Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Yogyakarta

Region: Yogyakarta

Country: Indonesia

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 117.20.54.190
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 64719
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;117.20.54.190.			IN	A

;; AUTHORITY SECTION:
.			29	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025042902 1800 900 604800 86400

;; Query time: 38 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Apr 30 13:35:51 CST 2025
;; MSG SIZE  rcvd: 106
Host info
190.54.20.117.in-addr.arpa domain name pointer 117-20-54-190.jogja.citra.net.id.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
190.54.20.117.in-addr.arpa	name = 117-20-54-190.jogja.citra.net.id.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
42.114.162.21 attackspam
Unauthorised access (Jan 16) SRC=42.114.162.21 LEN=52 TTL=109 ID=3403 DF TCP DPT=445 WINDOW=8192 SYN
2020-01-17 02:15:10
218.92.0.138 attackbots
Tried sshing with brute force.
2020-01-17 02:24:36
41.251.231.76 attackspambots
SSH_scan
2020-01-17 02:03:17
103.141.137.39 attackspambots
Try access to SMTP/POP/IMAP server.
2020-01-17 02:21:28
41.250.116.34 attack
SSH_scan
2020-01-17 02:06:03
76.10.14.245 attack
SSH invalid-user multiple login try
2020-01-17 02:01:51
36.72.164.128 attackbotsspam
firewall-block, port(s): 445/tcp
2020-01-17 02:06:57
185.47.97.67 attackspambots
Jan 16 20:13:41 www sshd\[64532\]: Invalid user ismail from 185.47.97.67
Jan 16 20:13:41 www sshd\[64532\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=185.47.97.67
Jan 16 20:13:43 www sshd\[64532\]: Failed password for invalid user ismail from 185.47.97.67 port 37758 ssh2
...
2020-01-17 02:22:27
114.99.1.238 attackspambots
SMTP nagging
2020-01-17 01:58:37
212.46.204.102 attackbots
1579179560 - 01/16/2020 13:59:20 Host: 212.46.204.102/212.46.204.102 Port: 445 TCP Blocked
2020-01-17 02:27:58
199.231.185.95 attackbotsspam
Invalid user osni from 199.231.185.95 port 52940
2020-01-17 02:30:48
201.22.95.52 attack
Invalid user vmail from 201.22.95.52 port 44735
2020-01-17 02:30:35
150.95.153.137 attack
Unauthorized connection attempt detected from IP address 150.95.153.137 to port 2220 [J]
2020-01-17 02:15:36
200.229.69.72 attack
Invalid user 888888 from 200.229.69.72 port 1582
2020-01-17 01:57:42
118.24.178.224 attack
Unauthorized connection attempt detected from IP address 118.24.178.224 to port 2220 [J]
2020-01-17 01:58:14

Recently Reported IPs

47.251.93.227 115.126.76.2 183.247.162.85 191.22.247.106
91.201.54.7 10.75.223.165 146.190.223.218 73.67.0.234
59.120.60.100 121.15.142.82 105.96.8.54 147.185.132.207
134.206.146.180 36.81.10.111 113.183.42.214 165.22.96.81
120.33.23.250 170.64.144.19 177.47.192.74 170.64.144.223