Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Jakarta

Region: Jakarta

Country: Indonesia

Internet Service Provider: unknown

Hostname: unknown

Organization: Laxo Global Akses, PT

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
IP Type Details Datetime
119.2.41.146 attackspam
Spam
2020-08-14 23:22:42
Whois info:
b
Dig info:

; <<>> DiG 9.10.3-P4-Ubuntu <<>> 119.2.41.66
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 60355
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;119.2.41.66.			IN	A

;; AUTHORITY SECTION:
.			3600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019061101 1800 900 604800 86400

;; Query time: 3 msec
;; SERVER: 67.207.67.2#53(67.207.67.2)
;; WHEN: Wed Jun 12 07:11:00 CST 2019
;; MSG SIZE  rcvd: 115

Host info
66.41.2.119.in-addr.arpa domain name pointer ip-119.2.41.66.laxo.net.id.
Nslookup info:
Server:		67.207.67.2
Address:	67.207.67.2#53

Non-authoritative answer:
66.41.2.119.in-addr.arpa	name = ip-119.2.41.66.laxo.net.id.

Authoritative answers can be found from:

Related IP info:
Related comments:
IP Type Details Datetime
183.103.61.243 attackbots
Invalid user oracle from 183.103.61.243 port 53510
2019-09-13 11:18:19
14.141.174.123 attackspambots
Invalid user vbox from 14.141.174.123 port 52356
2019-09-13 11:09:30
77.247.110.135 attack
\[2019-09-12 23:25:11\] SECURITY\[20693\] res_security_log.c: SecurityEvent="FailedACL",EventTV="2019-09-12T23:25:11.518-0400",Severity="Error",Service="SIP",EventVersion="1",AccountID="4397801148333554002",SessionID="0x7f8a6c03a738",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/77.247.110.135/50519",ACLName="no_extension_match"
\[2019-09-12 23:25:51\] SECURITY\[20693\] res_security_log.c: SecurityEvent="FailedACL",EventTV="2019-09-12T23:25:51.587-0400",Severity="Error",Service="SIP",EventVersion="1",AccountID="1545601148833566007",SessionID="0x7f8a6c40bb88",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/77.247.110.135/61096",ACLName="no_extension_match"
\[2019-09-12 23:25:53\] SECURITY\[20693\] res_security_log.c: SecurityEvent="FailedACL",EventTV="2019-09-12T23:25:53.582-0400",Severity="Error",Service="SIP",EventVersion="1",AccountID="2980401148857315011",SessionID="0x7f8a6c10e468",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/77.247.110.135/5647
2019-09-13 11:32:22
125.99.58.98 attack
Sep 13 03:58:01 meumeu sshd[25899]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=125.99.58.98 
Sep 13 03:58:03 meumeu sshd[25899]: Failed password for invalid user admin from 125.99.58.98 port 37264 ssh2
Sep 13 03:58:06 meumeu sshd[25899]: Failed password for invalid user admin from 125.99.58.98 port 37264 ssh2
Sep 13 03:58:09 meumeu sshd[25899]: Failed password for invalid user admin from 125.99.58.98 port 37264 ssh2
...
2019-09-13 10:48:55
178.128.87.245 attack
Invalid user temp from 178.128.87.245 port 40332
2019-09-13 11:21:12
192.42.116.28 attackspam
Invalid user zte from 192.42.116.28 port 44858
2019-09-13 11:14:50
112.198.194.243 attackspam
Invalid user ts3bot from 112.198.194.243 port 56745
2019-09-13 10:53:11
202.114.122.193 attackbots
Invalid user student from 202.114.122.193 port 43377
2019-09-13 11:12:32
162.247.74.74 attack
Invalid user zte from 162.247.74.74 port 54436
2019-09-13 11:23:08
46.101.17.215 attackspam
Invalid user tempuser from 46.101.17.215 port 58130
2019-09-13 11:06:00
36.89.214.234 attackbots
Sep 12 16:45:45 php1 sshd\[17880\]: Invalid user q1w2e3r4t5y6 from 36.89.214.234
Sep 12 16:45:45 php1 sshd\[17880\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=36.89.214.234
Sep 12 16:45:47 php1 sshd\[17880\]: Failed password for invalid user q1w2e3r4t5y6 from 36.89.214.234 port 40498 ssh2
Sep 12 16:52:10 php1 sshd\[18408\]: Invalid user passw0rd from 36.89.214.234
Sep 12 16:52:10 php1 sshd\[18408\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=36.89.214.234
2019-09-13 11:07:18
23.92.225.228 attack
Invalid user cactiuser from 23.92.225.228 port 42703
2019-09-13 11:09:01
41.33.119.67 attack
Invalid user sinusbot from 41.33.119.67 port 2654
2019-09-13 11:35:28
80.211.113.144 attackspam
Sep 12 21:43:40 aat-srv002 sshd[27627]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=80.211.113.144
Sep 12 21:43:41 aat-srv002 sshd[27627]: Failed password for invalid user wocloud from 80.211.113.144 port 46900 ssh2
Sep 12 21:50:22 aat-srv002 sshd[27756]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=80.211.113.144
Sep 12 21:50:24 aat-srv002 sshd[27756]: Failed password for invalid user minecraft from 80.211.113.144 port 35204 ssh2
...
2019-09-13 11:00:07
99.149.251.77 attackspambots
Invalid user user from 99.149.251.77 port 48724
2019-09-13 11:30:35

Recently Reported IPs

2a02:a448:57ae:1:e51e:35b5:984d:3850 166.21.243.145 2a02:a448:57ae:1:6569:fd7:35bb:a3a3 44.111.60.6
2a02:a448:57ae:1:14bf:4ed2:5b22:e939 189.237.16.58 35.240.119.132 40.78.248.228
218.166.140.185 121.119.13.58 104.116.143.99 187.74.231.161
221.162.45.84 46.105.98.178 131.147.87.31 103.241.242.69
162.155.159.199 190.36.167.164 70.125.100.210 41.206.61.116