Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Jakarta

Region: Jakarta

Country: Indonesia

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 114.56.211.137
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 58291
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;114.56.211.137.			IN	A

;; AUTHORITY SECTION:
.			304	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2020020101 1800 900 604800 86400

;; Query time: 99 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Feb 01 23:19:35 CST 2020
;; MSG SIZE  rcvd: 118
Host info
Host 137.211.56.114.in-addr.arpa not found: 2(SERVFAIL)
Nslookup info:
;; Got SERVFAIL reply from 100.100.2.136, trying next server
;; Got SERVFAIL reply from 100.100.2.138, trying next server
Server:		100.100.2.138
Address:	100.100.2.138#53

** server can't find 137.211.56.114.in-addr.arpa: SERVFAIL

Related IP info:
Related comments:
IP Type Details Datetime
132.232.60.183 attackbots
Sep 18 12:09:55 *hidden* sshd[40313]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=132.232.60.183 user=root Sep 18 12:09:57 *hidden* sshd[40313]: Failed password for *hidden* from 132.232.60.183 port 47984 ssh2 Sep 18 12:16:31 *hidden* sshd[42018]: Invalid user alain from 132.232.60.183 port 58460
2020-09-18 19:26:00
193.123.208.235 attackspam
Found on   CINS badguys     / proto=17  .  srcport=8801  .  dstport=40930  .     (1066)
2020-09-18 19:37:23
192.241.222.59 attackbotsspam
firewall-block, port(s): 1931/tcp
2020-09-18 19:35:57
109.104.128.134 attackspam
Port Scan
...
2020-09-18 19:28:31
41.72.197.182 attackspambots
$f2bV_matches
2020-09-18 19:20:44
78.96.147.168 attack
Automatic report - Port Scan Attack
2020-09-18 19:13:21
166.170.222.106 attackspam
Brute forcing email accounts
2020-09-18 19:34:14
154.202.14.120 attack
Fail2Ban Ban Triggered
2020-09-18 19:23:41
45.7.196.77 attackspam
ssh brute force
2020-09-18 19:35:16
45.144.65.49 attackspambots
Sep 18 09:20:03 vps647732 sshd[20155]: Failed password for root from 45.144.65.49 port 40036 ssh2
...
2020-09-18 19:40:23
222.252.11.10 attackspambots
Cowrie Honeypot: 3 unauthorised SSH/Telnet login attempts between 2020-09-18T10:44:07Z and 2020-09-18T10:53:28Z
2020-09-18 19:10:31
145.239.93.55 attackbots
SSH 2020-09-18 08:01:04	145.239.93.55	139.99.182.230	>	POST	heyyyyyjudeeeee.com	/wp-login.php	HTTP/1.1	-	-
2020-09-18 15:21:04	145.239.93.55	139.99.182.230	>	GET	hotelyanidenpasar.indonesiaroom.com	/wp-login.php	HTTP/1.1	-	-
2020-09-18 15:21:05	145.239.93.55	139.99.182.230	>	POST	hotelyanidenpasar.indonesiaroom.com	/wp-login.php	HTTP/1.1	-	-
2020-09-18 19:28:49
115.238.62.154 attack
Cowrie Honeypot: 3 unauthorised SSH/Telnet login attempts between 2020-09-18T09:15:39Z and 2020-09-18T09:23:39Z
2020-09-18 19:14:06
198.245.50.81 attack
B: Abusive ssh attack
2020-09-18 19:12:23
81.3.6.164 attackbots
Telnet/23 MH Probe, Scan, BF, Hack -
2020-09-18 19:34:52

Recently Reported IPs

185.244.142.18 136.13.10.111 167.251.19.226 222.84.254.139
180.48.140.241 121.159.80.59 215.185.192.61 222.56.70.189
143.135.65.124 72.90.54.104 50.107.98.232 95.240.202.25
1.220.170.49 204.12.7.211 64.225.119.93 189.249.176.232
118.96.134.33 80.82.77.236 185.216.140.36 58.56.104.228