Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Jakarta

Region: Jakarta

Country: Indonesia

Internet Service Provider: PT Cyberplus Media Pratama

Hostname: unknown

Organization: unknown

Usage Type: Fixed Line ISP

Comments:
Type Details Datetime
attackspam
Lines containing failures of 114.141.52.94
Jun  5 22:45:32 neweola sshd[21674]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=114.141.52.94  user=r.r
Jun  5 22:45:35 neweola sshd[21674]: Failed password for r.r from 114.141.52.94 port 35968 ssh2
Jun  5 22:45:36 neweola sshd[21674]: Received disconnect from 114.141.52.94 port 35968:11: Bye Bye [preauth]
Jun  5 22:45:36 neweola sshd[21674]: Disconnected from authenticating user r.r 114.141.52.94 port 35968 [preauth]
Jun  5 23:02:40 neweola sshd[22202]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=114.141.52.94  user=r.r
Jun  5 23:02:41 neweola sshd[22202]: Failed password for r.r from 114.141.52.94 port 36554 ssh2
Jun  5 23:02:42 neweola sshd[22202]: Received disconnect from 114.141.52.94 port 36554:11: Bye Bye [preauth]
Jun  5 23:02:42 neweola sshd[22202]: Disconnected from authenticating user r.r 114.141.52.94 port 36554 [preauth]
Jun  5........
------------------------------
2020-06-07 07:55:23
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 114.141.52.94
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 56110
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;114.141.52.94.			IN	A

;; AUTHORITY SECTION:
.			440	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2020060601 1800 900 604800 86400

;; Query time: 75 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Jun 07 07:55:20 CST 2020
;; MSG SIZE  rcvd: 117
Host info
94.52.141.114.in-addr.arpa domain name pointer mail2.teknisiku.tech.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
94.52.141.114.in-addr.arpa	name = mail2.teknisiku.tech.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
2.47.113.78 attackspambots
Jun 24 17:18:30 onepixel sshd[2248313]: Invalid user test from 2.47.113.78 port 46108
Jun 24 17:18:30 onepixel sshd[2248313]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=2.47.113.78 
Jun 24 17:18:30 onepixel sshd[2248313]: Invalid user test from 2.47.113.78 port 46108
Jun 24 17:18:33 onepixel sshd[2248313]: Failed password for invalid user test from 2.47.113.78 port 46108 ssh2
Jun 24 17:21:50 onepixel sshd[2250030]: Invalid user wnc from 2.47.113.78 port 44039
2020-06-25 01:38:41
80.211.139.7 attackbots
Invalid user dummy from 80.211.139.7 port 41412
2020-06-25 01:35:27
61.163.192.88 attackspambots
(smtpauth) Failed SMTP AUTH login from 61.163.192.88 (CN/China/hn.ly.kd.adsl): 5 in the last 3600 secs
2020-06-25 01:32:25
47.240.55.116 attackbotsspam
" "
2020-06-25 01:25:38
113.106.11.107 attackbotsspam
06/24/2020-08:04:04.388181 113.106.11.107 Protocol: 6 ET SCAN Suspicious inbound to MSSQL port 1433
2020-06-25 01:57:16
51.91.75.22 attackbotsspam
Jun 24 19:10:21 debian-2gb-nbg1-2 kernel: \[15277286.751111\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=51.91.75.22 DST=195.201.40.59 LEN=438 TOS=0x00 PREC=0x00 TTL=50 ID=37233 DF PROTO=UDP SPT=5061 DPT=5060 LEN=418
2020-06-25 01:45:05
60.167.180.96 attack
reported through recidive - multiple failed attempts(SSH)
2020-06-25 01:59:59
49.233.195.154 attack
Jun 24 16:20:28 gestao sshd[13482]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.233.195.154 
Jun 24 16:20:31 gestao sshd[13482]: Failed password for invalid user helga from 49.233.195.154 port 57082 ssh2
Jun 24 16:25:16 gestao sshd[13593]: Failed password for root from 49.233.195.154 port 50392 ssh2
...
2020-06-25 01:29:07
177.95.92.223 attackbotsspam
Jun 25 00:21:43 webhost01 sshd[7950]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=177.95.92.223
Jun 25 00:21:45 webhost01 sshd[7950]: Failed password for invalid user test from 177.95.92.223 port 53436 ssh2
...
2020-06-25 01:48:30
192.99.127.205 attack
2020-06-24 dovecot_login authenticator failed for ip205.ip-192-99-127.net \(2SacfDp\) \[192.99.127.205\]: 535 Incorrect authentication data \(set_id=perl\)
2020-06-24 dovecot_login authenticator failed for ip205.ip-192-99-127.net \(YKiWIR9d\) \[192.99.127.205\]: 535 Incorrect authentication data \(set_id=perl\)
2020-06-24 dovecot_login authenticator failed for ip205.ip-192-99-127.net \(0tHHqd\) \[192.99.127.205\]: 535 Incorrect authentication data \(set_id=perl\)
2020-06-25 01:23:05
125.99.46.50 attackbots
Jun 24 15:43:01 mout sshd[1756]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=125.99.46.50  user=root
Jun 24 15:43:03 mout sshd[1756]: Failed password for root from 125.99.46.50 port 36072 ssh2
2020-06-25 02:00:47
66.70.129.48 attackspambots
Unknown connection out of country.
2020-06-25 01:44:43
129.28.78.8 attack
SSH Brute-Forcing (server2)
2020-06-25 01:41:51
222.186.175.183 attackspambots
Jun 24 19:43:27 lvps178-77-74-153 sshd[4852]: Failed none for invalid user root from 222.186.175.183 port 25482 ssh2
Jun 24 19:43:28 lvps178-77-74-153 sshd[4852]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.175.183  user=root
Jun 24 19:43:30 lvps178-77-74-153 sshd[4852]: Failed password for invalid user root from 222.186.175.183 port 25482 ssh2
...
2020-06-25 01:56:34
116.62.49.96 attackspam
116.62.49.96 has been banned for [WebApp Attack]
...
2020-06-25 01:30:12

Recently Reported IPs

152.67.67.11 220.102.179.93 208.176.10.62 159.33.22.34
37.88.213.132 154.187.43.225 39.182.74.30 35.187.145.251
23.123.76.80 196.150.189.118 201.162.47.151 174.81.103.3
42.107.32.231 104.44.206.107 111.203.150.39 94.130.149.34
129.174.135.125 110.186.99.137 186.53.81.154 71.71.26.11