Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: None

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 114.141.49.98
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 5661
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;114.141.49.98.			IN	A

;; AUTHORITY SECTION:
.			578	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022030400 1800 900 604800 86400

;; Query time: 25 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Mar 05 03:08:16 CST 2022
;; MSG SIZE  rcvd: 106
Host info
98.49.141.114.in-addr.arpa domain name pointer ptkitautama.cyberplus.net.id.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
98.49.141.114.in-addr.arpa	name = ptkitautama.cyberplus.net.id.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
93.113.110.46 attackbots
93.113.110.46 - - [08/Nov/2019:08:13:25 +0100] "GET /wp-login.php HTTP/1.1" 200 1238 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
93.113.110.46 - - [08/Nov/2019:08:13:25 +0100] "POST /wp-login.php HTTP/1.1" 200 1632 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
93.113.110.46 - - [08/Nov/2019:08:13:25 +0100] "GET /wp-login.php HTTP/1.1" 200 1238 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
93.113.110.46 - - [08/Nov/2019:08:13:25 +0100] "POST /wp-login.php HTTP/1.1" 200 1608 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
93.113.110.46 - - [08/Nov/2019:08:13:26 +0100] "GET /wp-login.php HTTP/1.1" 200 1238 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
93.113.110.46 - - [08/Nov/2019:08:13:26 +0100] "POST /wp-login.php HTTP/1.1" 200 1608 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
...
2019-11-08 18:17:30
60.191.32.71 attack
invalid user
2019-11-08 17:37:44
37.17.182.107 attackspam
Nov  8 07:21:41 mxgate1 postfix/postscreen[2829]: CONNECT from [37.17.182.107]:53747 to [176.31.12.44]:25
Nov  8 07:21:41 mxgate1 postfix/dnsblog[2831]: addr 37.17.182.107 listed by domain cbl.abuseat.org as 127.0.0.2
Nov  8 07:21:41 mxgate1 postfix/dnsblog[2835]: addr 37.17.182.107 listed by domain zen.spamhaus.org as 127.0.0.11
Nov  8 07:21:41 mxgate1 postfix/dnsblog[2835]: addr 37.17.182.107 listed by domain zen.spamhaus.org as 127.0.0.4
Nov  8 07:21:41 mxgate1 postfix/dnsblog[2832]: addr 37.17.182.107 listed by domain b.barracudacentral.org as 127.0.0.2
Nov  8 07:21:42 mxgate1 postfix/postscreen[2829]: PREGREET 22 after 0.11 from [37.17.182.107]:53747: EHLO [37.17.182.107]

