Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: None

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 114.101.83.40
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 57813
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;114.101.83.40.			IN	A

;; AUTHORITY SECTION:
.			285	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022030400 1800 900 604800 86400

;; Query time: 13 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Mar 04 14:27:03 CST 2022
;; MSG SIZE  rcvd: 106
Host info
Host 40.83.101.114.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 40.83.101.114.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
112.186.16.250 attack
port scan and connect, tcp 23 (telnet)
2019-07-09 11:15:58
14.165.91.183 attackspam
Unauthorized connection attempt from IP address 14.165.91.183 on Port 445(SMB)
2019-07-09 10:46:33
92.119.160.11 attackspam
Jul  9 02:37:13   TCP Attack: SRC=92.119.160.11 DST=[Masked] LEN=40 TOS=0x08 PREC=0x20 TTL=241  PROTO=TCP SPT=56913 DPT=31439 WINDOW=1024 RES=0x00 SYN URGP=0
2019-07-09 11:14:35
192.119.69.144 attackspambots
Spam
2019-07-09 10:32:42
194.213.62.233 attack
Unauthorized connection attempt from IP address 194.213.62.233 on Port 445(SMB)
2019-07-09 10:33:49
118.24.82.164 attackspam
Jul  8 20:30:40 MK-Soft-Root2 sshd\[9922\]: Invalid user son from 118.24.82.164 port 36864
Jul  8 20:30:40 MK-Soft-Root2 sshd\[9922\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.24.82.164
Jul  8 20:30:42 MK-Soft-Root2 sshd\[9922\]: Failed password for invalid user son from 118.24.82.164 port 36864 ssh2
...
2019-07-09 10:36:14
176.109.168.202 attackbots
missing rdns
2019-07-09 11:05:54
122.168.127.202 attackspam
Unauthorized connection attempt from IP address 122.168.127.202 on Port 445(SMB)
2019-07-09 10:41:08
156.218.43.5 attackbotsspam
1562610536 - 07/09/2019 01:28:56 Host: host-156.218.5.43-static.tedata.net/156.218.43.5 Port: 23 TCP Blocked
...
2019-07-09 11:20:32
146.0.136.142 attackbotsspam
SSH-BruteForce
2019-07-09 11:21:48
212.111.199.46 attack
Unauthorized connection attempt from IP address 212.111.199.46 on Port 445(SMB)
2019-07-09 10:54:09
170.130.187.22 attack
Portscan or hack attempt detected by psad/fwsnort
2019-07-09 10:54:35
114.34.203.92 attackbotsspam
2019-07-08T22:24:36.868591  sshd[10757]: Invalid user alejandro from 114.34.203.92 port 46550
2019-07-08T22:24:36.883296  sshd[10757]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=114.34.203.92
2019-07-08T22:24:36.868591  sshd[10757]: Invalid user alejandro from 114.34.203.92 port 46550
2019-07-08T22:24:38.744673  sshd[10757]: Failed password for invalid user alejandro from 114.34.203.92 port 46550 ssh2
2019-07-08T22:28:41.623258  sshd[10783]: Invalid user adda from 114.34.203.92 port 51632
...
2019-07-09 10:39:00
157.230.246.198 attack
Jul  9 03:55:08 icinga sshd[14200]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.230.246.198
Jul  9 03:55:10 icinga sshd[14200]: Failed password for invalid user carlin from 157.230.246.198 port 37296 ssh2
...
2019-07-09 10:34:57
62.138.0.25 attack
Regular (useless and unwanted) Wordpress Scan...
2019-07-09 11:17:58

Recently Reported IPs

114.101.83.55 114.101.83.62 114.101.83.42 114.101.83.64
114.101.83.36 113.239.74.138 114.101.83.67 114.101.83.71
114.101.83.78 114.101.83.74 114.101.83.8 114.101.83.84
114.101.83.86 114.101.83.88 114.101.83.82 114.101.83.90
114.101.83.92 113.239.74.250 114.101.83.96 114.101.83.99