Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: None

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
IP Type Details Datetime
114.6.29.30 attackspam
Port probing on unauthorized port 445
2020-08-12 18:58:34
114.6.29.30 attackspam
SSH Invalid Login
2020-03-30 05:47:31
114.6.29.30 attack
Mar 22 10:27:51 firewall sshd[30103]: Invalid user idalia from 114.6.29.30
Mar 22 10:27:54 firewall sshd[30103]: Failed password for invalid user idalia from 114.6.29.30 port 46968 ssh2
Mar 22 10:31:43 firewall sshd[30237]: Invalid user hazelle from 114.6.29.30
...
2020-03-22 22:13:14
114.6.29.30 attack
2020-01-17T14:03:13.436248shield sshd\[27425\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=114.6.29.30  user=root
2020-01-17T14:03:15.393001shield sshd\[27425\]: Failed password for root from 114.6.29.30 port 39002 ssh2
2020-01-17T14:07:24.070753shield sshd\[28113\]: Invalid user mc from 114.6.29.30 port 53718
2020-01-17T14:07:24.079527shield sshd\[28113\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=114.6.29.30
2020-01-17T14:07:26.160715shield sshd\[28113\]: Failed password for invalid user mc from 114.6.29.30 port 53718 ssh2
2020-01-17 22:39:17
114.6.29.30 attackbotsspam
@LucianNitescu Personal Honeypot Network <<<>>> Donate at paypal.me/LNitescu <<<>>> 2019-09-12 03:42:55,845 INFO [amun_request_handler] PortScan Detected on Port: 445 (114.6.29.30)
2019-09-12 15:04:35
114.6.29.254 attackspambots
Unauthorized connection attempt from IP address 114.6.29.254 on Port 445(SMB)
2019-09-09 22:33:30
114.6.29.242 attackspam
DATE:2019-08-12 14:44:30, IP:114.6.29.242, PORT:telnet Telnet brute force auth on honeypot server (honey-neo-dc)
2019-08-12 21:18:41
114.6.25.5 attack
Jun 17 10:44:37 mxgate1 postfix/postscreen[12641]: CONNECT from [114.6.25.5]:57688 to [176.31.12.44]:25
Jun 17 10:44:37 mxgate1 postfix/dnsblog[12642]: addr 114.6.25.5 listed by domain zen.spamhaus.org as 127.0.0.4
Jun 17 10:44:37 mxgate1 postfix/dnsblog[12642]: addr 114.6.25.5 listed by domain zen.spamhaus.org as 127.0.0.3
Jun 17 10:44:37 mxgate1 postfix/dnsblog[12646]: addr 114.6.25.5 listed by domain cbl.abuseat.org as 127.0.0.2
Jun 17 10:44:37 mxgate1 postfix/dnsblog[12645]: addr 114.6.25.5 listed by domain bl.spamcop.net as 127.0.0.2
Jun 17 10:44:37 mxgate1 postfix/dnsblog[12644]: addr 114.6.25.5 listed by domain ix.dnsbl.xxxxxx.net as 127.0.0.2
Jun 17 10:44:38 mxgate1 postfix/postscreen[12641]: PREGREET 39 after 0.57 from [114.6.25.5]:57688: EHLO 114-6-25-5.resources.indosat.com

Jun 17 10:44:38 mxgate1 postfix/postscreen[12641]: DNSBL rank 5 for [114.6.25.5]:57688
Jun x@x
Jun 17 10:44:40 mxgate1 postfix/postscreen[12641]: HANGUP after 2 from [114.6.25.5]:57688 in........
-------------------------------
2019-06-21 13:14:23
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 114.6.2.56
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 40854
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;114.6.2.56.			IN	A

;; AUTHORITY SECTION:
.			505	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022030400 1800 900 604800 86400

