Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Indonesia

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
IP Type Details Datetime
119.82.242.153 attackbotsspam
 TCP (SYN) 119.82.242.153:53910 -> port 23, len 40
2020-05-20 06:59:59
119.82.242.58 attackbots
"Account brute force using dictionary attack against Exchange Online"
2019-08-06 02:22:29
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 119.82.242.214
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 28165
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;119.82.242.214.			IN	A

;; AUTHORITY SECTION:
.			475	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022020701 1800 900 604800 86400

;; Query time: 63 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Feb 08 05:55:43 CST 2022
;; MSG SIZE  rcvd: 107
Host info
214.242.82.119.in-addr.arpa domain name pointer ip-242-214.datautama.net.id.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
214.242.82.119.in-addr.arpa	name = ip-242-214.datautama.net.id.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
198.108.67.49 attack
12/28/2019-11:07:25.128864 198.108.67.49 Protocol: 6 ET DROP Dshield Block Listed Source group 1
2019-12-29 00:23:06
187.167.73.50 attackbots
Automatic report - Port Scan Attack
2019-12-29 00:22:25
94.191.20.173 attack
ssh failed login
2019-12-29 00:30:33
167.114.24.186 attackspam
firewall-block, port(s): 631/tcp
2019-12-29 00:10:52
211.24.103.165 attackbotsspam
Dec 28 17:02:43 sso sshd[30919]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=211.24.103.165
Dec 28 17:02:45 sso sshd[30919]: Failed password for invalid user kowalla from 211.24.103.165 port 36414 ssh2
...
2019-12-29 00:06:49
186.179.137.4 attackspam
Unauthorized connection attempt detected from IP address 186.179.137.4 to port 81
2019-12-29 00:45:16
187.178.73.46 attackbotsspam
Unauthorized connection attempt detected from IP address 187.178.73.46 to port 23
2019-12-29 00:44:19
188.136.168.67 attackbots
Unauthorized connection attempt detected from IP address 188.136.168.67 to port 80
2019-12-29 00:43:51
35.178.211.234 attackbots
Automatic report - XMLRPC Attack
2019-12-29 00:15:45
63.81.87.130 attackbots
Dec 28 15:28:35  exim[4048]: [1\53] 1ilD4z-00013I-GK H=known.vidyad.com (known.alibash.com) [63.81.87.130] F= rejected after DATA: This message scored 99.0 spam points.
2019-12-29 00:09:52
178.220.173.48 attackbotsspam
Fail2Ban Ban Triggered
2019-12-29 00:13:50
203.162.230.150 attackbotsspam
Dec 28 15:16:03 dev0-dcde-rnet sshd[15533]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=203.162.230.150
Dec 28 15:16:05 dev0-dcde-rnet sshd[15533]: Failed password for invalid user profesoara from 203.162.230.150 port 49038 ssh2
Dec 28 15:28:53 dev0-dcde-rnet sshd[15588]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=203.162.230.150
2019-12-29 00:14:22
41.224.254.72 attackbots
Unauthorized connection attempt detected from IP address 41.224.254.72 to port 23
2019-12-29 00:50:14
176.113.161.64 attack
Port scan detected on ports: 8080[TCP], 8080[TCP], 8080[TCP]
2019-12-29 00:32:52
49.88.67.49 attackbotsspam
Email spam message
2019-12-29 00:07:25

Recently Reported IPs

139.99.99.165 50.4.133.76 223.88.74.67 45.79.194.186
189.210.73.86 78.83.128.63 120.85.114.157 183.88.232.207
139.255.10.234 171.101.226.51 185.244.217.194 78.137.17.224
138.197.174.67 152.44.34.36 201.208.7.252 45.64.178.198
113.53.247.221 172.104.215.45 110.78.149.69 84.54.92.200