Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Jakarta

Region: Jakarta Raya

Country: Indonesia

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
IP Type Details Datetime
114.125.252.88 attack
(ftpd) Failed FTP login from 114.125.252.88 (ID/Indonesia/-): 10 in the last 3600 secs
2020-04-06 14:35:23
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 114.125.252.161
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 61645
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;114.125.252.161.		IN	A

;; AUTHORITY SECTION:
.			477	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2023052600 1800 900 604800 86400

;; Query time: 67 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri May 26 17:36:53 CST 2023
;; MSG SIZE  rcvd: 108
Host info
Host 161.252.125.114.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 161.252.125.114.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
41.77.146.98 attack
Aug  9 12:34:49 MK-Soft-VM6 sshd\[1160\]: Invalid user teamspeak from 41.77.146.98 port 49482
Aug  9 12:34:49 MK-Soft-VM6 sshd\[1160\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=41.77.146.98
Aug  9 12:34:51 MK-Soft-VM6 sshd\[1160\]: Failed password for invalid user teamspeak from 41.77.146.98 port 49482 ssh2
...
2019-08-09 21:17:28
117.139.202.64 attack
Aug  8 10:27:33 kmh-mb-001 sshd[14881]: Invalid user patrick from 117.139.202.64 port 54876
Aug  8 10:27:33 kmh-mb-001 sshd[14881]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=117.139.202.64
Aug  8 10:27:35 kmh-mb-001 sshd[14881]: Failed password for invalid user patrick from 117.139.202.64 port 54876 ssh2
Aug  8 10:27:35 kmh-mb-001 sshd[14881]: Received disconnect from 117.139.202.64 port 54876:11: Bye Bye [preauth]
Aug  8 10:27:35 kmh-mb-001 sshd[14881]: Disconnected from 117.139.202.64 port 54876 [preauth]
Aug  8 10:42:12 kmh-mb-001 sshd[15433]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=117.139.202.64  user=backup
Aug  8 10:42:14 kmh-mb-001 sshd[15433]: Failed password for backup from 117.139.202.64 port 63347 ssh2
Aug  8 10:42:14 kmh-mb-001 sshd[15433]: Received disconnect from 117.139.202.64 port 63347:11: Bye Bye [preauth]
Aug  8 10:42:14 kmh-mb-001 sshd[15433]: Disconnected ........
-------------------------------
2019-08-09 21:39:33
93.89.232.4 attackspam
xmlrpc attack
2019-08-09 21:18:30
97.79.238.60 attack
xmlrpc attack
2019-08-09 21:23:16
94.191.20.179 attackspam
Automatic report - Banned IP Access
2019-08-09 20:55:34
182.61.46.62 attack
Aug  9 12:48:11 yabzik sshd[11079]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.61.46.62
Aug  9 12:48:12 yabzik sshd[11079]: Failed password for invalid user ts3 from 182.61.46.62 port 60048 ssh2
Aug  9 12:51:24 yabzik sshd[12121]: Failed password for root from 182.61.46.62 port 34172 ssh2
2019-08-09 21:14:51
79.120.183.51 attack
Aug  9 09:53:27 [munged] sshd[31597]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=79.120.183.51
2019-08-09 21:17:12
35.231.184.199 attack
xmlrpc attack
2019-08-09 21:38:26
89.103.27.45 attackbotsspam
Automatic report - Banned IP Access
2019-08-09 20:55:54
188.131.154.248 attack
Aug  9 08:31:07 *** sshd[13713]: Invalid user sef from 188.131.154.248
2019-08-09 21:26:57
218.57.82.12 attackbotsspam
ssh failed login
2019-08-09 21:19:45
2607:5300:60:248::1 attack
xmlrpc attack
2019-08-09 21:38:03
193.35.21.151 attackbots
Automatic report - Port Scan Attack
2019-08-09 21:21:15
111.246.6.85 attack
FTP/21 MH Probe, BF, Hack -
2019-08-09 21:13:54
103.28.36.185 attackbotsspam
xmlrpc attack
2019-08-09 21:36:29

Recently Reported IPs

129.226.217.222 49.234.19.177 49.234.19.172 227.123.219.135
101.229.158.157 64.27.183.70 2.38.205.140 87.236.176.143
87.247.142.15 85.254.75.207 104.17.77.94 103.135.225.209
203.189.136.184 203.80.166.205 58.97.230.63 99.159.53.108
185.245.86.218 178.86.157.189 185.9.187.65 103.103.58.123