Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: None

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 111.30.214.14
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 61114
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;111.30.214.14.			IN	A

;; AUTHORITY SECTION:
.			161	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022031400 1800 900 604800 86400

;; Query time: 57 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Mar 14 22:04:31 CST 2022
;; MSG SIZE  rcvd: 106
Host info
Host 14.214.30.111.in-addr.arpa not found: 2(SERVFAIL)
Nslookup info:
server can't find 111.30.214.14.in-addr.arpa: SERVFAIL
Related IP info:
Related comments:
IP Type Details Datetime
180.183.122.182 attackbotsspam
[Wed May 20 06:04:13 2020] - Syn Flood From IP: 180.183.122.182 Port: 13370
2020-05-20 20:27:44
49.234.96.24 attackbotsspam
487. On May 17 2020 experienced a Brute Force SSH login attempt -> 2 unique times by 49.234.96.24.
2020-05-20 20:37:55
113.160.202.232 attackbotsspam
Unauthorized connection attempt from IP address 113.160.202.232 on Port 445(SMB)
2020-05-20 20:15:25
36.73.148.87 attackspam
Web Server Attack
2020-05-20 20:22:46
51.75.18.215 attackbotsspam
May 20 10:20:17 ns382633 sshd\[9332\]: Invalid user bve from 51.75.18.215 port 56774
May 20 10:20:17 ns382633 sshd\[9332\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.75.18.215
May 20 10:20:19 ns382633 sshd\[9332\]: Failed password for invalid user bve from 51.75.18.215 port 56774 ssh2
May 20 10:28:45 ns382633 sshd\[10637\]: Invalid user gtl from 51.75.18.215 port 59670
May 20 10:28:45 ns382633 sshd\[10637\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.75.18.215
2020-05-20 20:20:17
51.38.187.135 attackbotsspam
May 20 19:41:37 web1 sshd[22774]: Invalid user gbl from 51.38.187.135 port 44056
May 20 19:41:37 web1 sshd[22774]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.38.187.135
May 20 19:41:37 web1 sshd[22774]: Invalid user gbl from 51.38.187.135 port 44056
May 20 19:41:39 web1 sshd[22774]: Failed password for invalid user gbl from 51.38.187.135 port 44056 ssh2
May 20 19:50:12 web1 sshd[24897]: Invalid user murapa from 51.38.187.135 port 50516
May 20 19:50:12 web1 sshd[24897]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.38.187.135
May 20 19:50:12 web1 sshd[24897]: Invalid user murapa from 51.38.187.135 port 50516
May 20 19:50:14 web1 sshd[24897]: Failed password for invalid user murapa from 51.38.187.135 port 50516 ssh2
May 20 19:54:06 web1 sshd[25790]: Invalid user iax from 51.38.187.135 port 58450
...
2020-05-20 20:21:57
49.233.153.154 attackbots
SSH Bruteforce attack
2020-05-20 20:47:09
5.206.45.110 attackspambots
Invalid user kze from 5.206.45.110 port 37275
2020-05-20 20:35:25
58.210.190.30 attackspam
May 20 10:47:46 [host] sshd[7689]: Invalid user qt
May 20 10:47:46 [host] sshd[7689]: pam_unix(sshd:a
May 20 10:47:48 [host] sshd[7689]: Failed password
2020-05-20 20:33:22
121.200.49.234 attackspambots
Honeypot attack, port: 445, PTR: PTR record not found
2020-05-20 20:17:55
1.1.130.70 attack
Lines containing failures of 1.1.130.70
May 20 09:23:44 MAKserver05 sshd[25383]: Did not receive identification string from 1.1.130.70 port 50508
May 20 09:23:47 MAKserver05 sshd[25384]: Invalid user sniffer from 1.1.130.70 port 50945
May 20 09:23:48 MAKserver05 sshd[25384]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=1.1.130.70 
May 20 09:23:49 MAKserver05 sshd[25384]: Failed password for invalid user sniffer from 1.1.130.70 port 50945 ssh2


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=1.1.130.70
2020-05-20 20:52:51
115.78.73.185 attack
Unauthorized connection attempt from IP address 115.78.73.185 on Port 445(SMB)
2020-05-20 20:21:16
49.232.33.182 attackspam
$f2bV_matches
2020-05-20 20:49:48
46.27.140.1 attackspam
474. On May 17 2020 experienced a Brute Force SSH login attempt -> 18 unique times by 46.27.140.1.
2020-05-20 20:52:02
158.175.132.234 attackspam
Invalid user jmt from 158.175.132.234 port 60260
2020-05-20 20:31:24

Recently Reported IPs

111.3.144.36 111.30.244.71 111.30.251.113 111.30.61.13
111.32.64.79 111.32.89.239 111.33.20.68 111.33.7.35
111.33.8.90 111.34.105.218 111.34.13.19 111.34.155.12
111.35.199.251 111.35.55.16 111.36.128.137 111.36.182.91
111.36.31.176 111.47.204.203 146.75.77.198 73.140.151.63