Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Indonesia

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 114.7.51.133
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 56372
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;114.7.51.133.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025021101 1800 900 604800 86400

;; Query time: 66 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Feb 12 02:26:35 CST 2025
;; MSG SIZE  rcvd: 105
Host info
133.51.7.114.in-addr.arpa domain name pointer 114-7-51-133.resources.indosat.com.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
133.51.7.114.in-addr.arpa	name = 114-7-51-133.resources.indosat.com.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
81.22.45.65 attackbots
Oct 27 18:16:58 h2177944 kernel: \[5072406.071492\] \[UFW BLOCK\] IN=venet0 OUT= MAC= SRC=81.22.45.65 DST=85.214.117.9 LEN=40 TOS=0x00 PREC=0x00 TTL=249 ID=33549 PROTO=TCP SPT=46757 DPT=34432 WINDOW=1024 RES=0x00 SYN URGP=0 
Oct 27 18:20:49 h2177944 kernel: \[5072637.362021\] \[UFW BLOCK\] IN=venet0 OUT= MAC= SRC=81.22.45.65 DST=85.214.117.9 LEN=40 TOS=0x00 PREC=0x00 TTL=248 ID=15867 PROTO=TCP SPT=46757 DPT=33529 WINDOW=1024 RES=0x00 SYN URGP=0 
Oct 27 18:20:54 h2177944 kernel: \[5072642.599969\] \[UFW BLOCK\] IN=venet0 OUT= MAC= SRC=81.22.45.65 DST=85.214.117.9 LEN=40 TOS=0x00 PREC=0x00 TTL=249 ID=8650 PROTO=TCP SPT=46757 DPT=33899 WINDOW=1024 RES=0x00 SYN URGP=0 
Oct 27 18:28:22 h2177944 kernel: \[5073089.931160\] \[UFW BLOCK\] IN=venet0 OUT= MAC= SRC=81.22.45.65 DST=85.214.117.9 LEN=40 TOS=0x00 PREC=0x00 TTL=248 ID=46504 PROTO=TCP SPT=46757 DPT=34054 WINDOW=1024 RES=0x00 SYN URGP=0 
Oct 27 18:29:42 h2177944 kernel: \[5073169.581585\] \[UFW BLOCK\] IN=venet0 OUT= MAC= SRC=81.22.45.65 DST=85.214.117.9 LEN=40
2019-10-28 01:34:47
217.68.219.220 attack
Host is trying to send e-mails. Multiple unauthorized connections to SMTP Sever: tcp/25.
2019-10-28 01:45:46
62.210.72.161 attackbots
Oct 27 11:18:45 firewall sshd[21808]: Failed password for root from 62.210.72.161 port 45206 ssh2
Oct 27 11:22:52 firewall sshd[21881]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=62.210.72.161  user=root
Oct 27 11:22:55 firewall sshd[21881]: Failed password for root from 62.210.72.161 port 58678 ssh2
...
2019-10-28 02:00:29
217.68.219.14 attackbots
Host is trying to send e-mails. Multiple unauthorized connections to SMTP Sever: tcp/25.
2019-10-28 01:55:00
217.68.219.104 attackbotsspam
Host is trying to send e-mails. Multiple unauthorized connections to SMTP Sever: tcp/25.
2019-10-28 01:56:15
217.68.219.180 attackspambots
Host is trying to send e-mails. Multiple unauthorized connections to SMTP Sever: tcp/25.
2019-10-28 01:47:56
185.184.24.33 attackspambots
Oct 27 02:46:53 php1 sshd\[28103\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=185.184.24.33  user=root
Oct 27 02:46:55 php1 sshd\[28103\]: Failed password for root from 185.184.24.33 port 56162 ssh2
Oct 27 02:53:05 php1 sshd\[28635\]: Invalid user cstrike from 185.184.24.33
Oct 27 02:53:05 php1 sshd\[28635\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=185.184.24.33
Oct 27 02:53:07 php1 sshd\[28635\]: Failed password for invalid user cstrike from 185.184.24.33 port 38332 ssh2
2019-10-28 01:42:55
222.186.173.180 attackbotsspam
2019-10-27T18:32:19.885759lon01.zurich-datacenter.net sshd\[32602\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.173.180  user=root
2019-10-27T18:32:21.875627lon01.zurich-datacenter.net sshd\[32602\]: Failed password for root from 222.186.173.180 port 45418 ssh2
2019-10-27T18:32:26.195805lon01.zurich-datacenter.net sshd\[32602\]: Failed password for root from 222.186.173.180 port 45418 ssh2
2019-10-27T18:32:30.732289lon01.zurich-datacenter.net sshd\[32602\]: Failed password for root from 222.186.173.180 port 45418 ssh2
2019-10-27T18:32:35.288770lon01.zurich-datacenter.net sshd\[32602\]: Failed password for root from 222.186.173.180 port 45418 ssh2
...
2019-10-28 01:35:10
217.68.218.248 attack
Host is trying to send e-mails. Multiple unauthorized connections to SMTP Sever: tcp/25.
2019-10-28 02:08:01
217.68.218.195 attackspambots
Host is trying to send e-mails. Multiple unauthorized connections to SMTP Sever: tcp/25.
2019-10-28 02:11:36
217.68.219.166 attackspam
Host is trying to send e-mails. Multiple unauthorized connections to SMTP Sever: tcp/25.
2019-10-28 01:49:24
217.68.219.214 attack
Host is trying to send e-mails. Multiple unauthorized connections to SMTP Sever: tcp/25.
2019-10-28 01:46:09
92.222.84.202 attackbotsspam
2019-10-27T14:09:47.873670shield sshd\[29713\]: Invalid user elk from 92.222.84.202 port 49802
2019-10-27T14:09:47.879429shield sshd\[29713\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=202.ip-92-222-84.eu
2019-10-27T14:09:49.615756shield sshd\[29713\]: Failed password for invalid user elk from 92.222.84.202 port 49802 ssh2
2019-10-27T14:11:04.058330shield sshd\[29848\]: Invalid user es from 92.222.84.202 port 48310
2019-10-27T14:11:04.066968shield sshd\[29848\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=202.ip-92-222-84.eu
2019-10-28 01:34:15
217.68.219.128 attackspambots
Host is trying to send e-mails. Multiple unauthorized connections to SMTP Sever: tcp/25.
2019-10-28 01:54:35
178.128.215.16 attackbots
Oct 27 20:04:58 server sshd\[1624\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.128.215.16  user=root
Oct 27 20:05:00 server sshd\[1624\]: Failed password for root from 178.128.215.16 port 43896 ssh2
Oct 27 20:20:25 server sshd\[5401\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.128.215.16  user=root
Oct 27 20:20:26 server sshd\[5401\]: Failed password for root from 178.128.215.16 port 57458 ssh2
Oct 27 20:24:24 server sshd\[5901\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.128.215.16  user=root
...
2019-10-28 01:37:04

Recently Reported IPs

5.41.89.12 118.208.61.225 247.126.160.100 167.140.35.16
181.117.170.164 73.53.174.143 238.179.135.11 242.152.108.4
32.82.186.125 92.54.251.209 103.190.228.130 250.95.221.111
23.24.103.49 92.100.42.38 219.115.92.52 132.95.80.5
20.252.99.169 98.216.223.183 204.216.61.152 143.125.29.35