Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Singapore

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
IP Type Details Datetime
114.119.141.158 attack
Joomla User : try to access forms...
2020-02-21 05:41:49
114.119.141.150 attack
114.119.128.0 - 114.119.191.255
HUAWEI INTERNATIONAL PTE. LTD
15A Changi Business Park Central 1 Eightrium # 03-03/04, Singapore 486035

DOS effect with revolving IPs (in this range and a few others) and massively overloading with requests. 
Often fake agent such as Googlebot

Appears to be a Huawei server farm operated in Singapore for Hong Kong linked traffic.
Abuse Contact: guixiaowei@huawei.com   (doesn't respond)


netname:        HIPL-SG
mnt-irt:        IRT-HIPL-SG
2020-01-24 20:59:27
114.119.141.48 attack
badbot
2020-01-13 22:53:01
114.119.141.170 attackspam
badbot
2020-01-13 21:35:37
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 114.119.141.194
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 34155
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;114.119.141.194.		IN	A

;; AUTHORITY SECTION:
.			150	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022020702 1800 900 604800 86400

;; Query time: 17 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Feb 08 09:41:13 CST 2022
;; MSG SIZE  rcvd: 108
Host info
194.141.119.114.in-addr.arpa domain name pointer petalbot-114-119-141-194.petalsearch.com.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
194.141.119.114.in-addr.arpa	name = petalbot-114-119-141-194.petalsearch.com.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
112.85.42.180 attackspam
Sep 23 18:45:27 MK-Soft-Root1 sshd[3146]: Failed password for root from 112.85.42.180 port 55724 ssh2
Sep 23 18:45:32 MK-Soft-Root1 sshd[3146]: Failed password for root from 112.85.42.180 port 55724 ssh2
...
2019-09-24 01:28:30
119.102.43.229 attack
IP Ban Report : https://help-dysk.pl/wordpress-firewall-plugins/ip/119.102.43.229/ 
 CN - 1H : (1451)  
 Protection Against DDoS WordPress plugin :  
 "odzyskiwanie danych help-dysk" 
 IP Address Ranges by Country : CN 
 NAME ASN : ASN4134 
 
 IP : 119.102.43.229 
 
 CIDR : 119.102.0.0/15 
 
 PREFIX COUNT : 5430 
 
 UNIQUE IP COUNT : 106919680 
 
 
 WYKRYTE ATAKI Z ASN4134 :  
  1H - 44 
  3H - 178 
  6H - 401 
 12H - 508 
 24H - 525 
 
 INFO : Port Scan TELNET Detected and Blocked by ADMIN  - data recovery
2019-09-24 01:22:49
114.45.235.58 attackspambots
IP Ban Report : https://help-dysk.pl/wordpress-firewall-plugins/ip/114.45.235.58/ 
 TW - 1H : (2990)  
 Protection Against DDoS WordPress plugin :  
 "odzyskiwanie danych help-dysk" 
 IP Address Ranges by Country : TW 
 NAME ASN : ASN3462 
 
