Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: New Zealand

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 114.134.160.185
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 46596
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;114.134.160.185.		IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025012300 1800 900 604800 86400

;; Query time: 11 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Jan 23 15:52:18 CST 2025
;; MSG SIZE  rcvd: 108
Host info
185.160.134.114.in-addr.arpa domain name pointer 114-134-160-185.static.nztechnologygroup.com.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
185.160.134.114.in-addr.arpa	name = 114-134-160-185.static.nztechnologygroup.com.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
14.161.37.250 attackspam
Chat Spam
2019-09-17 03:14:49
222.186.15.217 attackbotsspam
Sep 16 21:23:40 eventyay sshd[1450]: Failed password for root from 222.186.15.217 port 60224 ssh2
Sep 16 21:30:07 eventyay sshd[1591]: Failed password for root from 222.186.15.217 port 17330 ssh2
...
2019-09-17 03:35:09
174.138.21.8 attack
Sep 16 21:26:59 OPSO sshd\[22590\]: Invalid user Duck from 174.138.21.8 port 40636
Sep 16 21:26:59 OPSO sshd\[22590\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=174.138.21.8
Sep 16 21:27:02 OPSO sshd\[22590\]: Failed password for invalid user Duck from 174.138.21.8 port 40636 ssh2
Sep 16 21:31:02 OPSO sshd\[23617\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=174.138.21.8  user=admin
Sep 16 21:31:04 OPSO sshd\[23617\]: Failed password for admin from 174.138.21.8 port 52320 ssh2
2019-09-17 03:43:14
206.189.222.38 attackbots
Sep 16 08:55:19 friendsofhawaii sshd\[13539\]: Invalid user po from 206.189.222.38
Sep 16 08:55:19 friendsofhawaii sshd\[13539\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=206.189.222.38
Sep 16 08:55:20 friendsofhawaii sshd\[13539\]: Failed password for invalid user po from 206.189.222.38 port 34970 ssh2
Sep 16 08:59:43 friendsofhawaii sshd\[13912\]: Invalid user cloud from 206.189.222.38
Sep 16 08:59:43 friendsofhawaii sshd\[13912\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=206.189.222.38
2019-09-17 03:11:54
114.244.249.16 attackbots
Sep 16 20:59:47 [host] sshd[19652]: Invalid user admin from 114.244.249.16
Sep 16 20:59:47 [host] sshd[19652]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=114.244.249.16
Sep 16 20:59:49 [host] sshd[19652]: Failed password for invalid user admin from 114.244.249.16 port 42546 ssh2
2019-09-17 03:09:34
142.93.151.152 attackbotsspam
Sep 16 21:48:55 mail sshd\[30588\]: Invalid user ubnt1 from 142.93.151.152 port 51582
Sep 16 21:48:55 mail sshd\[30588\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.151.152
Sep 16 21:48:58 mail sshd\[30588\]: Failed password for invalid user ubnt1 from 142.93.151.152 port 51582 ssh2
Sep 16 21:53:11 mail sshd\[31198\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.151.152  user=nagios
Sep 16 21:53:13 mail sshd\[31198\]: Failed password for nagios from 142.93.151.152 port 39020 ssh2
2019-09-17 03:54:26
112.85.42.174 attack
Sep 16 20:59:07 h2177944 sshd\[9355\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.85.42.174  user=root
Sep 16 20:59:10 h2177944 sshd\[9355\]: Failed password for root from 112.85.42.174 port 48857 ssh2
Sep 16 20:59:13 h2177944 sshd\[9355\]: Failed password for root from 112.85.42.174 port 48857 ssh2
Sep 16 20:59:16 h2177944 sshd\[9355\]: Failed password for root from 112.85.42.174 port 48857 ssh2
...
2019-09-17 03:33:16
222.186.42.163 attack
2019-09-16T19:17:03.672859abusebot-6.cloudsearch.cf sshd\[15280\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.42.163  user=root
2019-09-17 03:28:58
113.80.86.2 attack
2019-09-16T19:30:06.926224abusebot-8.cloudsearch.cf sshd\[31492\]: Invalid user redis from 113.80.86.2 port 54927
2019-09-17 03:34:42
58.220.30.99 attackspambots
Sep 16 21:50:39 intra sshd\[28155\]: Invalid user alex from 58.220.30.99Sep 16 21:50:40 intra sshd\[28155\]: Failed password for invalid user alex from 58.220.30.99 port 54378 ssh2Sep 16 21:55:10 intra sshd\[28207\]: Invalid user ericka from 58.220.30.99Sep 16 21:55:12 intra sshd\[28207\]: Failed password for invalid user ericka from 58.220.30.99 port 38606 ssh2Sep 16 21:59:38 intra sshd\[28236\]: Invalid user priv from 58.220.30.99Sep 16 21:59:40 intra sshd\[28236\]: Failed password for invalid user priv from 58.220.30.99 port 51012 ssh2
...
2019-09-17 03:14:29
59.120.19.40 attack
Sep 16 15:36:59 plusreed sshd[10724]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=59.120.19.40  user=rabbitmq
Sep 16 15:37:01 plusreed sshd[10724]: Failed password for rabbitmq from 59.120.19.40 port 58845 ssh2
...
2019-09-17 03:45:10
68.183.187.234 attack
Sep 16 09:12:08 sachi sshd\[22755\]: Invalid user ch from 68.183.187.234
Sep 16 09:12:08 sachi sshd\[22755\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=68.183.187.234
Sep 16 09:12:10 sachi sshd\[22755\]: Failed password for invalid user ch from 68.183.187.234 port 60332 ssh2
Sep 16 09:16:32 sachi sshd\[23116\]: Invalid user payara from 68.183.187.234
Sep 16 09:16:32 sachi sshd\[23116\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=68.183.187.234
2019-09-17 03:29:20
2a01:4f8:191:93ee::2 attackbotsspam
MYH,DEF GET /blog/wp-admin/
2019-09-17 03:28:30
80.35.19.195 attack
Automatic report - Port Scan Attack
2019-09-17 03:18:49
209.97.167.121 attack
Sep 16 20:52:32 s64-1 sshd[13887]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=209.97.167.121
Sep 16 20:52:34 s64-1 sshd[13887]: Failed password for invalid user elza from 209.97.167.121 port 42454 ssh2
Sep 16 20:59:49 s64-1 sshd[14000]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=209.97.167.121
...
2019-09-17 03:10:34

Recently Reported IPs

199.97.252.130 216.169.152.0 227.222.234.119 19.90.175.153
229.249.52.0 170.47.115.232 93.153.191.232 77.7.211.114
145.112.76.125 16.5.226.29 188.245.112.47 18.203.69.168
30.176.32.22 22.216.185.230 91.195.119.134 3.19.36.11
116.58.74.193 198.237.24.211 62.14.174.58 126.190.110.18