Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Indonesia

Internet Service Provider: PT Telkom Indonesia

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
Type Details Datetime
attack
Honeypot attack, port: 445, PTR: PTR record not found
2020-02-02 01:59:32
Comments on same subnet:
IP Type Details Datetime
180.242.181.111 attack
Port probing on unauthorized port 445
2020-09-04 21:16:58
180.242.181.111 attack
Port probing on unauthorized port 445
2020-09-04 12:55:16
180.242.181.111 attackspam
Port probing on unauthorized port 445
2020-09-04 05:25:34
180.242.181.217 attackspam
1597031437 - 08/10/2020 05:50:37 Host: 180.242.181.217/180.242.181.217 Port: 445 TCP Blocked
2020-08-10 17:30:19
180.242.181.71 attackspambots
Unauthorized connection attempt from IP address 180.242.181.71 on Port 445(SMB)
2020-07-23 06:11:16
180.242.181.219 attackspambots
 TCP (SYN) 180.242.181.219:27529 -> port 23, len 44
2020-07-11 18:20:17
180.242.181.63 attackbots
Unauthorised access (Jun 19) SRC=180.242.181.63 LEN=44 TTL=54 ID=51534 TCP DPT=8080 WINDOW=18712 SYN
2020-06-19 17:30:48
180.242.181.225 attackspam
firewall-block, port(s): 445/tcp
2020-05-11 17:43:32
180.242.181.124 attackspam
1588564264 - 05/04/2020 05:51:04 Host: 180.242.181.124/180.242.181.124 Port: 445 TCP Blocked
2020-05-04 18:27:16
180.242.181.17 attack
Honeypot attack, port: 445, PTR: PTR record not found
2020-02-20 18:56:32
180.242.181.46 attackspam
Attempt to attack host OS, exploiting network vulnerabilities, on 14-02-2020 04:55:09.
2020-02-14 16:35:18
180.242.181.163 attackspambots
unauthorized connection attempt
2020-02-07 18:18:14
180.242.181.91 attack
Honeypot attack, port: 445, PTR: PTR record not found
2020-01-13 14:18:20
180.242.181.168 attackbots
Unauthorized connection attempt from IP address 180.242.181.168 on Port 445(SMB)
2020-01-03 19:44:57
180.242.181.183 attackbots
1577472657 - 12/27/2019 19:50:57 Host: 180.242.181.183/180.242.181.183 Port: 445 TCP Blocked
2019-12-28 05:40:38
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 180.242.181.214
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 46457
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;180.242.181.214.		IN	A

;; AUTHORITY SECTION:
.			480	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2020020101 1800 900 604800 86400

;; Query time: 98 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Feb 02 01:59:28 CST 2020
;; MSG SIZE  rcvd: 119
Host info
Host 214.181.242.180.in-addr.arpa not found: 2(SERVFAIL)
Nslookup info:
;; Got SERVFAIL reply from 183.60.83.19, trying next server
Server:		183.60.82.98
Address:	183.60.82.98#53

** server can't find 214.181.242.180.in-addr.arpa: SERVFAIL
Related IP info:
Related comments:
IP Type Details Datetime
2.38.44.111 attack
Automatic report - Port Scan Attack
2020-02-10 04:47:46
71.187.183.209 attackbotsspam
Unauthorized connection attempt from IP address 71.187.183.209 on Port 445(SMB)
2020-02-10 04:28:55
109.202.17.37 attackbots
SSH brute force
2020-02-10 04:44:32
49.146.40.95 attackspambots
Unauthorized connection attempt from IP address 49.146.40.95 on Port 445(SMB)
2020-02-10 04:25:50
5.196.75.47 attack
$f2bV_matches
2020-02-10 04:44:05
157.230.113.218 attackspam
Feb  9 17:35:48 Ubuntu-1404-trusty-64-minimal sshd\[29924\]: Invalid user duz from 157.230.113.218
Feb  9 17:35:48 Ubuntu-1404-trusty-64-minimal sshd\[29924\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.230.113.218
Feb  9 17:35:49 Ubuntu-1404-trusty-64-minimal sshd\[29924\]: Failed password for invalid user duz from 157.230.113.218 port 59058 ssh2
Feb  9 17:43:26 Ubuntu-1404-trusty-64-minimal sshd\[1713\]: Invalid user flj from 157.230.113.218
Feb  9 17:43:26 Ubuntu-1404-trusty-64-minimal sshd\[1713\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.230.113.218
2020-02-10 04:28:25
106.12.26.148 attack
Feb  9 21:18:44 v22018076622670303 sshd\[4880\]: Invalid user giy from 106.12.26.148 port 58932
Feb  9 21:18:44 v22018076622670303 sshd\[4880\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.26.148
Feb  9 21:18:46 v22018076622670303 sshd\[4880\]: Failed password for invalid user giy from 106.12.26.148 port 58932 ssh2
...
2020-02-10 04:46:09
115.112.60.46 attackspambots
Feb  9 19:47:24 ns382633 sshd\[25013\]: Invalid user zvh from 115.112.60.46 port 33106
Feb  9 19:47:24 ns382633 sshd\[25013\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=115.112.60.46
Feb  9 19:47:26 ns382633 sshd\[25013\]: Failed password for invalid user zvh from 115.112.60.46 port 33106 ssh2
Feb  9 20:33:50 ns382633 sshd\[32405\]: Invalid user kec from 115.112.60.46 port 44532
Feb  9 20:33:50 ns382633 sshd\[32405\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=115.112.60.46
2020-02-10 04:29:20
191.243.136.250 attackspam
Unauthorized connection attempt from IP address 191.243.136.250 on Port 445(SMB)
2020-02-10 04:23:14
185.41.97.236 attackbots
Fail2Ban Ban Triggered
2020-02-10 04:27:40
89.169.22.109 attackspambots
Unauthorized connection attempt from IP address 89.169.22.109 on Port 445(SMB)
2020-02-10 04:20:54
182.74.27.14 attackbotsspam
Unauthorized connection attempt from IP address 182.74.27.14 on Port 445(SMB)
2020-02-10 04:14:35
120.197.183.123 attackbots
Feb  9 sshd[633]: Invalid user ytc from 120.197.183.123 port 52089
2020-02-10 04:39:51
41.224.246.31 attackbotsspam
SSH Bruteforce attempt
2020-02-10 04:17:02
107.189.10.145 attackbots
2020-02-09T11:44:55.508195-07:00 suse-nuc sshd[28817]: Invalid user wnc from 107.189.10.145 port 41384
...
2020-02-10 04:36:24

Recently Reported IPs

60.8.138.163 123.11.199.132 121.96.101.208 157.12.212.255
118.163.186.176 103.100.244.7 198.143.182.199 54.210.244.214
144.48.108.42 108.61.211.144 91.197.19.223 128.84.7.240
74.148.103.196 61.241.85.62 42.210.93.44 195.2.92.194
68.24.25.89 159.220.138.210 219.223.117.240 68.103.163.17