Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Indonesia

Internet Service Provider: PT Telkom Indonesia

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
Type Details Datetime
attackbots
Unauthorized connection attempt from IP address 180.242.181.168 on Port 445(SMB)
2020-01-03 19:44:57
Comments on same subnet:
IP Type Details Datetime
180.242.181.111 attack
Port probing on unauthorized port 445
2020-09-04 21:16:58
180.242.181.111 attack
Port probing on unauthorized port 445
2020-09-04 12:55:16
180.242.181.111 attackspam
Port probing on unauthorized port 445
2020-09-04 05:25:34
180.242.181.217 attackspam
1597031437 - 08/10/2020 05:50:37 Host: 180.242.181.217/180.242.181.217 Port: 445 TCP Blocked
2020-08-10 17:30:19
180.242.181.71 attackspambots
Unauthorized connection attempt from IP address 180.242.181.71 on Port 445(SMB)
2020-07-23 06:11:16
180.242.181.219 attackspambots
 TCP (SYN) 180.242.181.219:27529 -> port 23, len 44
2020-07-11 18:20:17
180.242.181.63 attackbots
Unauthorised access (Jun 19) SRC=180.242.181.63 LEN=44 TTL=54 ID=51534 TCP DPT=8080 WINDOW=18712 SYN
2020-06-19 17:30:48
180.242.181.225 attackspam
firewall-block, port(s): 445/tcp
2020-05-11 17:43:32
180.242.181.124 attackspam
1588564264 - 05/04/2020 05:51:04 Host: 180.242.181.124/180.242.181.124 Port: 445 TCP Blocked
2020-05-04 18:27:16
180.242.181.17 attack
Honeypot attack, port: 445, PTR: PTR record not found
2020-02-20 18:56:32
180.242.181.46 attackspam
Attempt to attack host OS, exploiting network vulnerabilities, on 14-02-2020 04:55:09.
2020-02-14 16:35:18
180.242.181.163 attackspambots
unauthorized connection attempt
2020-02-07 18:18:14
180.242.181.214 attack
Honeypot attack, port: 445, PTR: PTR record not found
2020-02-02 01:59:32
180.242.181.91 attack
Honeypot attack, port: 445, PTR: PTR record not found
2020-01-13 14:18:20
180.242.181.183 attackbots
1577472657 - 12/27/2019 19:50:57 Host: 180.242.181.183/180.242.181.183 Port: 445 TCP Blocked
2019-12-28 05:40:38
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 180.242.181.168
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 59453
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;180.242.181.168.		IN	A

;; AUTHORITY SECTION:
.			512	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2020010300 1800 900 604800 86400

;; Query time: 64 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Jan 03 19:44:51 CST 2020
;; MSG SIZE  rcvd: 119
Host info
Host 168.181.242.180.in-addr.arpa not found: 2(SERVFAIL)
Nslookup info:
;; Got SERVFAIL reply from 183.60.83.19, trying next server
Server:		183.60.82.98
Address:	183.60.82.98#53

** server can't find 168.181.242.180.in-addr.arpa: SERVFAIL
Related IP info:
Related comments:
IP Type Details Datetime
162.243.145.57 attack
scans once in preceeding hours on the ports (in chronological order) 8140 resulting in total of 34 scans from 162.243.0.0/16 block.
2020-06-07 02:45:37
64.227.62.255 attackspambots
scans once in preceeding hours on the ports (in chronological order) 12235 resulting in total of 4 scans from 64.227.0.0/17 block.
2020-06-07 03:02:47
194.26.29.103 attack
scans 44 times in preceeding hours on the ports (in chronological order) 14914 14511 14876 14052 14333 14824 14932 14814 14544 14546 14079 14924 14578 14993 14855 14983 14236 14144 14572 14703 14978 14232 14607 14976 14096 14793 14932 14844 14995 14821 14221 14961 14976 14692 14941 14466 14108 14409 14804 14813 14489 14955 14133 14592 resulting in total of 612 scans from 194.26.29.0/24 block.
2020-06-07 02:31:06
80.82.65.90 attackbots
06/06/2020-14:44:03.156047 80.82.65.90 Protocol: 17 ET DROP Dshield Block Listed Source group 1
2020-06-07 03:01:30
194.26.29.125 attackbotsspam
scans 37 times in preceeding hours on the ports (in chronological order) 54266 54520 53453 54049 51877 52646 51636 52972 53668 52904 52775 54979 51806 54966 53215 53655 54465 53611 54070 53841 54026 50261 54056 51344 52850 54838 50228 54361 50206 53859 54812 52222 51515 53644 54367 53969 54285 resulting in total of 612 scans from 194.26.29.0/24 block.
2020-06-07 02:30:20
83.97.20.31 attack
Jun  6 21:49:01 debian kernel: [371901.007690] [UFW BLOCK] IN=eth0 OUT= MAC=52:54:00:be:e4:65:08:e8:4f:6e:48:0c:08:00 SRC=83.97.20.31 DST=89.252.131.35 LEN=40 TOS=0x00 PREC=0x00 TTL=241 ID=54321 PROTO=TCP SPT=60843 DPT=3389 WINDOW=65535 RES=0x00 SYN URGP=0
2020-06-07 02:58:40
185.175.93.104 attackbotsspam
 TCP (SYN) 185.175.93.104:47557 -> port 49152, len 44
2020-06-07 02:36:35
64.227.23.68 attackbotsspam
 TCP (SYN) 64.227.23.68:57554 -> port 17053, len 44
2020-06-07 03:03:39
68.183.157.244 attackspam
scans once in preceeding hours on the ports (in chronological order) 42022 resulting in total of 2 scans from 68.183.0.0/16 block.
2020-06-07 03:02:15
192.241.194.171 attackspam
1591452099 - 06/06/2020 16:01:39 Host: 192.241.194.171/192.241.194.171 Port: 20 TCP Blocked
2020-06-07 02:31:47
93.174.95.106 attackbotsspam
 TCP (SYN) 93.174.95.106:28693 -> port 79, len 44
2020-06-07 02:51:29
195.54.166.45 attack
 TCP (SYN) 195.54.166.45:55191 -> port 1988, len 44
2020-06-07 02:29:34
185.176.27.210 attackbots
scans 8 times in preceeding hours on the ports (in chronological order) 3475 3462 3461 3434 3489 3462 3428 3495 resulting in total of 81 scans from 185.176.27.0/24 block.
2020-06-07 02:33:44
104.248.10.181 attackspam
Fail2Ban Ban Triggered
2020-06-07 02:50:21
195.54.166.98 attackbots
 TCP (SYN) 195.54.166.98:47271 -> port 3396, len 44
2020-06-07 02:28:43

Recently Reported IPs

185.172.160.98 187.15.253.81 208.197.86.30 223.205.216.162
116.108.233.61 103.37.201.173 161.13.94.101 177.70.125.178
191.33.228.219 26.225.193.18 185.163.27.110 145.11.124.15
39.242.148.83 66.213.177.225 248.83.194.88 107.181.170.106
25.12.170.14 162.211.236.141 49.206.12.94 25.27.39.62