Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Bandung

Region: West Java

Country: Indonesia

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
IP Type Details Datetime
114.122.106.53 proxy
This ia hacker account Facebook me
2021-04-17 22:42:09
114.122.106.53 proxy
This ia hacker account Facebook me
2021-04-17 22:41:59
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 114.122.106.48
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 50647
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;114.122.106.48.			IN	A

;; AUTHORITY SECTION:
.			135	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2020102700 1800 900 604800 86400

;; Query time: 89 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Oct 27 16:41:59 CST 2020
;; MSG SIZE  rcvd: 118
Host info
Host 48.106.122.114.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 48.106.122.114.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
128.199.144.99 attack
The IP address [128.199.144.99] experienced 3 failed attempts when attempting to log into DSM running on DiskStation within 3 minutes, and was blocked at Sat Jul 27 21:20:01 2019.
2019-07-28 05:03:34
220.158.148.132 attackbots
Invalid user guo from 220.158.148.132 port 41260
2019-07-28 05:35:34
190.162.249.114 attack
Invalid user st from 190.162.249.114 port 27980
2019-07-28 04:54:31
178.128.3.152 attack
Jul 25 18:17:20 *** sshd[5220]: Failed password for invalid user administrator from 178.128.3.152 port 49006 ssh2
Jul 27 21:25:47 *** sshd[11711]: Failed password for invalid user support from 178.128.3.152 port 37840 ssh2
2019-07-28 05:40:29
82.56.20.89 attackbots
Invalid user admin from 82.56.20.89 port 56860
2019-07-28 05:28:20
191.53.57.174 attackspam
Unauthorized connection attempt from IP address 191.53.57.174 on Port 25(SMTP)
2019-07-28 04:54:16
188.166.72.240 attackbotsspam
2019-07-27T20:53:24.268999abusebot-4.cloudsearch.cf sshd\[17603\]: Invalid user cacti from 188.166.72.240 port 33386
2019-07-28 05:16:24
95.69.137.131 attack
Invalid user ubnt from 95.69.137.131 port 61579
2019-07-28 05:26:40
139.199.48.217 attack
Invalid user ao from 139.199.48.217 port 51276
2019-07-28 05:21:23
158.69.222.2 attack
Invalid user mani from 158.69.222.2 port 43364
2019-07-28 05:42:29
194.150.15.70 attack
Invalid user nagios from 194.150.15.70 port 47281
2019-07-28 05:14:20
104.248.187.152 attack
Invalid user off from 104.248.187.152 port 46970
2019-07-28 05:25:50
175.6.77.235 attackbots
SSH Brute Force, server-1 sshd[32377]: Failed password for root from 175.6.77.235 port 56792 ssh2
2019-07-28 05:17:42
128.199.182.235 attackspam
Jul 27 23:19:36 ubuntu-2gb-nbg1-dc3-1 sshd[8173]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.199.182.235
Jul 27 23:19:38 ubuntu-2gb-nbg1-dc3-1 sshd[8173]: Failed password for invalid user mysql from 128.199.182.235 port 21324 ssh2
...
2019-07-28 05:23:14
183.89.83.196 attackspambots
Invalid user ubnt from 183.89.83.196 port 1838
2019-07-28 04:56:00

Recently Reported IPs

211.222.191.39 149.28.26.37 60.170.156.253 147.30.103.98
68.183.87.62 147.30.117.72 164.90.227.215 173.66.163.222
90.255.231.212 178.41.238.122 50.209.182.10 116.14.193.176
124.160.219.87 60.168.129.33 196.247.57.116 112.196.29.147
199.231.83.7 51.103.80.119 174.254.71.16 93.179.105.13