Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Indonesia

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
IP Type Details Datetime
114.5.145.70 attackspam
Email rejected due to spam filtering
2020-03-19 19:21:50
114.5.145.109 attackbotsspam
20/3/10@08:44:31: FAIL: Alarm-Network address from=114.5.145.109
20/3/10@08:44:32: FAIL: Alarm-Network address from=114.5.145.109
...
2020-03-10 23:29:36
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 114.5.145.147
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 63642
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;114.5.145.147.			IN	A

;; AUTHORITY SECTION:
.			600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022021300 1800 900 604800 86400

;; Query time: 55 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Feb 13 13:45:15 CST 2022
;; MSG SIZE  rcvd: 106
Host info
147.145.5.114.in-addr.arpa domain name pointer 114-5-145-147.resources.indosat.com.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
147.145.5.114.in-addr.arpa	name = 114-5-145-147.resources.indosat.com.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
5.206.235.97 attackbotsspam
May 30 22:28:03 carla sshd[14711]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=5.206.235.97  user=r.r
May 30 22:28:05 carla sshd[14711]: Failed password for r.r from 5.206.235.97 port 55124 ssh2
May 30 22:28:05 carla sshd[14712]: Received disconnect from 5.206.235.97: 11: Bye Bye
May 30 22:40:48 carla sshd[14980]: Invalid user postgres from 5.206.235.97
May 30 22:40:48 carla sshd[14980]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=5.206.235.97 
May 30 22:40:49 carla sshd[14980]: Failed password for invalid user postgres from 5.206.235.97 port 42258 ssh2
May 30 22:40:49 carla sshd[14981]: Received disconnect from 5.206.235.97: 11: Bye Bye
May 30 22:45:11 carla sshd[15073]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=5.206.235.97  user=r.r
May 30 22:45:14 carla sshd[15073]: Failed password for r.r from 5.206.235.97 port 47408 ssh2
May 30 22:4........
-------------------------------
2020-06-01 03:29:41
162.243.138.242 attackspambots
GPL SNMP public access udp - port: 161 proto: UDP cat: Attempted Information Leak
2020-06-01 03:35:27
95.111.240.249 attackbots
 UDP 95.111.240.249:5070 -> port 65476, len 441
2020-06-01 03:39:13
111.231.93.35 attack
SSH Brute Force
2020-06-01 03:22:55
49.88.112.109 attack
Port scan denied
2020-06-01 03:48:59
195.54.166.81 attackbotsspam
ET DROP Dshield Block Listed Source group 1 - port: 47048 proto: TCP cat: Misc Attack
2020-06-01 03:54:24
80.82.78.104 attackspam
Unauthorized connection attempt detected from IP address 80.82.78.104 to port 80 [T]
2020-06-01 03:44:21
124.93.160.82 attackbots
SSH Brute Force
2020-06-01 03:19:35
118.24.197.247 attackspambots
SSH Brute Force
2020-06-01 03:21:42
222.174.57.170 attackspambots
ET SCAN Suspicious inbound to MSSQL port 1433 - port: 1433 proto: TCP cat: Potentially Bad Traffic
2020-06-01 03:51:27
51.178.78.154 attack
ET CINS Active Threat Intelligence Poor Reputation IP group 36 - port: 6379 proto: TCP cat: Misc Attack
2020-06-01 03:48:14
195.54.167.40 attack
ET DROP Dshield Block Listed Source group 1 - port: 60773 proto: TCP cat: Misc Attack
2020-06-01 03:53:34
68.183.187.234 attackbotsspam
Port scan denied
2020-06-01 03:45:59
197.155.40.6 attackbots
ET SCAN Suspicious inbound to MSSQL port 1433 - port: 1433 proto: TCP cat: Potentially Bad Traffic
2020-06-01 03:32:24
91.204.188.218 attack
Automatic report - Banned IP Access
2020-06-01 03:41:05

Recently Reported IPs

114.69.242.233 114.67.192.199 114.78.30.236 114.79.131.162
114.79.137.170 114.79.39.238 114.69.238.2 114.7.162.90
114.79.185.107 114.79.174.234 114.82.104.24 114.72.57.21
114.79.157.101 114.82.109.135 114.82.2.180 114.83.174.105
114.82.136.57 114.79.180.74 114.80.183.234 114.82.4.66