Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Jakarta

Region: Jakarta Raya

Country: Indonesia

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
IP Type Details Datetime
116.206.12.40 spambotsattackproxynormal
Mencuri jaringan
2021-08-25 07:35:53
116.206.12.48 spambotsattackproxynormal
Hack facebook
2021-01-12 13:59:03
116.206.12.35 attack
unauthorized connection attempt
2020-02-26 14:44:39
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 116.206.12.49
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 33694
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;116.206.12.49.			IN	A

;; AUTHORITY SECTION:
.			428	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2023050300 1800 900 604800 86400

;; Query time: 27 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed May 03 18:05:33 CST 2023
;; MSG SIZE  rcvd: 106
Host info
49.12.206.116.in-addr.arpa domain name pointer subs28-116-206-12-49.three.co.id.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
49.12.206.116.in-addr.arpa	name = subs28-116-206-12-49.three.co.id.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
122.14.199.102 attackspambots
Sep  6 08:47:04 markkoudstaal sshd[27083]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.14.199.102
Sep  6 08:47:06 markkoudstaal sshd[27083]: Failed password for invalid user csgoserver from 122.14.199.102 port 48489 ssh2
Sep  6 08:54:52 markkoudstaal sshd[27861]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.14.199.102
2019-09-06 14:55:46
146.164.21.68 attack
Sep  6 02:31:34 ny01 sshd[701]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=146.164.21.68
Sep  6 02:31:36 ny01 sshd[701]: Failed password for invalid user vbox from 146.164.21.68 port 50345 ssh2
Sep  6 02:36:59 ny01 sshd[1729]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=146.164.21.68
2019-09-06 14:51:18
125.215.207.40 attackbots
Sep  6 09:54:26 hosting sshd[23739]: Invalid user chris from 125.215.207.40 port 58117
...
2019-09-06 14:57:45
180.253.142.75 attack
@LucianNitescu Personal Honeypot Network <<<>>> Donate at paypal.me/LNitescu <<<>>> 2019-09-06 03:48:31,402 INFO [amun_request_handler] PortScan Detected on Port: 445 (180.253.142.75)
2019-09-06 15:14:59
121.67.246.139 attackbotsspam
Sep  6 07:12:22 tuotantolaitos sshd[9534]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.67.246.139
Sep  6 07:12:25 tuotantolaitos sshd[9534]: Failed password for invalid user admin from 121.67.246.139 port 49056 ssh2
...
2019-09-06 15:14:05
181.40.66.179 attackbots
Sep  6 09:07:43 vps01 sshd[11567]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=181.40.66.179
Sep  6 09:07:44 vps01 sshd[11567]: Failed password for invalid user safeuser from 181.40.66.179 port 53294 ssh2
2019-09-06 15:13:30
117.240.203.26 attackspambots
@LucianNitescu Personal Honeypot Network <<<>>> Donate at paypal.me/LNitescu <<<>>> 2019-09-06 03:52:58,486 INFO [amun_request_handler] PortScan Detected on Port: 445 (117.240.203.26)
2019-09-06 15:04:51
82.146.33.59 attackspambots
Sep  6 08:50:06 site2 sshd\[6402\]: Invalid user botpass from 82.146.33.59Sep  6 08:50:07 site2 sshd\[6402\]: Failed password for invalid user botpass from 82.146.33.59 port 54259 ssh2Sep  6 08:54:53 site2 sshd\[6522\]: Invalid user 123456 from 82.146.33.59Sep  6 08:54:55 site2 sshd\[6522\]: Failed password for invalid user 123456 from 82.146.33.59 port 47517 ssh2Sep  6 08:59:37 site2 sshd\[6653\]: Invalid user password from 82.146.33.59
...
2019-09-06 15:14:28
46.173.211.203 attackspambots
" "
2019-09-06 14:46:34
183.154.38.142 attack
Fail2Ban - FTP Abuse Attempt
2019-09-06 15:06:52
37.55.243.50 attack
web exploits
...
2019-09-06 14:52:01
185.196.118.119 attack
Automatic report - Banned IP Access
2019-09-06 15:20:52
212.42.206.37 attackbots
@LucianNitescu Personal Honeypot Network <<<>>> Donate at paypal.me/LNitescu <<<>>> 2019-09-06 03:53:37,940 INFO [amun_request_handler] PortScan Detected on Port: 445 (212.42.206.37)
2019-09-06 15:02:56
42.188.200.125 attackspambots
[Aegis] @ 2019-09-06 04:55:16  0100 -> Attempt to use mail server as relay (550: Requested action not taken).
2019-09-06 15:26:04
129.211.125.143 attack
Sep  5 21:00:02 hpm sshd\[31780\]: Invalid user qwer1234 from 129.211.125.143
Sep  5 21:00:02 hpm sshd\[31780\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.211.125.143
Sep  5 21:00:04 hpm sshd\[31780\]: Failed password for invalid user qwer1234 from 129.211.125.143 port 47809 ssh2
Sep  5 21:05:12 hpm sshd\[32201\]: Invalid user pass from 129.211.125.143
Sep  5 21:05:12 hpm sshd\[32201\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.211.125.143
2019-09-06 15:05:54

Recently Reported IPs

140.116.131.253 133.50.208.54 134.147.73.94 114.142.168.8
130.15.34.112 74.11.163.102 158.140.188.82 20.255.61.184
140.116.136.135 10.3.209.11 140.115.47.150 41.63.2.190
193.198.209.244 134.208.38.199 200.3.124.98 140.116.55.237
140.116.22.36 140.116.133.69 120.114.234.200 193.219.163.162