Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Bandung

Region: Jawa Barat

Country: Indonesia

Internet Service Provider: 3

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
IP Type Details Datetime
116.206.14.24 attackspambots
20/8/2@16:22:11: FAIL: Alarm-Network address from=116.206.14.24
...
2020-08-03 07:36:00
116.206.14.51 attack
Unauthorized connection attempt from IP address 116.206.14.51 on Port 445(SMB)
2020-07-25 23:50:18
116.206.14.41 attack
Unauthorized connection attempt from IP address 116.206.14.41 on Port 445(SMB)
2020-06-10 02:30:40
116.206.14.15 attackbots
$f2bV_matches
2020-02-11 15:42:29
116.206.14.30 attackbotsspam
Honeypot attack, port: 445, PTR: subs30-116-206-14-30.three.co.id.
2020-02-03 01:47:45
116.206.14.61 attack
2019-10-0114:12:111iFH0l-0006hB-0s\<=info@imsuisse-sa.chH=194.162.229.201.l.sta.codetel.net.do\(imsuisse-sa.ch\)[201.229.162.194]:27326P=esmtpsaX=TLSv1.2:ECDHE-RSA-AES256-GCM-SHA384:256CV=noA=dovecot_plain:info@imsuisse-sa.chS=2384id=E85A1A6D-E132-4E6C-B8F6-F2C3643B4D53@imsuisse-sa.chT=""forjeffb@glenview.il.usjeffrey.ladd@klgates.comjeffrey.sriver@cityofchicago.orgjennifer.mcneil@urs.comJennifer.Tammen@cityofchicago.orgJessica-Leigh.Arends@meetingsfocus.com2019-10-0114:12:121iFH0l-0006dW-Ag\<=info@imsuisse-sa.chH=\(imsuisse-sa.ch\)[41.223.160.156]:8575P=esmtpsaX=TLSv1.2:ECDHE-RSA-AES256-GCM-SHA384:256CV=noA=dovecot_plain:info@imsuisse-sa.chS=2559id=7E657D39-0F36-4649-BC67-ED80260DEF78@imsuisse-sa.chT=""forggunther@Asplundh.comginger@techinsurance.comglaitman@Asplundh.comGloria.Pierce@BellSouth.comgmccaw@alcogare.comgpaulsson@comcast.netgrowell@summitsti.comgspence1@juno.comgthomas97@yahoo.com2019-10-0114:12:061iFH0g-0006hj-9j\<=info@imsuisse-sa.chH=\(imsuisse-sa.ch\)[46.53.72.52]:11830P=esmtpsaX=TLSv1.2:
2019-10-02 03:17:55
116.206.148.30 attack
Postfix SMTP rejection
...
2019-09-12 22:35:06
116.206.14.54 attack
[SMB remote code execution attempt: port tcp/445]
*(RWIN=8192)(08041230)
2019-08-05 01:22:36
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 116.206.14.16
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 45395
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;116.206.14.16.			IN	A

;; AUTHORITY SECTION:
.			521	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2023050500 1800 900 604800 86400

;; Query time: 66 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri May 05 17:21:07 CST 2023
;; MSG SIZE  rcvd: 106
Host info
16.14.206.116.in-addr.arpa domain name pointer subs30-116-206-14-16.three.co.id.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
16.14.206.116.in-addr.arpa	name = subs30-116-206-14-16.three.co.id.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
14.228.2.55 attack
Mail/25/465/587-993/995 Probe, Reject, BadAuth, Hack, SPAM -
2020-01-25 02:56:58
41.64.20.10 attack
Unauthorized connection attempt from IP address 41.64.20.10 on Port 445(SMB)
2020-01-25 02:37:22
85.93.20.98 attackbotsspam
SYN flood
2020-01-25 02:53:49
67.205.144.236 attack
Unauthorized connection attempt detected from IP address 67.205.144.236 to port 2220 [J]
2020-01-25 02:54:18
125.25.237.12 attack
20/1/24@07:32:42: FAIL: Alarm-Network address from=125.25.237.12
20/1/24@07:32:42: FAIL: Alarm-Network address from=125.25.237.12
...
2020-01-25 02:47:37
179.232.1.254 attack
Unauthorized connection attempt detected from IP address 179.232.1.254 to port 2220 [J]
2020-01-25 03:01:56
50.193.225.157 attack
RDP Bruteforce
2020-01-25 03:09:22
1.56.207.130 attackspambots
$f2bV_matches
2020-01-25 02:43:02
101.91.218.193 attackbotsspam
Unauthorized connection attempt detected from IP address 101.91.218.193 to port 2220 [J]
2020-01-25 02:49:54
92.63.194.26 attackbots
Jan 24 19:12:36 work-partkepr sshd\[3006\]: Invalid user admin from 92.63.194.26 port 34640
Jan 24 19:12:36 work-partkepr sshd\[3006\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=92.63.194.26
...
2020-01-25 03:17:22
117.69.253.252 attack
Brute force attempt
2020-01-25 02:41:58
178.32.47.97 attack
Unauthorized connection attempt detected from IP address 178.32.47.97 to port 2220 [J]
2020-01-25 02:46:59
177.34.125.113 attackspambots
Unauthorized connection attempt detected from IP address 177.34.125.113 to port 2220 [J]
2020-01-25 02:52:52
14.177.64.87 attack
1579869214 - 01/24/2020 13:33:34 Host: 14.177.64.87/14.177.64.87 Port: 445 TCP Blocked
2020-01-25 02:38:19
219.93.6.6 attack
Unauthorized connection attempt detected from IP address 219.93.6.6 to port 2220 [J]
2020-01-25 02:43:50

Recently Reported IPs

142.244.5.177 140.116.34.242 128.1.155.123 116.206.31.45
194.80.232.65 140.116.245.178 130.89.239.17 150.165.159.16
130.15.161.164 14.139.38.169 103.49.133.69 164.8.17.229
140.116.25.250 138.4.46.196 163.28.113.247 140.116.162.218
140.116.89.162 140.115.17.194 140.116.1.59 235.93.94.198