Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: None

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
IP Type Details Datetime
114.104.141.149 attackbotsspam
Unauthorized IMAP connection attempt
2020-06-16 15:55:04
114.104.141.97 attack
Unauthorized access detected from black listed ip!
2020-05-03 18:30:09
114.104.141.151 attackspam
Honeypot hit.
2019-10-26 17:30:47
114.104.141.244 attack
Honeypot hit.
2019-10-26 14:30:04
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 114.104.141.198
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 16920
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;114.104.141.198.		IN	A

;; AUTHORITY SECTION:
.			256	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022030400 1800 900 604800 86400

;; Query time: 85 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Mar 05 03:03:56 CST 2022
;; MSG SIZE  rcvd: 108
Host info
Host 198.141.104.114.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 198.141.104.114.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
2.39.173.31 attack
Draytek Vigor Remote Command Execution Vulnerability
2020-04-13 02:52:50
37.112.100.26 attackspambots
Unauthorized connection attempt detected from IP address 37.112.100.26 to port 8080
2020-04-13 02:50:02
173.68.16.3 attackbotsspam
Unauthorized connection attempt detected from IP address 173.68.16.3 to port 81
2020-04-13 03:08:48
185.202.0.21 attackbots
Unauthorized connection attempt detected from IP address 185.202.0.21 to port 3385 [T]
2020-04-13 03:04:10
178.134.79.62 attackspam
Unauthorized connection attempt detected from IP address 178.134.79.62 to port 8089
2020-04-13 03:05:59
2.183.206.55 attack
Unauthorized connection attempt detected from IP address 2.183.206.55 to port 8080
2020-04-13 02:52:33
188.248.71.39 attackbots
Unauthorized connection attempt detected from IP address 188.248.71.39 to port 8089
2020-04-13 03:03:14
77.42.73.240 attackspambots
Unauthorized connection attempt detected from IP address 77.42.73.240 to port 23
2020-04-13 02:44:57
213.32.254.134 attack
Unauthorized connection attempt detected from IP address 213.32.254.134 to port 8080
2020-04-13 02:55:47
189.223.198.14 attackbotsspam
Unauthorized connection attempt detected from IP address 189.223.198.14 to port 23
2020-04-13 03:02:22
88.249.248.91 attackspambots
Unauthorized connection attempt detected from IP address 88.249.248.91 to port 80
2020-04-13 03:16:56
177.193.3.179 attackbots
Unauthorized connection attempt detected from IP address 177.193.3.179 to port 81
2020-04-13 03:06:56
66.76.46.118 attack
Telnet/23 MH Probe, Scan, BF, Hack -
2020-04-13 02:45:59
91.186.194.141 attack
Unauthorized connection attempt detected from IP address 91.186.194.141 to port 80
2020-04-13 02:36:51
103.77.3.147 attackbotsspam
Unauthorized connection attempt detected from IP address 103.77.3.147 to port 1433
2020-04-13 03:13:44

Recently Reported IPs

114.104.141.2 114.104.141.20 114.104.141.204 114.104.141.200
114.104.141.206 114.104.141.202 114.104.141.209 114.104.141.210
114.104.141.212 114.104.141.213 115.209.51.208 114.104.141.215
114.104.141.216 114.104.141.218 114.104.141.22 114.104.141.221
114.104.141.222 114.104.141.227 114.104.141.224 115.209.51.212