Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Indonesia

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
IP Type Details Datetime
114.142.172.29 attackbots
20/7/16@23:53:14: FAIL: Alarm-Network address from=114.142.172.29
...
2020-07-17 17:02:17
114.142.172.22 attackbots
Honeypot attack, port: 445, PTR: subs20-114-142-172-22.three.co.id.
2020-07-05 22:13:00
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 114.142.172.46
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 48696
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;114.142.172.46.			IN	A

;; AUTHORITY SECTION:
.			277	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022030700 1800 900 604800 86400

;; Query time: 55 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Mar 08 00:31:15 CST 2022
;; MSG SIZE  rcvd: 107
Host info
46.172.142.114.in-addr.arpa domain name pointer subs20-114-142-172-46.three.co.id.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
46.172.142.114.in-addr.arpa	name = subs20-114-142-172-46.three.co.id.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
46.35.184.187 attackspam
IP was detected trying to Brute-Force SSH, FTP, Web Apps, Port-Scan or Hacking.
2019-12-27 22:39:17
191.185.184.66 attackspam
TCP Port Scanning
2019-12-27 22:38:21
185.156.73.60 attackbotsspam
Dec 27 15:18:29 debian-2gb-nbg1-2 kernel: \[1109032.577906\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=185.156.73.60 DST=195.201.40.59 LEN=40 TOS=0x00 PREC=0x00 TTL=247 ID=45409 PROTO=TCP SPT=54074 DPT=49432 WINDOW=1024 RES=0x00 SYN URGP=0
2019-12-27 22:27:25
54.36.163.88 attackspambots
Dec 27 14:42:13 vpn01 sshd[14331]: Failed password for root from 54.36.163.88 port 50394 ssh2
...
2019-12-27 22:38:00
1.212.71.18 attackspam
Invalid user johnny from 1.212.71.18 port 52762
2019-12-27 22:26:22
118.70.74.152 attackspambots
1577427586 - 12/27/2019 07:19:46 Host: 118.70.74.152/118.70.74.152 Port: 445 TCP Blocked
2019-12-27 22:18:49
218.92.0.173 attackbotsspam
Dec 27 15:01:33 markkoudstaal sshd[8506]: Failed password for root from 218.92.0.173 port 24351 ssh2
Dec 27 15:01:36 markkoudstaal sshd[8506]: Failed password for root from 218.92.0.173 port 24351 ssh2
Dec 27 15:01:47 markkoudstaal sshd[8506]: error: maximum authentication attempts exceeded for root from 218.92.0.173 port 24351 ssh2 [preauth]
2019-12-27 22:13:18
77.247.110.183 attackspambots
MultiHost/MultiPort Probe, Scan, Hack -
2019-12-27 22:34:38
117.35.201.2 attackbots
SSH Brute-Force reported by Fail2Ban
2019-12-27 22:35:19
120.227.192.241 attack
Scanning
2019-12-27 22:29:14
223.71.139.97 attack
Dec 27 17:32:03 server sshd\[10224\]: Invalid user helene from 223.71.139.97
Dec 27 17:32:03 server sshd\[10224\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=223.71.139.97 
Dec 27 17:32:05 server sshd\[10224\]: Failed password for invalid user helene from 223.71.139.97 port 55924 ssh2
Dec 27 17:38:05 server sshd\[11645\]: Invalid user nely from 223.71.139.97
Dec 27 17:38:05 server sshd\[11645\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=223.71.139.97 
...
2019-12-27 22:43:23
51.77.148.87 attackbots
Invalid user bhays from 51.77.148.87 port 32774
2019-12-27 22:31:27
5.132.115.161 attackbots
Dec 27 15:11:26 localhost sshd\[9598\]: Invalid user admin24 from 5.132.115.161 port 35958
Dec 27 15:11:26 localhost sshd\[9598\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=5.132.115.161
Dec 27 15:11:27 localhost sshd\[9598\]: Failed password for invalid user admin24 from 5.132.115.161 port 35958 ssh2
2019-12-27 22:30:20
193.33.233.254 attackbotsspam
[portscan] Port scan
2019-12-27 22:09:01
183.16.101.201 attackspambots
firewall-block, port(s): 4899/tcp
2019-12-27 22:48:17

Recently Reported IPs

114.142.167.132 114.142.180.3 114.143.122.162 114.143.224.194
114.143.33.145 114.143.61.94 114.147.26.90 114.147.27.137
114.147.29.114 114.157.40.101 114.160.53.230 114.170.54.3
114.171.155.47 114.174.54.185 114.188.72.91 114.198.129.178
114.198.160.195 114.200.196.96 114.200.229.77 114.202.2.31