Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Jakarta

Region: Jakarta

Country: Indonesia

Internet Service Provider: PT Indonesia Comnets Plus

Hostname: unknown

Organization: PT INDONESIA COMNETS PLUS

Usage Type: Fixed Line ISP

Comments:
Type Details Datetime
attackspam
Unauthorized connection attempt from IP address 119.252.171.122 on Port 445(SMB)
2020-09-19 22:05:08
attackspambots
Unauthorized connection attempt from IP address 119.252.171.122 on Port 445(SMB)
2020-09-19 13:57:04
attack
Unauthorized connection attempt from IP address 119.252.171.122 on Port 445(SMB)
2020-09-19 05:36:30
attack
Unauthorized connection attempt from IP address 119.252.171.122 on Port 445(SMB)
2020-01-30 03:56:15
attackbotsspam
Unauthorized connection attempt from IP address 119.252.171.122 on Port 445(SMB)
2019-12-16 06:19:04
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:

; <<>> DiG 9.10.3-P4-Ubuntu <<>> 119.252.171.122
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 10222
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;119.252.171.122.		IN	A

;; AUTHORITY SECTION:
.			2113	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019042500 1800 900 604800 86400

;; Query time: 0 msec
;; SERVER: 67.207.67.3#53(67.207.67.3)
;; WHEN: Fri Apr 26 02:28:44 +08 2019
;; MSG SIZE  rcvd: 119

Host info
122.171.252.119.in-addr.arpa domain name pointer 122.171.iconpln.net.id.
Nslookup info:
Server:		67.207.67.3
Address:	67.207.67.3#53

Non-authoritative answer:
122.171.252.119.in-addr.arpa	name = 122.171.iconpln.net.id.

Authoritative answers can be found from:

Related IP info:
Related comments:
IP Type Details Datetime
103.152.244.254 attackspam
Attempted connection to port 445.
2020-09-07 01:23:06
179.247.178.221 attackbots
Attempted connection to port 445.
2020-09-07 01:18:14
190.145.78.212 attack
 TCP (SYN) 190.145.78.212:16449 -> port 445, len 52
2020-09-07 01:37:09
195.54.160.180 attackbotsspam
[SID2] Fail2ban detected 5 failed SSH login attempts within 30 minutes. This report was submitted automatically.
2020-09-07 01:05:09
220.135.116.247 attackspambots
1599406068 - 09/06/2020 17:27:48 Host: 220.135.116.247/220.135.116.247 Port: 23 TCP Blocked
...
2020-09-07 01:31:00
121.52.150.219 attackspam
 TCP (SYN) 121.52.150.219:54623 -> port 1433, len 40
2020-09-07 01:07:52
60.8.123.159 attack
Forbidden directory scan :: 2020/09/05 16:45:57 [error] 1010#1010: *1532907 access forbidden by rule, client: 60.8.123.159, server: [censored_2], request: "GET /news/tag/depth:4 HTTP/1.1", host: "www.[censored_2]"
2020-09-07 01:33:22
218.102.106.61 attackbotsspam
Honeypot attack, port: 5555, PTR: pcd574061.netvigator.com.
2020-09-07 01:25:18
115.79.62.162 attack
Honeypot attack, port: 445, PTR: adsl.viettel.vn.
2020-09-07 01:35:52
61.7.144.24 attackbots
Honeypot attack, port: 445, PTR: PTR record not found
2020-09-07 01:39:45
194.99.105.206 attackbotsspam
Attempt to access VoIP server
2020-09-07 01:14:40
91.236.116.185 attackspam
MAIL: User Login Brute Force Attempt
2020-09-07 01:10:30
192.99.57.32 attack
2020-09-06T11:43:15.352298abusebot-7.cloudsearch.cf sshd[1164]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=32.ip-192-99-57.net  user=root
2020-09-06T11:43:17.887177abusebot-7.cloudsearch.cf sshd[1164]: Failed password for root from 192.99.57.32 port 45174 ssh2
2020-09-06T11:47:20.404258abusebot-7.cloudsearch.cf sshd[1217]: Invalid user downloader from 192.99.57.32 port 53548
2020-09-06T11:47:20.409789abusebot-7.cloudsearch.cf sshd[1217]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=32.ip-192-99-57.net
2020-09-06T11:47:20.404258abusebot-7.cloudsearch.cf sshd[1217]: Invalid user downloader from 192.99.57.32 port 53548
2020-09-06T11:47:21.911073abusebot-7.cloudsearch.cf sshd[1217]: Failed password for invalid user downloader from 192.99.57.32 port 53548 ssh2
2020-09-06T11:51:14.070771abusebot-7.cloudsearch.cf sshd[1223]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= 
...
2020-09-07 01:26:03
116.90.237.125 attack
failed attempts to access the website, searching for vulnerabilities, also using following IPs: 27.37.246.129 , 94.231.218.223 , 116.90.237.125 ,  190.235.214.78 ,  190.98.53.86 , 45.170.129.135 ,  170.239.242.222 , 43.249.113.243 ,  103.140.4.87 ,  171.103.190.158 , 72.210.252.135
2020-09-07 01:08:46
220.132.83.244 attackspambots
23/tcp 23/tcp
[2020-08-06/09-06]2pkt
2020-09-07 01:12:51

Recently Reported IPs

35.189.162.207 170.134.209.29 195.207.159.222 132.25.32.37
171.239.194.62 8.223.146.219 103.89.250.2 125.162.17.215
190.78.8.39 2.207.169.157 176.41.22.197 34.109.197.237
62.117.124.82 212.170.74.249 49.206.116.211 160.246.170.86
82.135.2.69 125.160.221.182 124.44.127.76 77.22.234.129