Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: None

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
IP Type Details Datetime
114.106.136.228 attack
Unauthorized connection attempt detected from IP address 114.106.136.228 to port 6656 [T]
2020-01-30 08:22:27
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 114.106.136.132
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 52928
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;114.106.136.132.		IN	A

;; AUTHORITY SECTION:
.			185	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022030400 1800 900 604800 86400

;; Query time: 64 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Mar 05 03:05:10 CST 2022
;; MSG SIZE  rcvd: 108
Host info
Host 132.136.106.114.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 132.136.106.114.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
118.34.37.145 attackspambots
Dec 18 09:26:05 zeus sshd[28543]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.34.37.145 
Dec 18 09:26:07 zeus sshd[28543]: Failed password for invalid user apache from 118.34.37.145 port 60810 ssh2
Dec 18 09:32:31 zeus sshd[28707]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.34.37.145 
Dec 18 09:32:32 zeus sshd[28707]: Failed password for invalid user lapchak from 118.34.37.145 port 39548 ssh2
2019-12-18 21:42:45
82.237.6.67 attackspambots
Invalid user ada from 82.237.6.67 port 53156
2019-12-18 21:29:22
104.248.121.67 attackspambots
Invalid user williford from 104.248.121.67 port 60747
2019-12-18 21:39:03
191.34.74.55 attackbotsspam
Invalid user bernardini from 191.34.74.55 port 49298
2019-12-18 21:32:24
165.227.80.114 attackbots
Dec 18 03:46:50 php1 sshd\[30390\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.227.80.114  user=root
Dec 18 03:46:53 php1 sshd\[30390\]: Failed password for root from 165.227.80.114 port 55118 ssh2
Dec 18 03:53:21 php1 sshd\[31037\]: Invalid user minecraftserver from 165.227.80.114
Dec 18 03:53:21 php1 sshd\[31037\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.227.80.114
Dec 18 03:53:23 php1 sshd\[31037\]: Failed password for invalid user minecraftserver from 165.227.80.114 port 35154 ssh2
2019-12-18 21:59:22
162.220.165.173 attackbotsspam
Honeypot attack, port: 81, PTR: gruz03.ru.
2019-12-18 21:54:25
49.88.112.76 attackbotsspam
Dec 18 09:34:41 firewall sshd[1540]: Failed password for root from 49.88.112.76 port 17719 ssh2
Dec 18 09:34:43 firewall sshd[1540]: Failed password for root from 49.88.112.76 port 17719 ssh2
Dec 18 09:34:45 firewall sshd[1540]: Failed password for root from 49.88.112.76 port 17719 ssh2
...
2019-12-18 21:35:17
129.204.108.143 attackbotsspam
Dec 18 11:14:36 serwer sshd\[27734\]: User mysql from 129.204.108.143 not allowed because not listed in AllowUsers
Dec 18 11:14:36 serwer sshd\[27734\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.204.108.143  user=mysql
Dec 18 11:14:38 serwer sshd\[27734\]: Failed password for invalid user mysql from 129.204.108.143 port 59138 ssh2
...
2019-12-18 21:26:42
187.162.225.142 attack
Unauthorized connection attempt detected from IP address 187.162.225.142 to port 1433
2019-12-18 21:42:23
209.235.67.48 attackspam
Invalid user asia from 209.235.67.48 port 43327
2019-12-18 21:32:08
49.235.92.208 attackspambots
Dec 18 10:57:33 srv206 sshd[2812]: Invalid user allahd from 49.235.92.208
Dec 18 10:57:33 srv206 sshd[2812]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.235.92.208
Dec 18 10:57:33 srv206 sshd[2812]: Invalid user allahd from 49.235.92.208
Dec 18 10:57:34 srv206 sshd[2812]: Failed password for invalid user allahd from 49.235.92.208 port 41950 ssh2
...
2019-12-18 21:47:38
193.70.81.201 attackbotsspam
Dec 17 22:56:57 hpm sshd\[794\]: Invalid user meloney from 193.70.81.201
Dec 17 22:56:57 hpm sshd\[794\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=ns3036126.ip-193-70-81.eu
Dec 17 22:56:59 hpm sshd\[794\]: Failed password for invalid user meloney from 193.70.81.201 port 47360 ssh2
Dec 17 23:02:42 hpm sshd\[1420\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=ns3036126.ip-193-70-81.eu  user=lp
Dec 17 23:02:45 hpm sshd\[1420\]: Failed password for lp from 193.70.81.201 port 57812 ssh2
2019-12-18 21:30:33
131.0.8.49 attackbotsspam
Invalid user asterisk from 131.0.8.49 port 47147
2019-12-18 21:26:23
223.247.140.89 attack
Dec 18 03:04:09 hpm sshd\[26917\]: Invalid user carbito from 223.247.140.89
Dec 18 03:04:09 hpm sshd\[26917\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=223.247.140.89
Dec 18 03:04:11 hpm sshd\[26917\]: Failed password for invalid user carbito from 223.247.140.89 port 48546 ssh2
Dec 18 03:12:53 hpm sshd\[27972\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=223.247.140.89  user=root
Dec 18 03:12:56 hpm sshd\[27972\]: Failed password for root from 223.247.140.89 port 58802 ssh2
2019-12-18 21:27:39
218.92.0.157 attackspam
Dec 18 03:23:23 php1 sshd\[27949\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.157  user=root
Dec 18 03:23:25 php1 sshd\[27949\]: Failed password for root from 218.92.0.157 port 32379 ssh2
Dec 18 03:23:38 php1 sshd\[27949\]: Failed password for root from 218.92.0.157 port 32379 ssh2
Dec 18 03:23:42 php1 sshd\[27964\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.157  user=root
Dec 18 03:23:44 php1 sshd\[27964\]: Failed password for root from 218.92.0.157 port 64491 ssh2
2019-12-18 21:26:07

Recently Reported IPs

114.106.136.130 114.106.136.127 114.106.136.135 114.106.136.138
114.106.136.136 114.106.147.104 114.106.147.139 114.106.147.130
114.106.147.159 115.209.72.129 114.106.147.202 114.106.147.215
114.106.147.221 114.106.147.228 114.106.147.251 114.106.147.235
114.106.147.90 114.106.147.82 114.106.150.106 114.106.150.104