;; Query time: 17 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Mar 05 03:31:34 CST 2022
;; MSG SIZE  rcvd: 103
Host info
56.2.6.114.in-addr.arpa domain name pointer lte-project.indosatooredoo.com.
56.2.6.114.in-addr.arpa domain name pointer lte-project.indosat.com.
56.2.6.114.in-addr.arpa domain name pointer ppm.indosatooredoo.com.
56.2.6.114.in-addr.arpa domain name pointer ppm.indosat.com.
56.2.6.114.in-addr.arpa domain name pointer nd-projects.indosatooredoo.com.
56.2.6.114.in-addr.arpa domain name pointer nd-projects.indosat.com.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
56.2.6.114.in-addr.arpa	name = lte-project.indosatooredoo.com.
56.2.6.114.in-addr.arpa	name = lte-project.indosat.com.
56.2.6.114.in-addr.arpa	name = ppm.indosatooredoo.com.
56.2.6.114.in-addr.arpa	name = ppm.indosat.com.
56.2.6.114.in-addr.arpa	name = nd-projects.indosatooredoo.com.
56.2.6.114.in-addr.arpa	name = nd-projects.indosat.com.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
212.64.95.2 attackbots
k+ssh-bruteforce
2020-04-17 22:29:39
37.49.226.115 attack
MultiHost/MultiPort Probe, Scan, Hack -
2020-04-17 22:17:06
119.139.199.169 attack
2020-04-17T10:48:08.655006abusebot.cloudsearch.cf sshd[26084]: Invalid user admin from 119.139.199.169 port 46566
2020-04-17T10:48:08.661391abusebot.cloudsearch.cf sshd[26084]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=119.139.199.169
2020-04-17T10:48:08.655006abusebot.cloudsearch.cf sshd[26084]: Invalid user admin from 119.139.199.169 port 46566
2020-04-17T10:48:10.309493abusebot.cloudsearch.cf sshd[26084]: Failed password for invalid user admin from 119.139.199.169 port 46566 ssh2
2020-04-17T10:55:26.679947abusebot.cloudsearch.cf sshd[26755]: Invalid user um from 119.139.199.169 port 37730
2020-04-17T10:55:26.686051abusebot.cloudsearch.cf sshd[26755]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=119.139.199.169
2020-04-17T10:55:26.679947abusebot.cloudsearch.cf sshd[26755]: Invalid user um from 119.139.199.169 port 37730
2020-04-17T10:55:29.131833abusebot.cloudsearch.cf sshd[26755]: Failed passwor
...
2020-04-17 22:33:21
103.99.3.70 attackbotsspam
SSH invalid-user multiple login try
2020-04-17 22:22:07
34.98.123.114 attack
scans 69 times in preceeding hours on the ports (in chronological order) 2125 2125 2125 2125 2125 62955 62955 62955 62955 60189 62955 60189 60189 60189 60189 44660 44660 44660 44660 44660 16436 16436 16436 16436 16436 53259 53259 53259 53259 53259 53259 30969 30969 26755 26755 26755 26755 26755 28197 28197 28197 28197 28197 26512 26512 26512 26512 26512 26512 47132 47132 47132 47132 47132 19752 19752 19752 19752 19752 25087 25087 25087 25087 25087 5486 5486 5486 5486 5486
2020-04-17 22:27:37
78.188.151.201 attack
Unauthorized connection attempt detected from IP address 78.188.151.201 to port 23
2020-04-17 22:30:45
213.251.184.102 attack
$f2bV_matches
2020-04-17 22:58:53
63.240.240.74 attack
Apr 17 08:35:23 ws24vmsma01 sshd[119116]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=63.240.240.74
Apr 17 08:35:25 ws24vmsma01 sshd[119116]: Failed password for invalid user yf from 63.240.240.74 port 59780 ssh2
...
2020-04-17 22:24:51
101.198.180.207 attack
Apr  5 08:53:17 r.ca sshd[30916]: Failed password for root from 101.198.180.207 port 46868 ssh2
2020-04-17 22:34:46
2.57.207.110 attackbots
Telnet/23 MH Probe, Scan, BF, Hack -
2020-04-17 22:12:49
161.0.72.47 attack
Automatic report - Port Scan Attack
2020-04-17 22:52:12
157.230.127.240 attackbots
Apr  3 04:43:18 r.ca sshd[26043]: Failed password for invalid user ruby from 157.230.127.240 port 56406 ssh2
2020-04-17 22:36:33
54.39.215.32 attackbots
ET CINS Active Threat Intelligence Poor Reputation IP group 37 - port: 5093 proto: UDP cat: Misc Attack
2020-04-17 22:57:17
116.110.66.175 attackbots
Telnet/23 MH Probe, Scan, BF, Hack -
2020-04-17 22:41:32
218.92.0.173 attackbotsspam
Apr 17 16:22:04 server sshd[26422]: Failed none for root from 218.92.0.173 port 34472 ssh2
Apr 17 16:22:06 server sshd[26422]: Failed password for root from 218.92.0.173 port 34472 ssh2
Apr 17 16:22:10 server sshd[26422]: Failed password for root from 218.92.0.173 port 34472 ssh2
2020-04-17 22:32:00

Recently Reported IPs

114.6.2.51 114.6.225.145 114.6.2.82 114.6.227.30
114.6.242.17 114.6.243.1 114.6.246.196 114.6.246.194
114.6.246.225 115.223.139.224 114.6.246.234 114.6.25.182
114.6.246.65 114.6.27.199 114.6.29.178 114.6.29.234
114.6.30.106 114.6.31.222 114.6.27.206 114.6.32.101