Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Thailand

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 114.128.226.104
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 43824
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;114.128.226.104.		IN	A

;; AUTHORITY SECTION:
.			297	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2023010100 1800 900 604800 86400

;; Query time: 21 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Jan 01 23:39:45 CST 2023
;; MSG SIZE  rcvd: 108
Host info
Host 104.226.128.114.in-addr.arpa not found: 2(SERVFAIL)
Nslookup info:
;; Got SERVFAIL reply from 183.60.83.19, trying next server
Server:		183.60.82.98
Address:	183.60.82.98#53

** server can't find 104.226.128.114.in-addr.arpa: SERVFAIL
Related IP info:
Related comments:
IP Type Details Datetime
101.230.220.20 attack
Dec 27 07:20:45 vpn01 sshd[9834]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=101.230.220.20
Dec 27 07:20:47 vpn01 sshd[9834]: Failed password for invalid user admin from 101.230.220.20 port 33598 ssh2
...
2019-12-27 21:37:34
148.215.18.103 attack
Dec 27 12:45:09 XXXXXX sshd[4250]: Invalid user confluence1 from 148.215.18.103 port 40977
2019-12-27 21:20:24
118.25.48.254 attackspam
Dec 27 11:46:11 raspberrypi sshd\[11740\]: Invalid user bayno from 118.25.48.254Dec 27 11:46:14 raspberrypi sshd\[11740\]: Failed password for invalid user bayno from 118.25.48.254 port 37312 ssh2Dec 27 12:10:52 raspberrypi sshd\[14158\]: Invalid user prueba from 118.25.48.254
...
2019-12-27 21:29:36
113.172.101.2 attack
Dec 27 07:21:15 vpn01 sshd[9867]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=113.172.101.2
Dec 27 07:21:17 vpn01 sshd[9867]: Failed password for invalid user admin from 113.172.101.2 port 33948 ssh2
...
2019-12-27 21:17:50
187.7.230.28 attack
firewall-block, port(s): 445/tcp
2019-12-27 21:50:54
106.12.175.179 attack
SSH/22 MH Probe, BF, Hack -
2019-12-27 21:41:07
185.164.63.234 attackbots
Invalid user guest from 185.164.63.234 port 41676
2019-12-27 21:41:33
85.94.0.119 attackspambots
Unauthorized connection attempt detected from IP address 85.94.0.119 to port 445
2019-12-27 21:16:34
219.92.232.90 attackbots
firewall-block, port(s): 1433/tcp
2019-12-27 21:48:15
1.183.165.103 attack
Scanning
2019-12-27 21:31:09
209.17.96.114 attack
port scan and connect, tcp 8888 (sun-answerbook)
2019-12-27 21:31:38
146.0.141.88 attack
Repeated failed SSH attempt
2019-12-27 21:40:24
49.88.98.149 attackbots
Scanning
2019-12-27 21:21:34
109.234.153.134 attackspambots
Unauthorized connection attempt detected from IP address 109.234.153.134 to port 3128
2019-12-27 21:20:51
138.197.25.187 attack
Dec 27 07:21:00 nextcloud sshd\[12102\]: Invalid user matheny from 138.197.25.187
Dec 27 07:21:00 nextcloud sshd\[12102\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.197.25.187
Dec 27 07:21:02 nextcloud sshd\[12102\]: Failed password for invalid user matheny from 138.197.25.187 port 34198 ssh2
...
2019-12-27 21:26:35

Recently Reported IPs

115.197.62.228 113.146.60.93 112.98.78.176 111.183.120.234
107.211.185.247 106.20.35.137 106.176.171.247 106.142.33.2
106.11.196.83 178.128.16.253 101.110.182.201 0.203.249.109
159.89.214.103 106.53.18.183 56.20.208.156 213.52.128.1
163.68.127.62 163.68.127.37 64.241.29.243 93.209.83.176