Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States of America (the)

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 11.122.109.14
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 10738
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;11.122.109.14.			IN	A

;; AUTHORITY SECTION:
.			8	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2024010601 1800 900 604800 86400

;; Query time: 89 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Jan 07 04:37:34 CST 2024
;; MSG SIZE  rcvd: 106
Host info
Host 14.109.122.11.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 14.109.122.11.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
66.240.219.146 attackspambots
Unauthorized connection attempt detected from IP address 66.240.219.146 to port 8649
2020-06-21 06:48:16
161.35.60.51 attackbots
Invalid user tomcat from 161.35.60.51 port 41934
2020-06-21 06:20:43
67.227.152.142 attackbotsspam
Jun 21 00:44:58 debian-2gb-nbg1-2 kernel: \[14951781.015683\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=67.227.152.142 DST=195.201.40.59 LEN=40 TOS=0x00 PREC=0x00 TTL=241 ID=29087 PROTO=TCP SPT=32767 DPT=8545 WINDOW=1024 RES=0x00 SYN URGP=0
2020-06-21 06:47:47
112.85.42.94 attack
SSH Brute Force
2020-06-21 06:34:39
54.37.226.123 attackspambots
Invalid user postgres from 54.37.226.123 port 37230
2020-06-21 06:18:06
141.98.9.36 attack
TCP port 3389: Scan and connection
2020-06-21 06:10:16
116.85.40.181 attack
Invalid user clive from 116.85.40.181 port 36350
2020-06-21 06:25:01
51.255.171.172 attack
SSH Invalid Login
2020-06-21 06:35:49
18.136.238.223 attackspambots
767. On Jun 20 2020 experienced a Brute Force SSH login attempt -> 1 unique times by 18.136.238.223.
2020-06-21 06:15:27
85.209.0.100 attackspam
firewall-block, port(s): 22/tcp
2020-06-21 06:45:22
68.183.55.223 attackbotsspam
Multiport scan 65 ports : 101 399 427 593 960 2431 3512 3994 5699 7673 7936 8901 9064 9159 9533 9615 13308 13354 13622 13682 14404 14669 15593 16078 16742 17053 17638 18549 18592 18786 18931 19040 19244 19541 20820 21576 21728 21816 22530 22973 23437 23523 23596 24488 24742 24783 25652 26116 27328 27448 27804 28449 28749 28915 29184 29262 29304 30967 31308 31385 31426 31443 32177 32193 32669
2020-06-21 06:47:33
125.64.94.131 attackspambots
 TCP (SYN) 125.64.94.131:51963 -> port 1610, len 44
2020-06-21 06:41:40
118.25.68.254 attackbots
SSH Invalid Login
2020-06-21 06:24:16
180.89.58.27 attackbots
SSH Brute Force
2020-06-21 06:31:48
185.39.11.48 attack
 TCP (SYN) 185.39.11.48:41426 -> port 3389, len 44
2020-06-21 06:39:25

Recently Reported IPs

11.121.132.128 11.122.189.198 11.122.37.245 11.121.213.46
11.120.82.163 11.123.171.139 11.123.192.183 11.120.72.78
11.122.11.239 11.121.165.103 11.124.10.184 11.127.102.213
11.122.180.20 11.123.5.26 11.122.157.222 11.121.128.173
11.121.214.100 11.121.202.75 11.121.188.120 11.120.90.2