Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Japan

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 1.114.224.214
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 60866
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;1.114.224.214.			IN	A

;; AUTHORITY SECTION:
.			279	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022022302 1800 900 604800 86400

;; Query time: 18 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Feb 24 11:35:58 CST 2022
;; MSG SIZE  rcvd: 106
Host info
214.224.114.1.in-addr.arpa domain name pointer softbank001114224214.bbtec.net.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
214.224.114.1.in-addr.arpa	name = softbank001114224214.bbtec.net.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
106.12.84.115 attack
Automatic report - Banned IP Access
2019-10-19 03:32:09
182.61.48.209 attackbots
Invalid user sinusbot from 182.61.48.209 port 58330
2019-10-19 03:31:40
165.227.29.38 attack
Oct 18 21:48:20 our-server-hostname postfix/smtpd[30229]: connect from unknown[165.227.29.38]
Oct x@x
Oct 18 21:48:22 our-server-hostname postfix/smtpd[30229]: disconnect from unknown[165.227.29.38]
Oct 18 21:48:32 our-server-hostname postfix/smtpd[23564]: connect from unknown[165.227.29.38]
Oct x@x
Oct 18 21:48:34 our-server-hostname postfix/smtpd[23564]: disconnect from unknown[165.227.29.38]
Oct 18 21:48:44 our-server-hostname postfix/smtpd[29883]: connect from unknown[165.227.29.38]
Oct x@x
Oct 18 21:48:45 our-server-hostname postfix/smtpd[29883]: disconnect from unknown[165.227.29.38]
Oct 18 21:49:11 our-server-hostname postfix/smtpd[24071]: connect from unknown[165.227.29.38]
Oct x@x
Oct 18 21:49:12 our-server-hostname postfix/smtpd[24071]: disconnect from unknown[165.227.29.38]
Oct 18 21:49:12 our-server-hostname postfix/smtpd[839]: connect from unknown[165.227.29.38]
Oct x@x
Oct 18 21:49:14 our-server-hostname postfix/smtpd[839]: disconnect from unknown[165.227.........
-------------------------------
2019-10-19 03:24:08
113.179.68.83 attack
Spam
2019-10-19 03:05:24
14.177.179.170 attackspam
Unauthorized connection attempt from IP address 14.177.179.170 on Port 445(SMB)
2019-10-19 03:33:06
172.93.205.107 attack
Spam
2019-10-19 03:01:56
114.235.133.111 attack
Oct 18 14:31:57 elektron postfix/smtpd\[25802\]: NOQUEUE: reject: RCPT from unknown\[114.235.133.111\]: 450 4.7.1 Client host rejected: cannot find your hostname, \[114.235.133.111\]\; from=\ to=\ proto=ESMTP helo=\
Oct 18 14:32:52 elektron postfix/smtpd\[25802\]: NOQUEUE: reject: RCPT from unknown\[114.235.133.111\]: 450 4.7.1 Client host rejected: cannot find your hostname, \[114.235.133.111\]\; from=\ to=\ proto=ESMTP helo=\
Oct 18 14:33:43 elektron postfix/smtpd\[25802\]: NOQUEUE: reject: RCPT from unknown\[114.235.133.111\]: 450 4.7.1 Client host rejected: cannot find your hostname, \[114.235.133.111\]\; from=\ to=\ proto=ESMTP helo=\
2019-10-19 03:29:18
142.93.37.180 attack
Automatic report - XMLRPC Attack
2019-10-19 03:34:57
27.210.143.2 attackbots
Invalid user admin from 27.210.143.2 port 55985
2019-10-19 03:31:24
69.175.97.170 attackspambots
port scan and connect, tcp 3128 (squid-http)
2019-10-19 03:22:08
92.222.88.22 attackspambots
Invalid user testuser from 92.222.88.22 port 57702
2019-10-19 03:11:15
92.82.35.114 attackbotsspam
Unauthorized connection attempt from IP address 92.82.35.114 on Port 445(SMB)
2019-10-19 03:35:52
106.12.108.90 attackbotsspam
Oct 18 12:15:50 firewall sshd[15307]: Failed password for invalid user urbanoo from 106.12.108.90 port 36834 ssh2
Oct 18 12:22:02 firewall sshd[15399]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.108.90  user=root
Oct 18 12:22:04 firewall sshd[15399]: Failed password for root from 106.12.108.90 port 46146 ssh2
...
2019-10-19 02:59:08
151.239.216.78 attack
Automatic report - Port Scan Attack
2019-10-19 03:21:12
59.91.237.103 attackspam
Spam
2019-10-19 03:00:12

Recently Reported IPs

176.31.69.0 1.114.23.114 1.114.58.220 42.213.10.179
1.114.61.1 1.114.62.1 1.115.168.44 1.115.168.69
1.115.168.99 1.115.183.170 1.115.241.90 1.116.105.144
1.116.105.9 208.225.112.80 1.116.119.209 1.116.12.21
1.116.123.226 1.116.132.7 1.116.143.193 46.101.93.112