Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: None

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 113.52.114.66
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 32789
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;113.52.114.66.			IN	A

;; AUTHORITY SECTION:
.			599	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022020700 1800 900 604800 86400

;; Query time: 15 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Feb 07 14:50:34 CST 2022
;; MSG SIZE  rcvd: 106
Host info
66.114.52.113.in-addr.arpa domain name pointer nz114l66.bb11352.ctm.net.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
66.114.52.113.in-addr.arpa	name = nz114l66.bb11352.ctm.net.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
177.71.1.126 attack
@LucianNitescu Personal Honeypot Network <<<>>> Donate at paypal.me/LNitescu <<<>>> 2019-07-05 06:52:05,203 INFO [amun_request_handler] PortScan Detected on Port: 445 (177.71.1.126)
2019-07-05 21:17:02
103.116.85.181 attack
scan z
2019-07-05 21:39:42
77.247.110.207 attackbots
A portscan was detected. Details about the event:
Time.............: 2019-07-05 06:31:26
Source IP address: 77.247.110.207
2019-07-05 21:49:20
124.81.224.18 attackspambots
@LucianNitescu Personal Honeypot Network <<<>>> Donate at paypal.me/LNitescu <<<>>> 2019-07-05 06:50:06,705 INFO [amun_request_handler] PortScan Detected on Port: 445 (124.81.224.18)
2019-07-05 21:46:47
134.209.52.246 attackbots
Wordpress XMLRPC attack
2019-07-05 22:12:33
184.105.139.121 attackbotsspam
MultiHost/MultiPort Probe, Scan, Hack -
2019-07-05 21:33:22
167.99.46.145 attackbots
Jul  5 14:50:50 vps647732 sshd[16220]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.99.46.145
Jul  5 14:50:52 vps647732 sshd[16220]: Failed password for invalid user scan from 167.99.46.145 port 34206 ssh2
...
2019-07-05 21:39:07
23.226.181.18 attackspam
Scanning and Vuln Attempts
2019-07-05 21:32:32
190.113.189.9 attackbots
RDP Brute-Force (Grieskirchen RZ2)
2019-07-05 21:28:47
51.252.61.254 attack
@LucianNitescu Personal Honeypot Network <<<>>> Donate at paypal.me/LNitescu <<<>>> 2019-07-03 18:48:39,497 INFO [shellcode_manager] (51.252.61.254) no match, writing hexdump (0256190aa97c2cfd833eef265f927cff :2288947) - MS17010 (EternalBlue)
2019-07-05 21:28:20
117.253.51.123 attackspambots
Jul  5 10:57:09 srv-4 sshd\[20039\]: Invalid user admin from 117.253.51.123
Jul  5 10:57:09 srv-4 sshd\[20039\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=117.253.51.123
Jul  5 10:57:11 srv-4 sshd\[20039\]: Failed password for invalid user admin from 117.253.51.123 port 33587 ssh2
...
2019-07-05 21:25:21
168.228.150.188 attackbotsspam
failed_logins
2019-07-05 22:07:04
182.61.37.35 attackbots
Jul  5 12:30:16 *** sshd[8786]: Invalid user nuxeo from 182.61.37.35
2019-07-05 21:41:18
212.64.58.150 attackbots
Scanning and Vuln Attempts
2019-07-05 22:10:01
221.11.32.136 attack
Scanning and Vuln Attempts
2019-07-05 21:46:03

Recently Reported IPs

201.192.137.130 177.249.171.101 118.27.13.79 2.179.184.248
193.112.98.8 119.23.33.157 177.99.224.50 194.99.104.35
203.198.129.123 2.183.89.198 104.248.134.189 209.237.154.207
116.114.67.148 114.33.139.152 123.56.91.225 113.90.236.39
24.129.181.98 173.255.228.139 36.67.198.7 5.126.179.36