Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Indonesia

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
IP Type Details Datetime
114.199.113.38 attack
Spam detected 2020.05.23 14:01:56
blocked until 2020.06.17 10:33:19
2020-05-23 21:59:08
114.199.113.38 attackbots
spam
2020-04-15 16:05:30
114.199.113.38 attackbotsspam
TCP src-port=49012   dst-port=25   Listed on   dnsbl-sorbs abuseat-org barracuda       (Project Honey Pot rated Suspicious)   (500)
2020-03-13 06:00:34
114.199.113.38 attackspam
spam
2020-01-24 16:20:36
114.199.113.78 attack
Absender hat Spam-Falle ausgel?st
2019-12-19 16:16:30
114.199.113.78 attackbots
[ER hit] Tried to deliver spam. Already well known.
2019-11-05 07:23:07
114.199.113.38 attack
"Account brute force using dictionary attack against Exchange Online"
2019-08-06 03:53:03
114.199.113.78 attack
Absender hat Spam-Falle ausgel?st
2019-07-04 20:32:31
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 114.199.113.50
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 34081
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;114.199.113.50.			IN	A

;; AUTHORITY SECTION:
.			288	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022030501 1800 900 604800 86400

;; Query time: 20 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Mar 06 11:06:14 CST 2022
;; MSG SIZE  rcvd: 107
Host info
50.113.199.114.in-addr.arpa domain name pointer ip-114-199-113-50.netzap.net.id.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
50.113.199.114.in-addr.arpa	name = ip-114-199-113-50.netzap.net.id.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
202.134.165.15 attackspambots
Unauthorized connection attempt from IP address 202.134.165.15 on Port 445(SMB)
2019-08-30 20:30:22
41.138.88.26 attackspam
445/tcp 445/tcp 445/tcp...
[2019-06-30/08-30]37pkt,1pt.(tcp)
2019-08-30 20:34:25
51.15.1.221 attackbots
Aug 30 00:26:57 friendsofhawaii sshd\[19345\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=fight-for-privacy.fsociety.ltd  user=root
Aug 30 00:26:58 friendsofhawaii sshd\[19345\]: Failed password for root from 51.15.1.221 port 34448 ssh2
Aug 30 00:27:01 friendsofhawaii sshd\[19345\]: Failed password for root from 51.15.1.221 port 34448 ssh2
Aug 30 00:27:03 friendsofhawaii sshd\[19345\]: Failed password for root from 51.15.1.221 port 34448 ssh2
Aug 30 00:27:06 friendsofhawaii sshd\[19345\]: Failed password for root from 51.15.1.221 port 34448 ssh2
2019-08-30 20:33:06
220.167.234.218 attackspambots
Scanning random ports - tries to find possible vulnerable services
2019-08-30 20:46:46
116.22.198.163 attackbotsspam
SSH/22 MH Probe, BF, Hack -
2019-08-30 21:17:53
138.68.212.161 attackbots
40467/tcp
[2019-08-30]1pkt
2019-08-30 21:25:25
42.49.47.13 attackspambots
Port 1433 Scan
2019-08-30 21:28:17
92.220.29.21 attackbots
20 attempts against mh-misbehave-ban on pluto.magehost.pro
2019-08-30 20:24:11
119.27.189.46 attackspambots
Aug 30 14:47:32 eventyay sshd[19473]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=119.27.189.46
Aug 30 14:47:34 eventyay sshd[19473]: Failed password for invalid user sysadm from 119.27.189.46 port 59428 ssh2
Aug 30 14:53:26 eventyay sshd[20796]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=119.27.189.46
...
2019-08-30 21:03:44
14.190.138.155 attackbots
Unauthorized connection attempt from IP address 14.190.138.155 on Port 445(SMB)
2019-08-30 21:20:42
200.60.91.42 attackbotsspam
Aug 30 14:27:21 [host] sshd[16464]: Invalid user www from 200.60.91.42
Aug 30 14:27:21 [host] sshd[16464]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=200.60.91.42
Aug 30 14:27:22 [host] sshd[16464]: Failed password for invalid user www from 200.60.91.42 port 57754 ssh2
2019-08-30 21:17:02
113.190.233.212 attackspambots
Unauthorized connection attempt from IP address 113.190.233.212 on Port 445(SMB)
2019-08-30 21:26:04
218.92.0.192 attackspam
Aug 30 14:36:29 dcd-gentoo sshd[30814]: User root from 218.92.0.192 not allowed because none of user's groups are listed in AllowGroups
Aug 30 14:36:31 dcd-gentoo sshd[30814]: error: PAM: Authentication failure for illegal user root from 218.92.0.192
Aug 30 14:36:29 dcd-gentoo sshd[30814]: User root from 218.92.0.192 not allowed because none of user's groups are listed in AllowGroups
Aug 30 14:36:31 dcd-gentoo sshd[30814]: error: PAM: Authentication failure for illegal user root from 218.92.0.192
Aug 30 14:36:29 dcd-gentoo sshd[30814]: User root from 218.92.0.192 not allowed because none of user's groups are listed in AllowGroups
Aug 30 14:36:31 dcd-gentoo sshd[30814]: error: PAM: Authentication failure for illegal user root from 218.92.0.192
Aug 30 14:36:31 dcd-gentoo sshd[30814]: Failed keyboard-interactive/pam for invalid user root from 218.92.0.192 port 42941 ssh2
...
2019-08-30 21:21:21
35.224.113.101 attackspam
Honeypot attack, port: 2000, PTR: 101.113.224.35.bc.googleusercontent.com.
2019-08-30 21:14:24
75.50.59.234 attackbotsspam
Invalid user unity from 75.50.59.234 port 36160
2019-08-30 21:05:19

Recently Reported IPs

114.32.205.167 114.32.204.76 114.32.215.139 114.30.77.154
244.117.123.218 114.32.22.195 114.32.230.188 114.32.231.13
114.32.22.45 114.32.232.126 114.32.209.157 114.32.238.74
114.32.3.174 114.32.32.242 114.32.39.163 114.32.243.149
114.32.242.48 114.32.49.24 114.32.40.195 114.32.45.75