Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: China

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 114.101.63.66
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 57751
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;114.101.63.66.			IN	A

;; AUTHORITY SECTION:
.			344	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022030501 1800 900 604800 86400

;; Query time: 23 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Mar 06 10:54:48 CST 2022
;; MSG SIZE  rcvd: 106
Host info
Host 66.63.101.114.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 66.63.101.114.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
54.180.131.31 attack
10/29/2019-16:23:54.163564 54.180.131.31 Protocol: 6 ET SCAN Potential SSH Scan
2019-10-30 04:25:39
183.83.72.37 attackbots
Unauthorized connection attempt from IP address 183.83.72.37 on Port 445(SMB)
2019-10-30 03:58:12
178.191.72.215 attackbots
SSH Scan
2019-10-30 04:03:02
54.37.158.40 attackspam
Oct 29 12:27:44 SilenceServices sshd[3006]: Failed password for root from 54.37.158.40 port 40041 ssh2
Oct 29 12:31:16 SilenceServices sshd[4000]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=54.37.158.40
Oct 29 12:31:18 SilenceServices sshd[4000]: Failed password for invalid user sftp from 54.37.158.40 port 58945 ssh2
2019-10-30 03:53:14
176.31.6.221 attackbotsspam
[portscan] Port scan
2019-10-30 04:10:05
222.186.180.41 attackbotsspam
Oct 29 20:54:44 MainVPS sshd[26701]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.180.41  user=root
Oct 29 20:54:46 MainVPS sshd[26701]: Failed password for root from 222.186.180.41 port 19592 ssh2
Oct 29 20:55:03 MainVPS sshd[26701]: error: maximum authentication attempts exceeded for root from 222.186.180.41 port 19592 ssh2 [preauth]
Oct 29 20:54:44 MainVPS sshd[26701]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.180.41  user=root
Oct 29 20:54:46 MainVPS sshd[26701]: Failed password for root from 222.186.180.41 port 19592 ssh2
Oct 29 20:55:03 MainVPS sshd[26701]: error: maximum authentication attempts exceeded for root from 222.186.180.41 port 19592 ssh2 [preauth]
Oct 29 20:55:11 MainVPS sshd[26731]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.180.41  user=root
Oct 29 20:55:13 MainVPS sshd[26731]: Failed password for root from 222.186.180.41 port 25900 ss
2019-10-30 03:55:33
185.164.72.88 attackspambots
Oct 29 15:40:32 bilbo sshd[13857]: User root from 185.164.72.88 not allowed because not listed in AllowUsers
Oct 29 15:40:38 bilbo sshd[13859]: Invalid user admin from 185.164.72.88
Oct 29 15:40:41 bilbo sshd[13861]: User root from 185.164.72.88 not allowed because not listed in AllowUsers
Oct 29 15:40:46 bilbo sshd[13907]: User root from 185.164.72.88 not allowed because not listed in AllowUsers
...
2019-10-30 03:48:03
179.179.78.104 attackspam
Telnet Server BruteForce Attack
2019-10-30 04:11:45
222.186.190.2 attackspam
Oct 29 20:03:39 marvibiene sshd[23890]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.190.2  user=root
Oct 29 20:03:40 marvibiene sshd[23890]: Failed password for root from 222.186.190.2 port 33542 ssh2
Oct 29 20:03:44 marvibiene sshd[23890]: Failed password for root from 222.186.190.2 port 33542 ssh2
Oct 29 20:03:39 marvibiene sshd[23890]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.190.2  user=root
Oct 29 20:03:40 marvibiene sshd[23890]: Failed password for root from 222.186.190.2 port 33542 ssh2
Oct 29 20:03:44 marvibiene sshd[23890]: Failed password for root from 222.186.190.2 port 33542 ssh2
...
2019-10-30 04:18:00
106.12.36.173 attack
Oct 29 20:55:48 meumeu sshd[12872]: Failed password for root from 106.12.36.173 port 53258 ssh2
Oct 29 20:59:58 meumeu sshd[13448]: Failed password for root from 106.12.36.173 port 34484 ssh2
...
2019-10-30 04:10:29
101.99.64.133 attackspambots
Automatic report - XMLRPC Attack
2019-10-30 04:01:09
218.92.0.141 attackbotsspam
Oct 29 16:03:59 MK-Soft-VM6 sshd[8461]: Failed password for root from 218.92.0.141 port 35697 ssh2
Oct 29 16:04:02 MK-Soft-VM6 sshd[8461]: Failed password for root from 218.92.0.141 port 35697 ssh2
...
2019-10-30 03:46:40
47.245.2.225 attack
10/29/2019-16:19:30.031674 47.245.2.225 Protocol: 6 ET SCAN Potential SSH Scan
2019-10-30 04:21:34
41.60.238.119 attack
postfix (unknown user, SPF fail or relay access denied)
2019-10-30 04:18:46
120.52.120.18 attack
2019-10-29T20:03:49.214076abusebot-5.cloudsearch.cf sshd\[6035\]: Invalid user alm from 120.52.120.18 port 42730
2019-10-30 04:18:24

Recently Reported IPs

114.101.63.76 114.101.63.83 114.101.63.81 114.101.63.84
114.101.63.97 114.101.63.90 114.101.63.99 114.101.80.100
114.101.80.114 114.101.80.116 114.101.80.118 114.101.80.12
114.101.80.128 114.101.80.123 114.101.80.120 114.101.80.130
114.101.80.14 114.101.80.145 114.101.80.134 114.101.80.142