Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: None

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 114.108.30.11
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 30618
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;114.108.30.11.			IN	A

;; AUTHORITY SECTION:
.			540	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022021702 1800 900 604800 86400

;; Query time: 65 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 18 06:01:06 CST 2022
;; MSG SIZE  rcvd: 106
Host info
11.30.108.114.in-addr.arpa domain name pointer daum.hungkuk.co.kr.
11.30.108.114.in-addr.arpa domain name pointer heungkuklife.co.kr.
11.30.108.114.in-addr.arpa domain name pointer wwt.heungkuklife.co.kr.
11.30.108.114.in-addr.arpa domain name pointer www.heungkukfg.co.kr.
11.30.108.114.in-addr.arpa domain name pointer hungkuk.co.kr.
11.30.108.114.in-addr.arpa domain name pointer www.hungkuk.co.kr.
11.30.108.114.in-addr.arpa domain name pointer ga.heungkuklife.co.kr.
11.30.108.114.in-addr.arpa domain name pointer wwt.hungkuk.co.kr.
11.30.108.114.in-addr.arpa domain name pointer daum.heungkuklife.co.kr.
11.30.108.114.in-addr.arpa domain name pointer heungkukfg.co.kr.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
11.30.108.114.in-addr.arpa	name = www.heungkukfg.co.kr.
11.30.108.114.in-addr.arpa	name = hungkuk.co.kr.
11.30.108.114.in-addr.arpa	name = www.hungkuk.co.kr.
11.30.108.114.in-addr.arpa	name = ga.heungkuklife.co.kr.
11.30.108.114.in-addr.arpa	name = wwt.hungkuk.co.kr.
11.30.108.114.in-addr.arpa	name = daum.heungkuklife.co.kr.
11.30.108.114.in-addr.arpa	name = heungkukfg.co.kr.
11.30.108.114.in-addr.arpa	name = daum.hungkuk.co.kr.
11.30.108.114.in-addr.arpa	name = heungkuklife.co.kr.
11.30.108.114.in-addr.arpa	name = wwt.heungkuklife.co.kr.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
94.128.219.21 attack
2020-07-30T04:59:29.041719shield sshd\[28389\]: Invalid user sanchi from 94.128.219.21 port 31058
2020-07-30T04:59:29.047972shield sshd\[28389\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=94.128.219.21
2020-07-30T04:59:31.592882shield sshd\[28389\]: Failed password for invalid user sanchi from 94.128.219.21 port 31058 ssh2
2020-07-30T05:04:46.017154shield sshd\[30725\]: Invalid user jianfei from 94.128.219.21 port 31059
2020-07-30T05:04:46.026138shield sshd\[30725\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=94.128.219.21
2020-07-30 13:09:12
79.137.72.171 attack
Jul 30 06:31:50 eventyay sshd[31163]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=79.137.72.171
Jul 30 06:31:53 eventyay sshd[31163]: Failed password for invalid user sampserver from 79.137.72.171 port 35104 ssh2
Jul 30 06:39:12 eventyay sshd[31603]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=79.137.72.171
...
2020-07-30 12:44:44
118.171.148.45 attackbotsspam
SMB Server BruteForce Attack
2020-07-30 13:03:55
182.61.104.246 attackspambots
Jul 30 06:26:39 ns381471 sshd[26578]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.61.104.246
Jul 30 06:26:40 ns381471 sshd[26578]: Failed password for invalid user nagios from 182.61.104.246 port 56331 ssh2
2020-07-30 12:43:33
141.98.10.197 attackbotsspam
Invalid user admin from 141.98.10.197 port 42725
2020-07-30 13:01:27
49.232.100.132 attack
Invalid user energy from 49.232.100.132 port 35090
2020-07-30 13:01:50
180.71.58.82 attackspambots
