Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: China

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 114.100.63.130
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 53847
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;114.100.63.130.			IN	A

;; AUTHORITY SECTION:
.			123	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022020702 1800 900 604800 86400

;; Query time: 70 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Feb 08 10:05:25 CST 2022
;; MSG SIZE  rcvd: 107
Host info
Host 130.63.100.114.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 130.63.100.114.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
218.92.0.204 attackspam
Jul 29 19:56:14 mail sshd\[7710\]: Failed password for root from 218.92.0.204 port 56743 ssh2
Jul 29 20:01:06 mail sshd\[8626\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.204  user=root
Jul 29 20:01:08 mail sshd\[8626\]: Failed password for root from 218.92.0.204 port 62632 ssh2
Jul 29 20:01:10 mail sshd\[8626\]: Failed password for root from 218.92.0.204 port 62632 ssh2
Jul 29 20:01:12 mail sshd\[8626\]: Failed password for root from 218.92.0.204 port 62632 ssh2
2019-07-30 02:07:43
34.85.97.82 attackbotsspam
Jul 29 19:12:59 server sshd[11136]: Failed password for invalid user grayson from 34.85.97.82 port 50108 ssh2
Jul 29 19:29:05 server sshd[12372]: Failed password for invalid user ftp1 from 34.85.97.82 port 45422 ssh2
Jul 29 19:45:10 server sshd[13652]: Failed password for invalid user us from 34.85.97.82 port 40674 ssh2
2019-07-30 01:56:32
89.108.122.195 attack
Jul 29 08:38:46 MK-Soft-VM4 sshd\[31546\]: Invalid user gfdsa!@\#$% from 89.108.122.195 port 43400
Jul 29 08:38:46 MK-Soft-VM4 sshd\[31546\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=89.108.122.195
Jul 29 08:38:48 MK-Soft-VM4 sshd\[31546\]: Failed password for invalid user gfdsa!@\#$% from 89.108.122.195 port 43400 ssh2
...
2019-07-30 01:42:55
200.54.242.46 attackbotsspam
2019-07-29T06:38:11.073788abusebot-2.cloudsearch.cf sshd\[31709\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=200.54.242.46  user=root
2019-07-30 01:42:36
80.211.242.242 attack
Honeypot attack, port: 23, PTR: host242-242-211-80.static.arubacloud.pl.
2019-07-30 02:24:18
200.16.132.202 attackbotsspam
Jul 29 18:44:38 mail sshd\[8982\]: Failed password for invalid user tech!@ from 200.16.132.202 port 48233 ssh2
Jul 29 19:04:42 mail sshd\[9292\]: Invalid user deceive from 200.16.132.202 port 40029
Jul 29 19:04:42 mail sshd\[9292\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=200.16.132.202
...
2019-07-30 02:15:49
165.227.96.190 attackspambots
Jul 29 20:11:17 lnxweb62 sshd[8436]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.227.96.190
2019-07-30 02:23:22
37.34.177.134 attackbotsspam
SSH Bruteforce attack
2019-07-30 01:44:11
218.92.1.130 attackbotsspam
Jul 29 18:45:12 debian sshd\[17566\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.1.130  user=root
Jul 29 18:45:14 debian sshd\[17566\]: Failed password for root from 218.92.1.130 port 13172 ssh2
...
2019-07-30 01:50:12
106.12.17.169 attack
Jul 29 18:27:26 mail sshd\[8674\]: Failed password for invalid user monthly from 106.12.17.169 port 34870 ssh2
Jul 29 18:45:10 mail sshd\[8998\]: Invalid user rivers1 from 106.12.17.169 port 60940
Jul 29 18:45:10 mail sshd\[8998\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.17.169
...
2019-07-30 01:56:06
201.149.10.165 attackbots
pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=201.149.10.165  user=root
Failed password for root from 201.149.10.165 port 50174 ssh2
pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=201.149.10.165  user=root
Failed password for root from 201.149.10.165 port 44038 ssh2
pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=201.149.10.165  user=root
2019-07-30 01:44:31
194.61.26.4 attackspam
194.61.26.4 - sshd: brute force trying to get access to the system.
2019-07-30 01:42:13
209.210.24.234 attackbotsspam
Spam
2019-07-30 02:21:05
104.206.128.38 attack
scan z
2019-07-30 01:56:56
157.230.20.1 attackspambots
Honeypot attack, port: 23, PTR: PTR record not found
2019-07-30 02:21:27

Recently Reported IPs

50.81.41.144 201.76.232.130 190.217.14.126 90.188.5.49
128.1.41.190 36.230.224.41 177.249.169.2 125.25.185.173
91.122.250.180 181.110.94.88 172.68.41.12 211.149.174.175
133.184.222.30 115.239.1.111 171.251.239.4 128.199.42.117
45.4.237.128 198.54.223.245 115.58.128.15 190.19.73.195