Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: New Zealand

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
IP Type Details Datetime
114.134.94.44 attackspam
Dovecot Invalid User Login Attempt.
2020-08-21 04:52:27
114.134.92.70 attackbotsspam
Port probing on unauthorized port 23
2020-08-17 17:47:03
114.134.93.177 attackbots
postfix (unknown user, SPF fail or relay access denied)
2019-10-08 03:09:37
114.134.93.222 attackspam
Honeypot attack, port: 445, PTR: mail.intramexgroup.com.
2019-07-24 22:23:02
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 114.134.9.79
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 58020
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;114.134.9.79.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025020302 1800 900 604800 86400

;; Query time: 13 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Feb 04 13:02:54 CST 2025
;; MSG SIZE  rcvd: 105
Host info
79.9.134.114.in-addr.arpa domain name pointer 114-134-9-79.static.lightwire.co.nz.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
79.9.134.114.in-addr.arpa	name = 114-134-9-79.static.lightwire.co.nz.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
218.161.70.73 attack
Automatic report - Port Scan Attack
2019-11-20 22:08:37
112.87.5.237 attack
badbot
2019-11-20 22:04:31
113.203.221.202 attackbotsspam
LAMP,DEF GET /wordpress/123456.rar
2019-11-20 22:12:39
222.220.153.98 attackspambots
badbot
2019-11-20 21:56:25
41.86.34.52 attack
Unauthorized SSH login attempts
2019-11-20 22:14:35
114.105.187.20 attack
badbot
2019-11-20 22:18:14
106.56.245.142 attack
badbot
2019-11-20 21:41:07
112.175.184.45 attack
WordPress login Brute force / Web App Attack on client site.
2019-11-20 22:14:16
154.117.154.34 attackbots
firewall-block, port(s): 23/tcp
2019-11-20 21:57:00
180.76.188.189 attackspambots
SSH Bruteforce attempt
2019-11-20 22:11:15
122.226.106.86 attackbotsspam
badbot
2019-11-20 22:05:01
114.103.91.225 attackspambots
badbot
2019-11-20 21:55:25
94.191.62.170 attackspambots
Nov 20 10:34:10 vps01 sshd[27174]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=94.191.62.170
Nov 20 10:34:11 vps01 sshd[27174]: Failed password for invalid user downer from 94.191.62.170 port 49156 ssh2
Nov 20 10:38:34 vps01 sshd[27183]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=94.191.62.170
2019-11-20 22:11:41
61.183.52.42 attackbots
Portscan or hack attempt detected by psad/fwsnort
2019-11-20 21:49:58
132.232.226.83 attackbots
Nov 20 07:19:54 MK-Soft-VM3 sshd[31921]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=132.232.226.83 
Nov 20 07:19:56 MK-Soft-VM3 sshd[31921]: Failed password for invalid user xiu from 132.232.226.83 port 37378 ssh2
...
2019-11-20 22:03:13

Recently Reported IPs

90.224.218.50 116.131.12.113 205.223.192.230 7.3.6.243
70.85.54.141 253.55.227.234 40.54.154.103 169.78.230.225
184.71.153.196 177.207.73.136 236.75.146.130 169.114.38.10
175.112.224.98 203.179.137.143 200.81.65.65 238.44.70.193
74.253.123.185 32.42.37.123 118.254.109.254 62.213.91.60