Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: None

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 114.130.116.215
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 28491
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;114.130.116.215.		IN	A

;; AUTHORITY SECTION:
.			600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022021702 1800 900 604800 86400

;; Query time: 60 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 18 06:02:01 CST 2022
;; MSG SIZE  rcvd: 108
Host info
Host 215.116.130.114.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 215.116.130.114.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
121.164.107.10 attackbots
Dec 27 14:37:38 raspberrypi sshd\[28144\]: Invalid user web from 121.164.107.10Dec 27 14:37:41 raspberrypi sshd\[28144\]: Failed password for invalid user web from 121.164.107.10 port 39804 ssh2Dec 27 14:53:55 raspberrypi sshd\[29641\]: Invalid user katashi from 121.164.107.10
...
2019-12-28 01:00:09
140.143.72.21 attackbotsspam
$f2bV_matches
2019-12-28 01:14:10
121.52.233.209 attackbots
SIP/5060 Probe, BF, Hack -
2019-12-28 01:03:30
121.9.225.86 attackbots
SIP/5060 Probe, BF, Hack -
2019-12-28 00:57:12
190.144.216.206 attack
Unauthorised access (Dec 27) SRC=190.144.216.206 LEN=52 TTL=113 ID=6800 DF TCP DPT=445 WINDOW=8192 SYN
2019-12-28 01:25:09
183.106.188.26 attackspam
3389BruteforceFW23
2019-12-28 00:56:09
51.38.32.230 attackspam
Dec 27 16:52:35 sso sshd[22224]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.38.32.230
Dec 27 16:52:38 sso sshd[22224]: Failed password for invalid user named from 51.38.32.230 port 41070 ssh2
...
2019-12-28 01:08:55
151.106.11.189 attackbots
0,16-01/01 [bc01/m48] PostRequest-Spammer scoring: zurich
2019-12-28 01:02:11
153.37.97.183 attackspam
Dec 27 13:52:47 vps46666688 sshd[3451]: Failed password for root from 153.37.97.183 port 60465 ssh2
...
2019-12-28 01:05:19
54.37.68.66 attackbotsspam
$f2bV_matches
2019-12-28 01:24:22
154.193.161.153 attack
Dec 27 15:50:29 grey postfix/smtpd\[4858\]: NOQUEUE: reject: RCPT from unknown\[154.193.161.153\]: 554 5.7.1 Service unavailable\; Client host \[154.193.161.153\] blocked using truncate.gbudb.net\; http://www.gbudb.com/truncate/ \[154.193.161.153\]\; from=\ to=\ proto=ESMTP helo=\
...
2019-12-28 01:22:14
198.108.67.39 attack
MultiHost/MultiPort Probe, Scan, Hack -
2019-12-28 01:11:12
27.254.137.144 attackspam
Invalid user shutoku from 27.254.137.144 port 37630
2019-12-28 01:18:51
111.67.194.8 attack
MultiHost/MultiPort Probe, Scan, Hack -
2019-12-28 01:12:34
185.220.236.26 attack
3389BruteforceFW23
2019-12-28 01:34:32

Recently Reported IPs

114.127.245.8 114.130.156.236 114.130.156.77 114.130.157.114
114.130.180.123 114.130.72.37 114.130.85.37 114.132.204.143
114.132.234.190 114.132.40.209 114.134.24.137 114.134.24.223
114.134.26.40 114.135.82.42 114.136.123.144 114.134.185.113
114.139.201.210 114.139.207.9 114.139.93.183 114.141.131.208