Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Korea Republic of

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 114.129.214.48
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 16885
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;114.129.214.48.			IN	A

;; AUTHORITY SECTION:
.			249	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022100700 1800 900 604800 86400

;; Query time: 69 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Oct 08 00:15:52 CST 2022
;; MSG SIZE  rcvd: 107
Host info
Host 48.214.129.114.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 48.214.129.114.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
113.220.112.57 attackspam
MVPower DVR TV Shell Unauthenticated Command Execution Vulnerability
2020-03-09 22:33:18
51.91.212.81 attackbotsspam
Port scan on 5 port(s): 530 2087 2480 5443 27017
2020-03-09 22:24:36
77.40.72.32 attackbots
IP: 77.40.72.32
Ports affected
    Simple Mail Transfer (25) 
    Message Submission (587) 
Abuse Confidence rating 19%
Found in DNSBL('s)
ASN Details
   AS12389 Rostelecom
   Russia (RU)
   CIDR 77.40.0.0/17
Log Date: 9/03/2020 12:02:33 PM UTC
2020-03-09 22:39:42
122.246.144.137 attackbots
Automatic report - Port Scan Attack
2020-03-09 23:04:31
58.219.240.187 attackbots
MultiHost/MultiPort Probe, Scan, Hack -
2020-03-09 23:07:43
183.16.205.47 attackbots
Unauthorized connection attempt from IP address 183.16.205.47 on Port 445(SMB)
2020-03-09 22:40:43
45.243.248.25 attackbots
firewall-block, port(s): 445/tcp
2020-03-09 22:52:38
49.88.112.55 attackbotsspam
Mar  9 15:27:46 SilenceServices sshd[22607]: Failed password for root from 49.88.112.55 port 33791 ssh2
Mar  9 15:28:01 SilenceServices sshd[22607]: error: maximum authentication attempts exceeded for root from 49.88.112.55 port 33791 ssh2 [preauth]
Mar  9 15:28:08 SilenceServices sshd[26593]: Failed password for root from 49.88.112.55 port 42509 ssh2
2020-03-09 22:44:17
118.34.214.195 attackbots
" "
2020-03-09 22:39:19
54.37.44.95 attackspam
2020-03-09T14:10:00.203397shield sshd\[4389\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=ip95.ip-54-37-44.eu  user=root
2020-03-09T14:10:02.565168shield sshd\[4389\]: Failed password for root from 54.37.44.95 port 33094 ssh2
2020-03-09T14:18:19.505259shield sshd\[5383\]: Invalid user nagios from 54.37.44.95 port 50892
2020-03-09T14:18:19.512002shield sshd\[5383\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=ip95.ip-54-37-44.eu
2020-03-09T14:18:21.378734shield sshd\[5383\]: Failed password for invalid user nagios from 54.37.44.95 port 50892 ssh2
2020-03-09 23:09:42
66.116.104.214 attackbotsspam
03/09/2020-10:44:38.468022 66.116.104.214 Protocol: 6 ET SCAN Potential SSH Scan
2020-03-09 23:00:54
165.227.66.224 attack
Lines containing failures of 165.227.66.224
Mar  9 15:09:05 shared01 sshd[1781]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.227.66.224  user=r.r
Mar  9 15:09:07 shared01 sshd[1781]: Failed password for r.r from 165.227.66.224 port 52786 ssh2
Mar  9 15:09:07 shared01 sshd[1781]: Received disconnect from 165.227.66.224 port 52786:11: Bye Bye [preauth]
Mar  9 15:09:07 shared01 sshd[1781]: Disconnected from authenticating user r.r 165.227.66.224 port 52786 [preauth]
Mar  9 15:12:35 shared01 sshd[2960]: Invalid user www from 165.227.66.224 port 41166
Mar  9 15:12:35 shared01 sshd[2960]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.227.66.224
Mar  9 15:12:37 shared01 sshd[2960]: Failed password for invalid user www from 165.227.66.224 port 41166 ssh2
Mar  9 15:12:37 shared01 sshd[2960]: Received disconnect from 165.227.66.224 port 41166:11: Bye Bye [preauth]
Mar  9 15:12:37 shared01........
------------------------------
2020-03-09 22:23:42
103.120.165.34 attackbotsspam
20/3/9@08:29:59: FAIL: Alarm-Network address from=103.120.165.34
...
2020-03-09 23:00:18
192.241.230.80 attackbotsspam
IP: 192.241.230.80
Ports affected
    World Wide Web HTTP (80) 
Abuse Confidence rating 100%
ASN Details
   AS14061 DIGITALOCEAN-ASN
   United States (US)
   CIDR 192.241.128.0/17
Log Date: 9/03/2020 12:12:43 PM UTC
2020-03-09 22:48:30
185.176.27.250 attackbots
03/09/2020-10:32:34.022533 185.176.27.250 Protocol: 6 ET SCAN NMAP -sS window 1024
2020-03-09 22:35:39

Recently Reported IPs

3.34.191.157 153.121.77.119 222.232.75.219 103.170.246.117
128.90.142.67 128.90.139.201 128.90.114.210 124.235.238.141
103.250.142.221 65.108.147.154 107.161.81.182 45.72.55.136
138.128.59.223 179.166.56.2 177.36.70.52 176.124.16.206
35.134.9.239 183.245.145.251 222.212.94.49 37.72.141.132