Invalid user ssh from 180.71.58.82 port 54008
2020-07-30 13:01:03
200.29.120.146 attackbotsspam
Bruteforce detected by fail2ban
2020-07-30 12:55:54
88.156.122.72 attackspambots
2020-07-30T06:11:02.752178mail.broermann.family sshd[21549]: Invalid user gxdong from 88.156.122.72 port 36356
2020-07-30T06:11:02.756254mail.broermann.family sshd[21549]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=088156122072.tarnowskiegory.vectranet.pl
2020-07-30T06:11:02.752178mail.broermann.family sshd[21549]: Invalid user gxdong from 88.156.122.72 port 36356
2020-07-30T06:11:04.888025mail.broermann.family sshd[21549]: Failed password for invalid user gxdong from 88.156.122.72 port 36356 ssh2
2020-07-30T06:17:49.593958mail.broermann.family sshd[21774]: Invalid user ltl from 88.156.122.72 port 48082
...
2020-07-30 12:34:56
122.225.230.10 attack
2020-07-30T06:20:31.732492ks3355764 sshd[20674]: Invalid user fgq from 122.225.230.10 port 44632
2020-07-30T06:20:34.331090ks3355764 sshd[20674]: Failed password for invalid user fgq from 122.225.230.10 port 44632 ssh2
...
2020-07-30 12:34:27
59.127.1.12 attack
2020-07-30T04:26:58.936056shield sshd\[18335\]: Invalid user jianhaoc from 59.127.1.12 port 47734
2020-07-30T04:26:58.941862shield sshd\[18335\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=59-127-1-12.hinet-ip.hinet.net
2020-07-30T04:27:00.655827shield sshd\[18335\]: Failed password for invalid user jianhaoc from 59.127.1.12 port 47734 ssh2
2020-07-30T04:31:29.747189shield sshd\[19570\]: Invalid user minecraft from 59.127.1.12 port 59626
2020-07-30T04:31:29.753296shield sshd\[19570\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=59-127-1-12.hinet-ip.hinet.net
2020-07-30 12:46:18
60.161.187.161 attackspam
Dovecot Invalid User Login Attempt.
2020-07-30 13:12:27
111.67.198.184 attackbotsspam
Invalid user huizhen from 111.67.198.184 port 39698
2020-07-30 13:07:30
222.186.173.215 attack
2020-07-30T06:38:43.244341vps751288.ovh.net sshd\[23406\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.173.215  user=root
2020-07-30T06:38:45.404804vps751288.ovh.net sshd\[23406\]: Failed password for root from 222.186.173.215 port 4960 ssh2
2020-07-30T06:38:48.578484vps751288.ovh.net sshd\[23406\]: Failed password for root from 222.186.173.215 port 4960 ssh2
2020-07-30T06:38:51.828794vps751288.ovh.net sshd\[23406\]: Failed password for root from 222.186.173.215 port 4960 ssh2
2020-07-30T06:38:54.628031vps751288.ovh.net sshd\[23406\]: Failed password for root from 222.186.173.215 port 4960 ssh2
2020-07-30 12:48:07
139.59.43.71 attackbots
139.59.43.71 - - [30/Jul/2020:04:55:27 +0100] "POST /wp-login.php HTTP/1.1" 200 1973 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
139.59.43.71 - - [30/Jul/2020:04:55:30 +0100] "POST /wp-login.php HTTP/1.1" 200 1954 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
139.59.43.71 - - [30/Jul/2020:04:55:32 +0100] "POST /wp-login.php HTTP/1.1" 200 1953 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
...
2020-07-30 12:36:56

Recently Reported IPs

114.108.163.166 114.111.142.185 114.111.32.159 114.111.32.187
114.111.32.98 114.112.216.2 114.113.154.195 114.113.154.105
114.115.133.54 114.116.231.91 114.116.232.223 114.116.39.220
114.112.70.140 114.113.120.250 114.113.231.158 114.113.83.10
114.116.44.77 114.117.1.89 114.117.166.20 114.118.10.181