Nov  8 07:21:42 mxgate1 postfix/postscreen[2829]: DNSBL rank 4 for [37.17.182.107]:53747
Nov x@x
Nov  8 07:21:42 mxgate1 postfix/postscreen[2829]: HANGUP after 0.34 from [37.17.182.107]:53747 in tests after SMTP handshake
Nov  8 07:21:42 mxgate1 postfix/postscreen[2829]: DISCONNECT [37.17.182.107........
-------------------------------
2019-11-08 18:02:46
207.154.211.36 attackbots
Nov  7 22:22:14 web1 sshd\[20382\]: Invalid user Harper from 207.154.211.36
Nov  7 22:22:14 web1 sshd\[20382\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=207.154.211.36
Nov  7 22:22:16 web1 sshd\[20382\]: Failed password for invalid user Harper from 207.154.211.36 port 39770 ssh2
Nov  7 22:29:50 web1 sshd\[21052\]: Invalid user 123456 from 207.154.211.36
Nov  7 22:29:50 web1 sshd\[21052\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=207.154.211.36
2019-11-08 18:16:16
61.175.194.90 attackbotsspam
$f2bV_matches
2019-11-08 17:42:03
218.92.0.208 attack
Nov  8 08:35:55 eventyay sshd[26072]: Failed password for root from 218.92.0.208 port 27628 ssh2
Nov  8 08:36:32 eventyay sshd[26076]: Failed password for root from 218.92.0.208 port 55886 ssh2
...
2019-11-08 17:48:23
72.48.214.68 attackspambots
Nov  5 07:17:28 olgosrv01 sshd[3483]: Invalid user sansao from 72.48.214.68
Nov  5 07:17:30 olgosrv01 sshd[3483]: Failed password for invalid user sansao from 72.48.214.68 port 53340 ssh2
Nov  5 07:17:30 olgosrv01 sshd[3483]: Received disconnect from 72.48.214.68: 11: Bye Bye [preauth]
Nov  5 07:31:52 olgosrv01 sshd[4586]: Failed password for r.r from 72.48.214.68 port 35456 ssh2
Nov  5 07:31:52 olgosrv01 sshd[4586]: Received disconnect from 72.48.214.68: 11: Bye Bye [preauth]
Nov  5 07:35:33 olgosrv01 sshd[4898]: Failed password for r.r from 72.48.214.68 port 47702 ssh2
Nov  5 07:35:33 olgosrv01 sshd[4898]: Received disconnect from 72.48.214.68: 11: Bye Bye [preauth]
Nov  5 07:39:00 olgosrv01 sshd[5139]: Invalid user admin from 72.48.214.68
Nov  5 07:39:02 olgosrv01 sshd[5139]: Failed password for invalid user admin from 72.48.214.68 port 59922 ssh2
Nov  5 07:39:02 olgosrv01 sshd[5139]: Received disconnect from 72.48.214.68: 11: Bye Bye [preauth]
Nov  5 07:42:39 olgosr........
-------------------------------
2019-11-08 18:12:25
185.186.232.35 attackspambots
[portscan] Port scan
2019-11-08 18:00:52
182.61.108.121 attackspam
Nov  7 22:27:18 tdfoods sshd\[3413\]: Invalid user akim from 182.61.108.121
Nov  7 22:27:18 tdfoods sshd\[3413\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.61.108.121
Nov  7 22:27:21 tdfoods sshd\[3413\]: Failed password for invalid user akim from 182.61.108.121 port 15884 ssh2
Nov  7 22:31:55 tdfoods sshd\[3769\]: Invalid user webaccess from 182.61.108.121
Nov  7 22:31:55 tdfoods sshd\[3769\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.61.108.121
2019-11-08 18:15:15
77.68.21.117 attackspambots
xmlrpc attack
2019-11-08 17:41:45
80.52.199.93 attack
Nov  8 09:18:54 server sshd\[3586\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=gwt93.internetdsl.tpnet.pl  user=root
Nov  8 09:18:56 server sshd\[3586\]: Failed password for root from 80.52.199.93 port 43408 ssh2
Nov  8 09:22:38 server sshd\[4665\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=gwt93.internetdsl.tpnet.pl  user=root
Nov  8 09:22:40 server sshd\[4665\]: Failed password for root from 80.52.199.93 port 53728 ssh2
Nov  8 09:26:18 server sshd\[5728\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=gwt93.internetdsl.tpnet.pl  user=mail
...
2019-11-08 18:13:41
52.33.31.200 attackspambots
Nov  8 01:55:40 mockhub sshd[20152]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=52.33.31.200
Nov  8 01:55:42 mockhub sshd[20152]: Failed password for invalid user admin from 52.33.31.200 port 15113 ssh2
...
2019-11-08 17:57:05
68.47.224.14 attackbotsspam
Nov  8 09:32:12 minden010 sshd[6248]: Failed password for root from 68.47.224.14 port 52036 ssh2
Nov  8 09:36:02 minden010 sshd[7025]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=68.47.224.14
Nov  8 09:36:04 minden010 sshd[7025]: Failed password for invalid user kevin from 68.47.224.14 port 33556 ssh2
...
2019-11-08 17:57:54
182.139.134.107 attackbotsspam
Nov  8 09:35:52 jane sshd[1879]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.139.134.107 
Nov  8 09:35:54 jane sshd[1879]: Failed password for invalid user lucia from 182.139.134.107 port 55016 ssh2
...
2019-11-08 17:44:52
195.175.11.18 attack
Nov  8 07:26:07 mc1 kernel: \[4480660.398824\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:11:a9:7b:d2:74:7f:6e:37:e3:08:00 SRC=195.175.11.18 DST=159.69.205.51 LEN=52 TOS=0x00 PREC=0x00 TTL=107 ID=901 DF PROTO=TCP SPT=49352 DPT=4899 WINDOW=8192 RES=0x00 SYN URGP=0 
Nov  8 07:26:10 mc1 kernel: \[4480663.404900\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:11:a9:7b:d2:74:7f:6e:37:e3:08:00 SRC=195.175.11.18 DST=159.69.205.51 LEN=52 TOS=0x00 PREC=0x00 TTL=107 ID=1177 DF PROTO=TCP SPT=49352 DPT=4899 WINDOW=8192 RES=0x00 SYN URGP=0 
Nov  8 07:26:16 mc1 kernel: \[4480669.410627\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:11:a9:7b:d2:74:7f:6e:37:e3:08:00 SRC=195.175.11.18 DST=159.69.205.51 LEN=48 TOS=0x00 PREC=0x00 TTL=107 ID=1739 DF PROTO=TCP SPT=49352 DPT=4899 WINDOW=8192 RES=0x00 SYN URGP=0 
...
2019-11-08 18:14:26

Recently Reported IPs

114.141.49.147 114.141.49.22 114.141.50.236 114.141.51.122
115.211.231.128 115.211.231.134 115.211.231.136 115.211.231.140
115.211.231.148 115.211.231.15 115.211.231.152 115.211.231.155
115.211.231.158 114.215.95.188 114.216.117.208 114.216.105.214
114.216.105.4 114.215.96.223 114.216.104.187 114.215.96.149