Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: None

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 114.101.42.8
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 59580
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;114.101.42.8.			IN	A

;; AUTHORITY SECTION:
.			369	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022030400 1800 900 604800 86400

;; Query time: 27 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Mar 05 03:00:45 CST 2022
;; MSG SIZE  rcvd: 105
Host info
Host 8.42.101.114.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 8.42.101.114.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
200.16.132.202 attack
2020-01-31T05:51:27.041487shield sshd\[10976\]: Invalid user danti from 200.16.132.202 port 35231
2020-01-31T05:51:27.045819shield sshd\[10976\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=200.16.132.202
2020-01-31T05:51:29.355190shield sshd\[10976\]: Failed password for invalid user danti from 200.16.132.202 port 35231 ssh2
2020-01-31T05:55:51.085851shield sshd\[11537\]: Invalid user xiti from 200.16.132.202 port 50193
2020-01-31T05:55:51.093485shield sshd\[11537\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=200.16.132.202
2020-01-31 14:22:39
118.173.166.219 attack
Attacks websites by trying to access known vulnerables of plugins, brute-force of backends or probing of administrative tools
2020-01-31 14:30:35
213.16.81.182 attackbots
Attacks websites by trying to access known vulnerables of plugins, brute-force of backends or probing of administrative tools
2020-01-31 14:31:26
150.109.147.145 attackspambots
Unauthorized connection attempt detected from IP address 150.109.147.145 to port 2220 [J]
2020-01-31 14:26:33
89.120.135.116 attackspam
Fail2Ban Ban Triggered
2020-01-31 14:35:07
159.65.8.116 attack
Jan 31 06:11:07 powerpi2 sshd[30712]: Invalid user vaageesh from 159.65.8.116 port 44832
Jan 31 06:11:09 powerpi2 sshd[30712]: Failed password for invalid user vaageesh from 159.65.8.116 port 44832 ssh2
Jan 31 06:13:55 powerpi2 sshd[30882]: Invalid user nilasha from 159.65.8.116 port 3889
...
2020-01-31 14:42:49
118.175.133.210 attackbots
Attacks websites by trying to access known vulnerables of plugins, brute-force of backends or probing of administrative tools
2020-01-31 14:19:56
14.162.137.83 attack
1580446680 - 01/31/2020 05:58:00 Host: 14.162.137.83/14.162.137.83 Port: 445 TCP Blocked
2020-01-31 14:16:24
36.90.130.168 attackbots
Attacks websites by trying to access known vulnerables of plugins, brute-force of backends or probing of administrative tools
2020-01-31 14:52:42
23.253.102.144 attackbotsspam
Unauthorized connection attempt detected from IP address 23.253.102.144 to port 2220 [J]
2020-01-31 14:15:09
165.227.102.177 attack
Unauthorized connection attempt detected from IP address 165.227.102.177 to port 2220 [J]
2020-01-31 14:46:02
106.13.127.142 attackspambots
2020-01-31T06:19:10.214992shield sshd\[15581\]: Invalid user garati from 106.13.127.142 port 38902
2020-01-31T06:19:10.222348shield sshd\[15581\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.127.142
2020-01-31T06:19:11.834401shield sshd\[15581\]: Failed password for invalid user garati from 106.13.127.142 port 38902 ssh2
2020-01-31T06:23:51.522466shield sshd\[16294\]: Invalid user leella from 106.13.127.142 port 37424
2020-01-31T06:23:51.530745shield sshd\[16294\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.127.142
2020-01-31 14:40:16
123.180.242.149 attackbots
Automatic report - Port Scan Attack
2020-01-31 14:21:43
1.1.170.82 attackspambots
Attacks websites by trying to access known vulnerables of plugins, brute-force of backends or probing of administrative tools
2020-01-31 14:27:24
188.151.118.100 attackbots
Many_bad_calls
2020-01-31 14:24:56

Recently Reported IPs

114.101.42.72 114.101.42.84 114.101.42.87 114.101.43.0
114.101.43.10 114.101.43.103 114.101.43.106 115.207.28.92
114.101.43.120 114.101.43.108 114.101.42.97 114.101.43.101
114.101.43.129 114.101.43.127 114.101.46.98 114.101.43.123
114.101.47.104 114.101.47.107 114.101.47.100 114.101.47.118