Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: China

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 114.105.220.138
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 33093
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;114.105.220.138.		IN	A

;; AUTHORITY SECTION:
.			315	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022030400 1800 900 604800 86400

;; Query time: 28 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Mar 04 19:02:03 CST 2022
;; MSG SIZE  rcvd: 108
Host info
Host 138.220.105.114.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 138.220.105.114.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
51.83.74.203 attackspambots
Jul 17 21:07:54 SilenceServices sshd[21677]: Failed password for git from 51.83.74.203 port 44801 ssh2
Jul 17 21:12:17 SilenceServices sshd[23954]: Failed password for root from 51.83.74.203 port 43520 ssh2
Jul 17 21:16:36 SilenceServices sshd[26150]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.83.74.203
2019-07-18 03:26:52
191.53.222.234 attack
failed_logins
2019-07-18 03:40:34
222.186.15.110 attack
2019-07-17T19:06:46.594012abusebot.cloudsearch.cf sshd\[24475\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.15.110  user=root
2019-07-18 03:36:08
71.6.167.142 attackspambots
Automatic report - Port Scan Attack
2019-07-18 03:52:42
197.243.32.204 attack
Jul 17 20:28:12 microserver sshd[62596]: Invalid user ahmed from 197.243.32.204 port 46003
Jul 17 20:28:12 microserver sshd[62596]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=197.243.32.204
Jul 17 20:28:14 microserver sshd[62596]: Failed password for invalid user ahmed from 197.243.32.204 port 46003 ssh2
Jul 17 20:34:41 microserver sshd[63377]: Invalid user axente from 197.243.32.204 port 45265
Jul 17 20:34:41 microserver sshd[63377]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=197.243.32.204
Jul 17 20:47:26 microserver sshd[65275]: Invalid user mqm from 197.243.32.204 port 44238
Jul 17 20:47:26 microserver sshd[65275]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=197.243.32.204
Jul 17 20:47:28 microserver sshd[65275]: Failed password for invalid user mqm from 197.243.32.204 port 44238 ssh2
Jul 17 20:53:50 microserver sshd[897]: Invalid user cc from 197.243.32.204 port 43474
Jul
2019-07-18 03:27:48
92.119.160.144 attackspambots
Scanning (more than 2 packets) random ports - tries to find possible vulnerable services
2019-07-18 03:56:02
172.105.219.236 attackbots
SPLUNK port scan detected:
Jul 17 12:33:49 testbed kernel: Firewall: *TCP_IN Blocked* IN=eth0 OUT= MAC=82:c6:52:d1:6e:53:c0:42:d0:39:2c:30:08:00 SRC=172.105.219.236 DST=104.248.11.191 LEN=40 TOS=0x00 PREC=0x00 TTL=245 ID=54321 PROTO=TCP SPT=47295 DPT=119 WINDOW=65535 RES=0x00 SYN URGP=0
2019-07-18 03:46:13
68.183.48.172 attack
Jul 17 20:30:03 microserver sshd[62713]: Invalid user thomas from 68.183.48.172 port 39257
Jul 17 20:30:03 microserver sshd[62713]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=68.183.48.172
Jul 17 20:30:05 microserver sshd[62713]: Failed password for invalid user thomas from 68.183.48.172 port 39257 ssh2
Jul 17 20:34:46 microserver sshd[63395]: Invalid user testuser from 68.183.48.172 port 38073
Jul 17 20:34:46 microserver sshd[63395]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=68.183.48.172
Jul 17 20:48:39 microserver sshd[65335]: Invalid user valerie from 68.183.48.172 port 34527
Jul 17 20:48:39 microserver sshd[65335]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=68.183.48.172
Jul 17 20:48:41 microserver sshd[65335]: Failed password for invalid user valerie from 68.183.48.172 port 34527 ssh2
Jul 17 20:53:22 microserver sshd[859]: Invalid user telecom from 68.183.48.172 port 33
2019-07-18 03:24:23
78.206.153.68 attackbotsspam
$f2bV_matches
2019-07-18 03:26:34
112.85.42.227 attackspambots
Jul 17 14:19:41 aat-srv002 sshd[19264]: Failed password for root from 112.85.42.227 port 54070 ssh2
Jul 17 14:35:03 aat-srv002 sshd[19566]: Failed password for root from 112.85.42.227 port 48379 ssh2
Jul 17 14:35:05 aat-srv002 sshd[19566]: Failed password for root from 112.85.42.227 port 48379 ssh2
Jul 17 14:35:07 aat-srv002 sshd[19566]: Failed password for root from 112.85.42.227 port 48379 ssh2
...
2019-07-18 03:42:04
180.250.115.121 attackspam
Jul 17 21:05:28 legacy sshd[14435]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.250.115.121
Jul 17 21:05:31 legacy sshd[14435]: Failed password for invalid user brayden from 180.250.115.121 port 53055 ssh2
Jul 17 21:11:15 legacy sshd[14605]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.250.115.121
...
2019-07-18 03:13:09
179.154.95.194 attackspambots
Jul 17 19:39:39 * sshd[5213]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=179.154.95.194
Jul 17 19:39:41 * sshd[5213]: Failed password for invalid user camilo from 179.154.95.194 port 62882 ssh2
2019-07-18 03:50:34
130.211.246.128 attackbotsspam
Jul 17 18:34:58 pornomens sshd\[15647\]: Invalid user usuario from 130.211.246.128 port 56830
Jul 17 18:34:58 pornomens sshd\[15647\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=130.211.246.128
Jul 17 18:35:00 pornomens sshd\[15647\]: Failed password for invalid user usuario from 130.211.246.128 port 56830 ssh2
...
2019-07-18 03:19:39
83.103.193.225 attackbots
Jul 17 07:19:10 Ubuntu-1404-trusty-64-minimal sshd\[15477\]: Invalid user admin from 83.103.193.225
Jul 17 07:19:10 Ubuntu-1404-trusty-64-minimal sshd\[15477\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=83.103.193.225
Jul 17 07:19:12 Ubuntu-1404-trusty-64-minimal sshd\[15477\]: Failed password for invalid user admin from 83.103.193.225 port 59863 ssh2
Jul 17 18:34:17 Ubuntu-1404-trusty-64-minimal sshd\[4673\]: Invalid user 1234 from 83.103.193.225
Jul 17 18:34:18 Ubuntu-1404-trusty-64-minimal sshd\[4673\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=83.103.193.225
2019-07-18 03:37:24
91.121.132.116 attack
Jul 17 21:47:22 OPSO sshd\[16760\]: Invalid user tushar from 91.121.132.116 port 34212
Jul 17 21:47:22 OPSO sshd\[16760\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=91.121.132.116
Jul 17 21:47:25 OPSO sshd\[16760\]: Failed password for invalid user tushar from 91.121.132.116 port 34212 ssh2
Jul 17 21:51:49 OPSO sshd\[17259\]: Invalid user teamspeak from 91.121.132.116 port 33000
Jul 17 21:51:49 OPSO sshd\[17259\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=91.121.132.116
2019-07-18 03:56:25

Recently Reported IPs

138.108.21.174 114.105.220.143 114.105.220.15 116.209.53.140
116.209.53.154 116.209.53.142 116.209.53.153 116.209.53.156
116.209.53.158 116.209.53.15 116.209.53.144 116.209.53.145
116.209.53.150 114.105.220.151 116.209.53.146 116.209.53.148
116.209.53.16 116.209.53.162 116.209.53.164 116.209.53.166