Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Indonesia

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 117.54.114.99
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 30222
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;117.54.114.99.			IN	A

;; AUTHORITY SECTION:
.			487	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022020700 1800 900 604800 86400

;; Query time: 57 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Feb 07 23:29:27 CST 2022
;; MSG SIZE  rcvd: 106
Host info
99.114.54.117.in-addr.arpa domain name pointer rev-117-54-114-99.indo.net.id.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
99.114.54.117.in-addr.arpa	name = rev-117-54-114-99.indo.net.id.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
2a00:d680:20:50::42 attackbotsspam
WordPress login Brute force / Web App Attack on client site.
2019-12-02 05:21:58
186.94.113.206 attackspam
Unauthorised access (Dec  1) SRC=186.94.113.206 LEN=52 TTL=115 ID=18696 DF TCP DPT=445 WINDOW=8192 SYN 
Unauthorised access (Dec  1) SRC=186.94.113.206 LEN=52 TTL=115 ID=22488 DF TCP DPT=445 WINDOW=8192 SYN
2019-12-02 05:37:11
91.207.40.45 attackbotsspam
Dec  1 18:05:37 mout sshd[28039]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=91.207.40.45  user=games
Dec  1 18:05:39 mout sshd[28039]: Failed password for games from 91.207.40.45 port 47566 ssh2
2019-12-02 05:36:12
171.251.22.179 attack
$f2bV_matches
2019-12-02 05:47:38
171.226.105.53 attackbotsspam
port scan and connect, tcp 23 (telnet)
2019-12-02 05:13:04
36.22.187.34 attackspam
$f2bV_matches
2019-12-02 05:09:13
49.81.93.227 attackspambots
Brute force SMTP login attempts.
2019-12-02 05:33:15
5.183.230.131 attackbotsspam
Port scan on 3 port(s): 2375 8427 8525
2019-12-02 05:32:50
77.235.127.12 attack
Unauthorised access (Dec  1) SRC=77.235.127.12 LEN=52 TTL=115 ID=536 DF TCP DPT=445 WINDOW=8192 SYN
2019-12-02 05:32:00
117.247.82.30 attackbots
$f2bV_matches
2019-12-02 05:16:59
220.176.204.91 attack
Dec  1 20:57:31 game-panel sshd[25054]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=220.176.204.91
Dec  1 20:57:33 game-panel sshd[25054]: Failed password for invalid user ubnt from 220.176.204.91 port 55173 ssh2
Dec  1 21:07:00 game-panel sshd[25374]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=220.176.204.91
2019-12-02 05:13:53
106.13.3.214 attack
Dec  1 15:27:18 vps666546 sshd\[29299\]: Invalid user cecily from 106.13.3.214 port 53012
Dec  1 15:27:18 vps666546 sshd\[29299\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.3.214
Dec  1 15:27:20 vps666546 sshd\[29299\]: Failed password for invalid user cecily from 106.13.3.214 port 53012 ssh2
Dec  1 15:35:50 vps666546 sshd\[29556\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.3.214  user=root
Dec  1 15:35:52 vps666546 sshd\[29556\]: Failed password for root from 106.13.3.214 port 58446 ssh2
...
2019-12-02 05:17:22
1.55.239.151 attackspam
Unauthorised access (Dec  1) SRC=1.55.239.151 LEN=52 TTL=106 ID=25833 DF TCP DPT=445 WINDOW=8192 SYN
2019-12-02 05:43:45
49.49.241.125 attackbotsspam
Dec  1 19:13:23 MK-Soft-Root1 sshd[30500]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.49.241.125 
Dec  1 19:13:24 MK-Soft-Root1 sshd[30500]: Failed password for invalid user temp from 49.49.241.125 port 19299 ssh2
...
2019-12-02 05:12:08
125.227.163.163 attackbots
" "
2019-12-02 05:25:46

Recently Reported IPs

35.198.85.1 222.139.75.191 182.127.209.162 194.5.12.15
45.83.64.133 68.71.249.153 176.50.213.84 113.190.16.44
85.172.31.16 31.173.124.114 162.193.245.62 184.154.61.170
121.43.184.83 82.56.55.86 93.143.44.24 223.72.57.250
103.93.76.205 42.248.120.42 211.36.141.231 101.37.17.247