Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Singapore

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
IP Type Details Datetime
114.119.141.158 attack
Joomla User : try to access forms...
2020-02-21 05:41:49
114.119.141.150 attack
114.119.128.0 - 114.119.191.255
HUAWEI INTERNATIONAL PTE. LTD
15A Changi Business Park Central 1 Eightrium # 03-03/04, Singapore 486035

DOS effect with revolving IPs (in this range and a few others) and massively overloading with requests. 
Often fake agent such as Googlebot

Appears to be a Huawei server farm operated in Singapore for Hong Kong linked traffic.
Abuse Contact: guixiaowei@huawei.com   (doesn't respond)


netname:        HIPL-SG
mnt-irt:        IRT-HIPL-SG
2020-01-24 20:59:27
114.119.141.48 attack
badbot
2020-01-13 22:53:01
114.119.141.170 attackspam
badbot
2020-01-13 21:35:37
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 114.119.141.53
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 30113
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;114.119.141.53.			IN	A

;; AUTHORITY SECTION:
.			293	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022020700 1800 900 604800 86400

;; Query time: 57 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Feb 07 23:42:52 CST 2022
;; MSG SIZE  rcvd: 107
Host info
53.141.119.114.in-addr.arpa domain name pointer petalbot-114-119-141-53.petalsearch.com.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
53.141.119.114.in-addr.arpa	name = petalbot-114-119-141-53.petalsearch.com.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
195.54.160.180 attackbots
Aug 20 10:44:58 cosmoit sshd[29009]: Failed password for uucp from 195.54.160.180 port 32679 ssh2
2020-08-20 16:48:56
192.35.168.229 attackbotsspam
MultiHost/MultiPort Probe, Scan, Hack -
2020-08-20 16:50:24
51.91.127.200 attackbots
51.91.127.200 - - [20/Aug/2020:07:05:57 +0100] "POST /wp-login.php HTTP/1.1" 200 1996 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
51.91.127.200 - - [20/Aug/2020:07:05:59 +0100] "POST /wp-login.php HTTP/1.1" 200 2000 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
51.91.127.200 - - [20/Aug/2020:07:06:00 +0100] "POST /xmlrpc.php HTTP/1.1" 403 219 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
...
2020-08-20 16:08:41
148.215.18.103 attackbotsspam
Aug 20 13:50:31 localhost sshd[2405380]: Connection closed by 148.215.18.103 port 36471 [preauth]
...
2020-08-20 16:43:06
190.194.152.238 attack
Invalid user rena from 190.194.152.238 port 33780
2020-08-20 16:27:41
134.122.93.17 attack
Aug 20 10:39:59 vpn01 sshd[25029]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.122.93.17
Aug 20 10:40:01 vpn01 sshd[25029]: Failed password for invalid user mozart from 134.122.93.17 port 45386 ssh2
...
2020-08-20 16:47:27
49.233.177.166 attackspambots
fail2ban -- 49.233.177.166
...
2020-08-20 16:08:10
69.172.73.30 attackbotsspam
Automatic report - Port Scan Attack
2020-08-20 16:40:50
206.189.180.178 attack
frenzy
2020-08-20 16:10:10
213.217.1.23 attack
firewall-block, port(s): 36913/tcp
2020-08-20 16:48:31
117.169.48.33 attackbotsspam
$f2bV_matches
2020-08-20 16:40:18
167.99.170.91 attack
 TCP (SYN) 167.99.170.91:46775 -> port 22865, len 44
2020-08-20 16:35:33
178.128.13.79 attackbots
178.128.13.79 - - [20/Aug/2020:08:55:57 +0100] "POST /wp-login.php HTTP/1.1" 200 2046 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
178.128.13.79 - - [20/Aug/2020:08:56:05 +0100] "POST /wp-login.php HTTP/1.1" 200 2020 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
178.128.13.79 - - [20/Aug/2020:08:56:07 +0100] "POST /wp-login.php HTTP/1.1" 200 2019 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
...
2020-08-20 16:17:11
110.39.7.4 attack
Invalid user testuser from 110.39.7.4 port 45714
2020-08-20 16:09:00
185.220.101.199 attack
Aug 20 08:21:07 gitlab-tf sshd\[13475\]: Invalid user admin from 185.220.101.199Aug 20 08:21:08 gitlab-tf sshd\[13487\]: Invalid user admin from 185.220.101.199
...
2020-08-20 16:35:11

Recently Reported IPs

45.146.160.147 178.170.46.11 200.57.226.16 188.255.123.235
194.152.32.40 123.11.76.202 101.32.186.23 186.108.235.23
222.190.241.146 117.222.175.68 186.139.138.157 190.22.110.236
103.47.218.191 85.234.189.203 27.5.40.17 91.108.149.222
31.202.215.59 37.156.146.206 95.179.127.95 123.9.84.99