 port 51954
2020-08-18 07:20:35
51.15.226.137 attackspam
Aug 18 01:59:41 dhoomketu sshd[2438136]: Failed password for invalid user xguest from 51.15.226.137 port 41728 ssh2
Aug 18 02:03:22 dhoomketu sshd[2438185]: Invalid user date from 51.15.226.137 port 50338
Aug 18 02:03:22 dhoomketu sshd[2438185]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.15.226.137 
Aug 18 02:03:22 dhoomketu sshd[2438185]: Invalid user date from 51.15.226.137 port 50338
Aug 18 02:03:25 dhoomketu sshd[2438185]: Failed password for invalid user date from 51.15.226.137 port 50338 ssh2
...
2020-08-18 07:32:14
101.231.124.6 attackbotsspam
(sshd) Failed SSH login from 101.231.124.6 (CN/China/-): 5 in the last 3600 secs
2020-08-18 07:33:36
47.184.64.96 attackspambots
2020-08-17T16:23:00.861347morrigan.ad5gb.com sshd[1331846]: Failed password for mysql from 47.184.64.96 port 53304 ssh2
2020-08-17T16:23:01.668699morrigan.ad5gb.com sshd[1331846]: Disconnected from authenticating user mysql 47.184.64.96 port 53304 [preauth]
2020-08-18 07:25:52
140.143.247.30 attack
2020-08-18T00:32:29.059532centos sshd[24757]: Invalid user www from 140.143.247.30 port 35518
2020-08-18T00:32:30.669466centos sshd[24757]: Failed password for invalid user www from 140.143.247.30 port 35518 ssh2
2020-08-18T00:41:01.032548centos sshd[25246]: Invalid user joerg from 140.143.247.30 port 45618
...
2020-08-18 07:07:40
152.32.72.122 attack
*Port Scan* detected from 152.32.72.122 (PH/Philippines/National Capital Region/Pasig/-). 4 hits in the last 15 seconds
2020-08-18 07:28:24
46.238.122.54 attack
2020-08-17T18:13:19.876039morrigan.ad5gb.com sshd[1808925]: Failed password for root from 46.238.122.54 port 33071 ssh2
2020-08-17T18:13:20.312007morrigan.ad5gb.com sshd[1808925]: Disconnected from authenticating user root 46.238.122.54 port 33071 [preauth]
2020-08-18 07:24:09
125.124.254.31 attackbotsspam
frenzy
2020-08-18 07:40:43
143.255.130.2 attack
Aug 18 01:19:22 plg sshd[3065]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=143.255.130.2 
Aug 18 01:19:24 plg sshd[3065]: Failed password for invalid user suresh from 143.255.130.2 port 47890 ssh2
Aug 18 01:21:31 plg sshd[3100]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=143.255.130.2 
Aug 18 01:21:33 plg sshd[3100]: Failed password for invalid user ubuntu from 143.255.130.2 port 50264 ssh2
Aug 18 01:23:43 plg sshd[3132]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=143.255.130.2 
Aug 18 01:23:45 plg sshd[3132]: Failed password for invalid user mnm from 143.255.130.2 port 52632 ssh2
Aug 18 01:25:57 plg sshd[3171]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=143.255.130.2 
...
2020-08-18 07:28:38
103.61.37.88 attack
Aug 18 00:59:12 serwer sshd\[8332\]: Invalid user carmen from 103.61.37.88 port 55766
Aug 18 00:59:12 serwer sshd\[8332\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.61.37.88
Aug 18 00:59:14 serwer sshd\[8332\]: Failed password for invalid user carmen from 103.61.37.88 port 55766 ssh2
...
2020-08-18 07:39:20

Recently Reported IPs

103.159.84.59 84.54.5.250 167.71.118.26 44.199.26.93
45.78.235.68 18.143.4.143 34.229.16.67 77.110.118.231
35.203.210.18 125.47.61.239 178.217.108.153 111.7.96.146
66.132.153.112 204.76.203.210 14.213.49.192 223.236.158.221
223.236.158.4 223.236.158.34 223.236.158.124 115.29.226.74