 IP : 114.45.235.58 
 
 CIDR : 114.45.0.0/16 
 
 PREFIX COUNT : 390 
 
 UNIQUE IP COUNT : 12267520 
 
 
 WYKRYTE ATAKI Z ASN3462 :  
  1H - 304 
  3H - 1027 
  6H - 2187 
 12H - 2890 
 24H - 2899 
 
 INFO : Port Scan TELNET Detected and Blocked by ADMIN  - data recovery
2019-09-24 01:30:54
49.88.112.55 attackspambots
Sep 23 15:34:16 server2 sshd\[19224\]: User root from 49.88.112.55 not allowed because not listed in AllowUsers
Sep 23 15:34:16 server2 sshd\[19223\]: User root from 49.88.112.55 not allowed because not listed in AllowUsers
Sep 23 15:34:16 server2 sshd\[19227\]: User root from 49.88.112.55 not allowed because not listed in AllowUsers
Sep 23 15:34:16 server2 sshd\[19221\]: User root from 49.88.112.55 not allowed because not listed in AllowUsers
Sep 23 15:34:17 server2 sshd\[19229\]: User root from 49.88.112.55 not allowed because not listed in AllowUsers
Sep 23 15:36:31 server2 sshd\[19524\]: User root from 49.88.112.55 not allowed because not listed in AllowUsers
2019-09-24 01:39:33
104.40.0.120 attackspam
Sep 23 05:52:48 web1 sshd\[4986\]: Invalid user user from 104.40.0.120
Sep 23 05:52:48 web1 sshd\[4986\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.40.0.120
Sep 23 05:52:50 web1 sshd\[4986\]: Failed password for invalid user user from 104.40.0.120 port 2496 ssh2
Sep 23 05:57:34 web1 sshd\[5411\]: Invalid user linuxadmin from 104.40.0.120
Sep 23 05:57:34 web1 sshd\[5411\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.40.0.120
2019-09-24 01:40:17
40.122.29.117 attack
Sep 23 16:51:03 hcbbdb sshd\[22848\]: Invalid user jboss from 40.122.29.117
Sep 23 16:51:03 hcbbdb sshd\[22848\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=40.122.29.117
Sep 23 16:51:05 hcbbdb sshd\[22848\]: Failed password for invalid user jboss from 40.122.29.117 port 1280 ssh2
Sep 23 16:55:58 hcbbdb sshd\[23428\]: Invalid user temp from 40.122.29.117
Sep 23 16:55:58 hcbbdb sshd\[23428\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=40.122.29.117
2019-09-24 01:00:50
104.140.183.207 attackspam
104.140.183.207 - - [23/Sep/2019:08:17:05 -0400] "GET /?page=products&action=view&manufacturerID=1&productID=/etc/passwd%00&linkID=3128 HTTP/1.1" 302 - "https://baldwinbrasshardware.com/?page=products&action=view&manufacturerID=1&productID=/etc/passwd%00&linkID=3128" "Mozilla/5.0 (Windows NT 10.0; WOW64; Rv:50.0) Gecko/20100101 Firefox/50.0"
...
2019-09-24 01:21:55
138.68.128.80 attackspambots
2019-09-23T17:02:39.893960abusebot-7.cloudsearch.cf sshd\[31323\]: Invalid user 123456 from 138.68.128.80 port 49924
2019-09-24 01:03:07
74.83.196.67 attackspam
Sep 23 12:53:34 thevastnessof sshd[1052]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=74.83.196.67
...
2019-09-24 01:37:36
51.83.74.126 attack
Sep 23 12:54:46 xtremcommunity sshd\[399715\]: Invalid user pi from 51.83.74.126 port 39740
Sep 23 12:54:46 xtremcommunity sshd\[399715\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.83.74.126
Sep 23 12:54:49 xtremcommunity sshd\[399715\]: Failed password for invalid user pi from 51.83.74.126 port 39740 ssh2
Sep 23 12:59:10 xtremcommunity sshd\[399812\]: Invalid user adam from 51.83.74.126 port 54732
Sep 23 12:59:10 xtremcommunity sshd\[399812\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.83.74.126
...
2019-09-24 00:59:19
170.130.66.171 attackbots
170.130.66.171 - - [23/Sep/2019:08:16:48 -0400] "GET /?page=products&action=view&manufacturerID=1&productID=/etc/passwd&linkID=3128 HTTP/1.1" 302 - "https://baldwinbrasshardware.com/?page=products&action=view&manufacturerID=1&productID=/etc/passwd&linkID=3128" "Mozilla/5.0 (Windows NT 10.0; WOW64; Rv:50.0) Gecko/20100101 Firefox/50.0"
...
2019-09-24 01:29:29
81.174.227.29 attackspam
2019-09-23T16:59:21.688016abusebot-4.cloudsearch.cf sshd\[28140\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=sanyaade.plus.com
2019-09-24 01:43:41
112.5.90.232 attack
IP Ban Report : https://help-dysk.pl/wordpress-firewall-plugins/ip/112.5.90.232/ 
 CN - 1H : (1450)  
 Protection Against DDoS WordPress plugin :  
 "odzyskiwanie danych help-dysk" 
 IP Address Ranges by Country : CN 
 NAME ASN : ASN9808 
 
 IP : 112.5.90.232 
 
 CIDR : 112.5.88.0/21 
 
 PREFIX COUNT : 3598 
 
 UNIQUE IP COUNT : 18819072 
 
 
 WYKRYTE ATAKI Z ASN9808 :  
  1H - 3 
  3H - 11 
  6H - 23 
 12H - 30 
 24H - 34 
 
 INFO : Port Scan TELNET Detected and Blocked by ADMIN  - data recovery
2019-09-24 01:42:35
112.85.42.173 attack
k+ssh-bruteforce
2019-09-24 01:25:20
112.64.34.165 attack
Sep 23 18:46:57 microserver sshd[9279]: Invalid user qwerty from 112.64.34.165 port 44199
Sep 23 18:46:57 microserver sshd[9279]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.64.34.165
Sep 23 18:46:59 microserver sshd[9279]: Failed password for invalid user qwerty from 112.64.34.165 port 44199 ssh2
Sep 23 18:51:58 microserver sshd[9999]: Invalid user p@55w0rd from 112.64.34.165 port 59103
Sep 23 18:51:58 microserver sshd[9999]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.64.34.165
Sep 23 19:02:11 microserver sshd[11447]: Invalid user sx from 112.64.34.165 port 60678
Sep 23 19:02:11 microserver sshd[11447]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.64.34.165
Sep 23 19:02:12 microserver sshd[11447]: Failed password for invalid user sx from 112.64.34.165 port 60678 ssh2
Sep 23 19:07:08 microserver sshd[12153]: Invalid user gb@123 from 112.64.34.165 port 47347
Sep 23 19:
2019-09-24 01:17:01

Recently Reported IPs

213.167.223.96 41.47.159.179 114.99.130.77 178.159.37.70
222.244.245.152 187.162.106.51 168.119.62.59 154.201.41.93
182.214.214.124 189.211.115.8 177.69.129.18 34.93.33.52
41.237.215.96 45.175.182.28 93.116.254.90 178.93.40.243
23.19.10.71 185.158.175.173 125.209.91.174 159.223.46.222