Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Singapore

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
IP Type Details Datetime
114.119.141.158 attack
Joomla User : try to access forms...
2020-02-21 05:41:49
114.119.141.150 attack
114.119.128.0 - 114.119.191.255
HUAWEI INTERNATIONAL PTE. LTD
15A Changi Business Park Central 1 Eightrium # 03-03/04, Singapore 486035

DOS effect with revolving IPs (in this range and a few others) and massively overloading with requests. 
Often fake agent such as Googlebot

Appears to be a Huawei server farm operated in Singapore for Hong Kong linked traffic.
Abuse Contact: guixiaowei@huawei.com   (doesn't respond)


netname:        HIPL-SG
mnt-irt:        IRT-HIPL-SG
2020-01-24 20:59:27
114.119.141.48 attack
badbot
2020-01-13 22:53:01
114.119.141.170 attackspam
badbot
2020-01-13 21:35:37
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 114.119.141.217
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 1640
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;114.119.141.217.		IN	A

;; AUTHORITY SECTION:
.			496	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022020701 1800 900 604800 86400

;; Query time: 21 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Feb 08 05:47:07 CST 2022
;; MSG SIZE  rcvd: 108
Host info
217.141.119.114.in-addr.arpa domain name pointer petalbot-114-119-141-217.petalsearch.com.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
217.141.119.114.in-addr.arpa	name = petalbot-114-119-141-217.petalsearch.com.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
192.241.144.235 attackspambots
Apr  8 07:57:37 odroid64 sshd\[20327\]: Invalid user andrew from 192.241.144.235
Apr  8 07:57:37 odroid64 sshd\[20327\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=192.241.144.235
...
2020-04-08 16:54:20
45.220.84.13 attackbots
10 attempts against mh-pma-try-ban on olive
2020-04-08 16:41:36
125.25.205.135 attackspambots
10 attempts against mh-misc-ban on star
2020-04-08 17:11:02
123.160.246.186 attack
Apr  8 08:54:14 ns382633 sshd\[28728\]: Invalid user teste from 123.160.246.186 port 36800
Apr  8 08:54:14 ns382633 sshd\[28728\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=123.160.246.186
Apr  8 08:54:16 ns382633 sshd\[28728\]: Failed password for invalid user teste from 123.160.246.186 port 36800 ssh2
Apr  8 09:11:58 ns382633 sshd\[32221\]: Invalid user es from 123.160.246.186 port 37056
Apr  8 09:11:58 ns382633 sshd\[32221\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=123.160.246.186
2020-04-08 16:40:01
218.92.0.190 attack
Apr  8 09:41:14 srv-ubuntu-dev3 sshd[82444]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.190  user=root
Apr  8 09:41:17 srv-ubuntu-dev3 sshd[82444]: Failed password for root from 218.92.0.190 port 45425 ssh2
Apr  8 09:41:14 srv-ubuntu-dev3 sshd[82444]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.190  user=root
Apr  8 09:41:17 srv-ubuntu-dev3 sshd[82444]: Failed password for root from 218.92.0.190 port 45425 ssh2
Apr  8 09:41:19 srv-ubuntu-dev3 sshd[82444]: Failed password for root from 218.92.0.190 port 45425 ssh2
Apr  8 09:41:14 srv-ubuntu-dev3 sshd[82444]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.190  user=root
Apr  8 09:41:17 srv-ubuntu-dev3 sshd[82444]: Failed password for root from 218.92.0.190 port 45425 ssh2
Apr  8 09:41:19 srv-ubuntu-dev3 sshd[82444]: Failed password for root from 218.92.0.190 port 45425 ssh2
Apr  8 09
...
2020-04-08 17:12:18
94.191.83.84 attack
Apr  8 05:59:51 vps333114 sshd[6686]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=94.191.83.84
Apr  8 05:59:53 vps333114 sshd[6686]: Failed password for invalid user postgres from 94.191.83.84 port 45272 ssh2
...
2020-04-08 16:32:24
110.49.53.18 attack
20/4/7@23:54:53: FAIL: Alarm-Network address from=110.49.53.18
...
2020-04-08 17:11:15
49.235.106.221 attackbotsspam
Apr  8 09:10:48 l03 sshd[12142]: Invalid user team from 49.235.106.221 port 40854
...
2020-04-08 16:33:23
103.63.109.74 attackbots
Apr  8 10:22:58 host01 sshd[11187]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.63.109.74 
Apr  8 10:23:00 host01 sshd[11187]: Failed password for invalid user iview from 103.63.109.74 port 52170 ssh2
Apr  8 10:27:35 host01 sshd[12085]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.63.109.74 
...
2020-04-08 17:02:36
201.90.101.165 attackbotsspam
2020-04-08T07:36:46.970505rocketchat.forhosting.nl sshd[15557]: Invalid user admin from 201.90.101.165 port 37704
2020-04-08T07:36:49.306637rocketchat.forhosting.nl sshd[15557]: Failed password for invalid user admin from 201.90.101.165 port 37704 ssh2
2020-04-08T07:48:52.064221rocketchat.forhosting.nl sshd[15869]: Invalid user info from 201.90.101.165 port 40932
...
2020-04-08 16:35:26
91.188.229.168 attack
HACKED MY ACCOUNT IN STEAM.. PLEASE RETURN MY ACCOUNT
2020-04-08 17:08:59
174.138.18.157 attack
(sshd) Failed SSH login from 174.138.18.157 (SG/Singapore/-): 5 in the last 3600 secs
2020-04-08 16:55:59
91.188.229.168 attack
HACKED MY ACCOUNT IN STEAM.. PLEASE RETURN MY ACCOUNT, HACKER HACKER
2020-04-08 17:09:24
77.40.3.55 attackspam
(smtpauth) Failed SMTP AUTH login from 77.40.3.55 (RU/Russia/55.3.dialup.mari-el.ru): 1 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_TRIGGER; Logs: 2020-04-08 12:19:44 login authenticator failed for (localhost.localdomain) [77.40.3.55]: 535 Incorrect authentication data (set_id=media@shahdineh.com)
2020-04-08 16:39:07
110.141.230.246 attack
Automatic report - Port Scan Attack
2020-04-08 16:43:38

Recently Reported IPs

218.53.145.207 123.188.157.10 122.232.215.44 213.134.165.195
114.237.58.198 91.228.58.253 112.186.210.148 167.172.65.212
102.220.209.105 41.65.174.36 59.66.17.14 35.189.19.57
107.174.47.188 42.238.172.235 188.168.154.133 45.166.204.254
103.139.225.89 49.204.139.1 223.130.31.112 115.196.126.43