Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Indonesia

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
IP Type Details Datetime
180.241.229.226 attackbotsspam
Telnet Honeypot -> Telnet Bruteforce / Login
2020-08-04 07:34:49
180.241.229.178 attackbotsspam
report
2020-07-30 02:42:45
180.241.225.242 attackbots
1593316383 - 06/28/2020 05:53:03 Host: 180.241.225.242/180.241.225.242 Port: 445 TCP Blocked
2020-06-28 15:29:51
180.241.215.90 attackbotsspam
Automatic report - Port Scan Attack
2020-05-23 20:41:37
180.241.29.220 attackbots
Honeypot attack, port: 445, PTR: PTR record not found
2020-05-22 14:17:14
180.241.241.136 attack
Unauthorized connection attempt from IP address 180.241.241.136 on Port 445(SMB)
2020-05-06 21:25:11
180.241.221.12 attackspam
20/4/19@23:52:31: FAIL: Alarm-Network address from=180.241.221.12
20/4/19@23:52:31: FAIL: Alarm-Network address from=180.241.221.12
...
2020-04-20 18:36:52
180.241.213.132 attackspam
Sql/code injection probe
2020-04-10 22:52:03
180.241.249.2 attackbots
Unauthorized connection attempt detected from IP address 180.241.249.2 to port 445
2020-04-01 18:24:28
180.241.202.42 attackbots
1583892686 - 03/11/2020 03:11:26 Host: 180.241.202.42/180.241.202.42 Port: 22 TCP Blocked
2020-03-11 15:16:49
180.241.211.156 attack
Honeypot attack, port: 81, PTR: PTR record not found
2020-03-08 04:14:52
180.241.254.13 attackbotsspam
Honeypot attack, port: 445, PTR: PTR record not found
2020-03-07 19:17:25
180.241.240.103 attack
1583470315 - 03/06/2020 05:51:55 Host: 180.241.240.103/180.241.240.103 Port: 445 TCP Blocked
2020-03-06 18:13:27
180.241.224.174 attackbotsspam
Attempt to attack host OS, exploiting network vulnerabilities, on 22-02-2020 04:45:09.
2020-02-22 19:25:02
180.241.228.21 attackspam
Port probing on unauthorized port 1433
2020-02-20 09:43:12
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 180.241.2.21
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 16803
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;180.241.2.21.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025021501 1800 900 604800 86400

;; Query time: 39 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Feb 16 02:38:03 CST 2025
;; MSG SIZE  rcvd: 105
Host info
Host 21.2.241.180.in-addr.arpa not found: 2(SERVFAIL)
Nslookup info:
;; Got SERVFAIL reply from 183.60.83.19, trying next server
Server:		183.60.82.98
Address:	183.60.82.98#53

** server can't find 21.2.241.180.in-addr.arpa: SERVFAIL
Related IP info:
Related comments:
IP Type Details Datetime
62.210.152.2 attackspambots
RDP brute forcing (d)
2020-02-11 17:06:50
51.89.150.5 attackspam
Invalid user bpd from 51.89.150.5 port 40274
2020-02-11 17:27:30
14.139.199.34 attackspam
Feb 10 23:04:55 web1 sshd\[22759\]: Invalid user gxj from 14.139.199.34
Feb 10 23:04:55 web1 sshd\[22759\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=14.139.199.34
Feb 10 23:04:57 web1 sshd\[22759\]: Failed password for invalid user gxj from 14.139.199.34 port 24737 ssh2
Feb 10 23:09:40 web1 sshd\[23235\]: Invalid user bua from 14.139.199.34
Feb 10 23:09:40 web1 sshd\[23235\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=14.139.199.34
2020-02-11 17:17:11
2607:5300:60:10c8::1 attack
Automatically reported by fail2ban report script (mx1)
2020-02-11 17:31:48
104.248.122.143 attackspam
Invalid user gkg from 104.248.122.143 port 54094
2020-02-11 17:13:51
172.104.230.5 attackspambots
1581406731 - 02/11/2020 08:38:51 Host: li1806-5.members.linode.com/172.104.230.5 Port: 17 UDP Blocked
2020-02-11 17:09:24
159.138.132.25 attack
Wordpress_xmlrpc_attack
2020-02-11 17:15:55
154.125.43.181 attackbotsspam
Honeypot attack, port: 81, PTR: PTR record not found
2020-02-11 17:42:26
223.205.219.184 attackspam
Honeypot hit.
2020-02-11 17:17:44
186.4.123.139 attackbotsspam
Feb 11 05:52:53 MK-Soft-VM8 sshd[4292]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=186.4.123.139 
Feb 11 05:52:55 MK-Soft-VM8 sshd[4292]: Failed password for invalid user uls from 186.4.123.139 port 60648 ssh2
...
2020-02-11 17:15:29
165.227.115.93 attackbotsspam
Feb 11 02:15:46 plusreed sshd[13392]: Invalid user rpe from 165.227.115.93
...
2020-02-11 17:22:02
174.138.44.30 attackspam
Feb 11 06:39:25 dedicated sshd[20713]: Invalid user bpe from 174.138.44.30 port 60572
2020-02-11 17:22:34
45.134.179.57 attack
Feb 11 10:20:56 debian-2gb-nbg1-2 kernel: \[3672089.832233\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=45.134.179.57 DST=195.201.40.59 LEN=40 TOS=0x00 PREC=0x00 TTL=246 ID=22076 PROTO=TCP SPT=53727 DPT=46300 WINDOW=1024 RES=0x00 SYN URGP=0
2020-02-11 17:34:13
128.199.167.233 attack
Feb 11 09:37:28 silence02 sshd[3916]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.199.167.233
Feb 11 09:37:30 silence02 sshd[3916]: Failed password for invalid user nbf from 128.199.167.233 port 47794 ssh2
Feb 11 09:42:03 silence02 sshd[4299]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.199.167.233
2020-02-11 17:05:17
68.183.142.240 attackbotsspam
Invalid user bud from 68.183.142.240 port 39710
2020-02-11 17:10:24

Recently Reported IPs

38.35.116.47 220.98.8.60 16.171.128.13 116.198.0.166
189.110.184.240 52.157.242.124 142.68.121.158 86.8.150.189
185.128.141.235 224.23.67.69 18.117.107.135 132.240.223.193
77.23.23.144 220.16.42.62 149.136.38.222 13.47.159.84
255.10.71.130 56.175.250.248 92.59.42.33 226.5.238.254