Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Indonesia

Internet Service Provider: PT Qiandra Information Technology

Hostname: unknown

Organization: unknown

Usage Type: Data Center/Web Hosting/Transit

Comments:
Type Details Datetime
attackbots
Unauthorized connection attempt from IP address 122.200.145.46 on Port 445(SMB)
2020-09-03 23:12:04
attackbots
Unauthorized connection attempt from IP address 122.200.145.46 on Port 445(SMB)
2020-09-03 14:46:08
attack
Unauthorized connection attempt from IP address 122.200.145.46 on Port 445(SMB)
2020-09-03 06:59:14
Comments on same subnet:
IP Type Details Datetime
122.200.145.44 attackspam
Unauthorized connection attempt from IP address 122.200.145.44 on Port 445(SMB)
2020-06-23 04:15:26
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 122.200.145.46
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 21109
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;122.200.145.46.			IN	A

;; AUTHORITY SECTION:
.			309	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2020090202 1800 900 604800 86400

;; Query time: 66 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Sep 03 06:59:10 CST 2020
;; MSG SIZE  rcvd: 118
Host info
46.145.200.122.in-addr.arpa domain name pointer host-145.46.qiandra.net.id.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
46.145.200.122.in-addr.arpa	name = host-145.46.qiandra.net.id.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
185.251.33.194 attackbotsspam
spam
2020-01-24 14:05:26
170.81.35.26 attackbots
spam
2020-01-24 13:47:04
222.186.30.209 attack
24.01.2020 05:33:04 SSH access blocked by firewall
2020-01-24 13:37:50
71.6.233.21 attackspam
spam
2020-01-24 14:14:48
195.112.252.180 attackbotsspam
spam
2020-01-24 13:44:49
222.186.42.4 attackbotsspam
Jan 24 06:32:03 ns3042688 sshd\[19091\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.42.4  user=root
Jan 24 06:32:06 ns3042688 sshd\[19091\]: Failed password for root from 222.186.42.4 port 43014 ssh2
Jan 24 06:32:18 ns3042688 sshd\[19091\]: Failed password for root from 222.186.42.4 port 43014 ssh2
Jan 24 06:32:22 ns3042688 sshd\[19130\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.42.4  user=root
Jan 24 06:32:24 ns3042688 sshd\[19130\]: Failed password for root from 222.186.42.4 port 7454 ssh2
...
2020-01-24 13:40:00
216.154.201.132 attackbots
spam
2020-01-24 13:59:55
177.44.82.68 attackspam
spam
2020-01-24 14:08:04
118.69.56.68 attackbots
spam
2020-01-24 13:48:35
177.73.47.110 attackbotsspam
spam
2020-01-24 14:07:37
106.240.86.211 attack
spam
2020-01-24 13:55:29
208.77.130.238 attackspam
spam
2020-01-24 13:50:23
195.9.123.218 attack
spam
2020-01-24 14:02:48
149.0.77.153 attack
spam
2020-01-24 13:55:07
190.64.147.19 attack
spam
2020-01-24 14:03:43

Recently Reported IPs

252.175.222.33 99.245.234.172 232.60.96.85 217.44.45.127
207.100.8.176 59.130.215.67 135.74.203.216 6.245.38.92
181.129.167.166 195.87.110.230 166.104.99.160 85.228.80.237
163.189.252.71 157.107.172.47 249.161.79.250 120.4.41.38
31.60.32.99 135.129.83.148 203.180.43.74 108.138.170.178