Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Yogyakarta

Region: Yogyakarta

Country: Indonesia

Internet Service Provider: unknown

Hostname: unknown

Organization: Hutchison CP Telecommunications, PT

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
IP Type Details Datetime
114.142.169.59 attackspambots
1599670498 - 09/09/2020 18:54:58 Host: 114.142.169.59/114.142.169.59 Port: 445 TCP Blocked
2020-09-10 23:12:57
114.142.169.59 attackspam
1599670498 - 09/09/2020 18:54:58 Host: 114.142.169.59/114.142.169.59 Port: 445 TCP Blocked
2020-09-10 14:44:00
114.142.169.59 attack
1599670498 - 09/09/2020 18:54:58 Host: 114.142.169.59/114.142.169.59 Port: 445 TCP Blocked
2020-09-10 05:22:49
114.142.169.62 attackbotsspam
20/8/26@23:46:38: FAIL: Alarm-Network address from=114.142.169.62
20/8/26@23:46:38: FAIL: Alarm-Network address from=114.142.169.62
...
2020-08-27 16:31:56
114.142.169.55 attack
Honeypot attack, port: 445, PTR: subs17-114-142-169-55.three.co.id.
2020-06-23 03:21:29
114.142.169.60 attackbotsspam
20/4/21@23:53:42: FAIL: Alarm-Network address from=114.142.169.60
20/4/21@23:53:43: FAIL: Alarm-Network address from=114.142.169.60
...
2020-04-22 15:18:07
114.142.169.39 attack
$f2bV_matches
2020-02-25 08:46:20
114.142.169.39 attackspambots
SSH authentication failure x 6 reported by Fail2Ban
...
2020-02-03 17:48:37
114.142.169.36 attackspambots
Honeypot attack, port: 445, PTR: subs17-114-142-169-36.three.co.id.
2020-01-27 21:35:57
Whois info:
b
Dig info:

; <<>> DiG 9.10.3-P4-Ubuntu <<>> 114.142.169.7
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 40133
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;114.142.169.7.			IN	A

;; AUTHORITY SECTION:
.			3600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019042001 1800 900 604800 86400

;; Query time: 1 msec
;; SERVER: 67.207.67.3#53(67.207.67.3)
;; WHEN: Sun Apr 21 11:57:13 +08 2019
;; MSG SIZE  rcvd: 117

Host info
7.169.142.114.in-addr.arpa domain name pointer subs17-114-142-169-7.three.co.id.
Nslookup info:
Server:		67.207.67.3
Address:	67.207.67.3#53

Non-authoritative answer:
7.169.142.114.in-addr.arpa	name = subs17-114-142-169-7.three.co.id.

Authoritative answers can be found from:

Related IP info:
Related comments:
IP Type Details Datetime
212.32.254.123 botsattack
Fraud connect
2025-01-20 17:52:44
134.255.55.228 attack
Unauthorized login into Microsoft Account with password that isn't supposed to be compromised according to haveibeenpwned.com
2025-01-11 16:08:27
3.140.210.46 attackproxy
Bad IP
2024-12-11 20:27:53
88.218.17.223 bots
88.218.17.223
2024-11-22 23:53:47
192.168.2.216 spambotsattacknormal
15263298866
2024-11-06 20:28:14
80.87.206.15 botsattack
Fraud connect
2025-01-20 14:05:49
167.94.138.167 attack
Fraud connect
2025-01-22 13:53:35
176.193.202.128 attackproxy
fraud connect
2025-01-15 13:48:39
176.29.123.2 attackproxy
الووووو
2025-01-08 04:40:45
3.141.6.85 attack
Fraud connect
2025-01-22 13:50:10
10.108.89.4 spam
https://watchnow.gomuviz.com/

My brother suggested I might like this website. He was entirely 
right. This post truly made my day. You can not imagine just how much time 
I had spent for this information! Thanks!
2024-11-18 04:07:19
2001:0002:14:5:1:2:bf35:2610 proxy
https://github.com/flutter/flutter/issues/160272#issue-2739221020
2024-12-15 03:06:28
100.255.250.33 attackproxy
Data
2025-01-15 01:02:54
108.167.164.191 spam
Spam
2024-11-20 21:59:13
104.28.198.246 attackproxy
Vulnerability Scanner
2024-12-11 20:24:36

Recently Reported IPs

91.9.73.154 201.39.45.50 112.66.63.126 105.190.156.1
32.174.126.191 90.133.180.77 49.76.80.185 241.26.110.50
218.164.169.87 106.12.38.109 81.61.244.131 208.252.95.167
116.27.52.112 174.26.211.107 154.249.82.227 176.55.94.5
177.130.52.214 177.196.172.253 215.68.15.102 63.33.135.203