Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: China

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 113.214.142.171
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 55166
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;113.214.142.171.		IN	A

;; AUTHORITY SECTION:
.			16	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2024092601 1800 900 604800 86400

;; Query time: 117 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Sep 27 04:25:11 CST 2024
;; MSG SIZE  rcvd: 108
Host info
Host 171.142.214.113.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 171.142.214.113.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
112.216.129.138 attackspambots
Invalid user tian from 112.216.129.138 port 50458
2019-10-30 07:20:51
203.176.181.93 attackbots
Unauthorized connection attempt from IP address 203.176.181.93 on Port 445(SMB)
2019-10-30 07:19:14
68.183.127.93 attackspambots
Invalid user Sigmal from 68.183.127.93 port 41842
2019-10-30 07:19:56
217.151.238.147 attackbotsspam
Unauthorized connection attempt from IP address 217.151.238.147 on Port 445(SMB)
2019-10-30 07:32:46
223.75.116.49 attackspam
" "
2019-10-30 07:23:04
106.13.65.32 attackbotsspam
Oct 29 08:25:58 *** sshd[19568]: Failed password for invalid user guest from 106.13.65.32 port 54046 ssh2
Oct 29 08:42:28 *** sshd[27655]: Failed password for invalid user xwp from 106.13.65.32 port 48756 ssh2
Oct 29 08:46:37 *** sshd[27748]: Failed password for invalid user faxes from 106.13.65.32 port 58260 ssh2
Oct 29 09:12:40 *** sshd[28227]: Failed password for invalid user Basisk from 106.13.65.32 port 58854 ssh2
Oct 29 09:17:03 *** sshd[28282]: Failed password for invalid user ie from 106.13.65.32 port 40122 ssh2
Oct 29 10:03:52 *** sshd[29122]: Failed password for invalid user lsx from 106.13.65.32 port 50548 ssh2
Oct 29 10:23:21 *** sshd[29534]: Failed password for invalid user sampler1 from 106.13.65.32 port 60418 ssh2
Oct 29 10:42:53 *** sshd[29916]: Failed password for invalid user rabbitmq from 106.13.65.32 port 42042 ssh2
Oct 29 10:47:47 *** sshd[30029]: Failed password for invalid user zm from 106.13.65.32 port 51554 ssh2
Oct 29 10:52:28 *** sshd[30093]: Failed password for invalid user brian f
2019-10-30 07:31:04
106.12.33.174 attackbotsspam
SSH Bruteforce attempt
2019-10-30 07:51:36
77.247.108.52 attackbotsspam
ET CINS Active Threat Intelligence Poor Reputation IP group 67 - port: 17426 proto: TCP cat: Misc Attack
2019-10-30 07:49:29
118.163.178.146 attack
Oct 29 23:01:39 work-partkepr sshd\[4896\]: Invalid user zabbix from 118.163.178.146 port 49491
Oct 29 23:01:39 work-partkepr sshd\[4896\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.163.178.146
...
2019-10-30 07:20:35
149.56.177.248 attack
2019-10-29T22:05:55.137463hub.schaetter.us sshd\[16665\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=ip248.ip-149-56-177.net  user=root
2019-10-29T22:05:57.227009hub.schaetter.us sshd\[16665\]: Failed password for root from 149.56.177.248 port 40970 ssh2
2019-10-29T22:09:33.284437hub.schaetter.us sshd\[16687\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=ip248.ip-149-56-177.net  user=root
2019-10-29T22:09:35.631127hub.schaetter.us sshd\[16687\]: Failed password for root from 149.56.177.248 port 51302 ssh2
2019-10-29T22:13:08.906633hub.schaetter.us sshd\[16698\]: Invalid user za from 149.56.177.248 port 60878
...
2019-10-30 07:40:35
92.118.161.41 attack
firewall-block, port(s): 987/tcp
2019-10-30 07:46:02
45.227.44.54 attack
Automatic report - XMLRPC Attack
2019-10-30 07:25:35
91.121.155.226 attackbotsspam
Oct 29 13:24:23 php1 sshd\[6226\]: Invalid user password123 from 91.121.155.226
Oct 29 13:24:23 php1 sshd\[6226\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=91.121.155.226
Oct 29 13:24:25 php1 sshd\[6226\]: Failed password for invalid user password123 from 91.121.155.226 port 56661 ssh2
Oct 29 13:28:10 php1 sshd\[6508\]: Invalid user ggg999 from 91.121.155.226
Oct 29 13:28:10 php1 sshd\[6508\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=91.121.155.226
2019-10-30 07:36:03
181.113.135.254 attackspam
Automatic report - XMLRPC Attack
2019-10-30 07:25:09
107.180.68.110 attack
Oct 29 23:39:12 MK-Soft-Root2 sshd[28159]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=107.180.68.110 
Oct 29 23:39:14 MK-Soft-Root2 sshd[28159]: Failed password for invalid user posp from 107.180.68.110 port 42742 ssh2
...
2019-10-30 07:26:00

Recently Reported IPs

113.214.160.66 113.215.107.75 113.214.22.210 113.213.183.48
113.213.4.185 113.215.150.43 113.214.60.237 9.155.121.202
113.215.138.35 113.213.131.19 113.213.35.194 113.213.175.247
113.215.179.125 113.213.101.41 113.215.206.77 113.213.8.47
113.213.70.41 113.214.227.243 113.215.199.244 113.215.174.156