Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Taiwan (Province of China)

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 114.136.214.61
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 30524
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;114.136.214.61.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025022001 1800 900 604800 86400

;; Query time: 38 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 21 04:54:30 CST 2025
;; MSG SIZE  rcvd: 107
Host info
61.214.136.114.in-addr.arpa domain name pointer 114-136-214-61.emome-ip.hinet.net.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
61.214.136.114.in-addr.arpa	name = 114-136-214-61.emome-ip.hinet.net.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
218.92.0.212 attackbotsspam
730. On May 27 2020 experienced a Brute Force SSH login attempt -> 7 unique times by 218.92.0.212.
2020-05-28 06:06:31
89.207.108.59 attack
SSH Invalid Login
2020-05-28 06:05:20
106.12.156.236 attackspam
May 27 20:15:18 DAAP sshd[11989]: Invalid user admin from 106.12.156.236 port 44816
May 27 20:15:18 DAAP sshd[11989]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.156.236
May 27 20:15:18 DAAP sshd[11989]: Invalid user admin from 106.12.156.236 port 44816
May 27 20:15:21 DAAP sshd[11989]: Failed password for invalid user admin from 106.12.156.236 port 44816 ssh2
May 27 20:17:21 DAAP sshd[12020]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.156.236  user=root
May 27 20:17:23 DAAP sshd[12020]: Failed password for root from 106.12.156.236 port 42722 ssh2
...
2020-05-28 06:23:29
49.235.73.150 attackbots
Invalid user bmike from 49.235.73.150 port 41150
2020-05-28 06:28:17
195.231.3.21 attack
May 27 23:43:03 mail.srvfarm.net postfix/smtpd[1820306]: warning: unknown[195.231.3.21]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
May 27 23:43:03 mail.srvfarm.net postfix/smtpd[1820306]: lost connection after AUTH from unknown[195.231.3.21]
May 27 23:50:44 mail.srvfarm.net postfix/smtpd[1820375]: warning: unknown[195.231.3.21]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
May 27 23:50:44 mail.srvfarm.net postfix/smtpd[1820375]: lost connection after AUTH from unknown[195.231.3.21]
May 27 23:51:01 mail.srvfarm.net postfix/smtpd[1820374]: warning: unknown[195.231.3.21]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
2020-05-28 06:06:43
198.98.61.103 attackspam
Tor exit node
2020-05-28 06:26:31
139.199.104.217 attackbotsspam
May 27 15:18:45 mx sshd[12129]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.199.104.217
May 27 15:18:46 mx sshd[12129]: Failed password for invalid user cactiuser from 139.199.104.217 port 59520 ssh2
2020-05-28 06:04:48
168.62.180.41 attack
(mod_security) mod_security (id:210492) triggered by 168.62.180.41 (US/United States/-): 5 in the last 3600 secs
2020-05-28 05:58:12
184.105.139.85 attack
Port Scan detected!
...
2020-05-28 06:25:34
210.14.77.102 attack
May 28 00:18:10  sshd\[23068\]: User root from 210.14.77.102 not allowed because not listed in AllowUsersMay 28 00:18:12  sshd\[23068\]: Failed password for invalid user root from 210.14.77.102 port 62912 ssh2
...
2020-05-28 06:21:40
116.236.190.194 attackspambots
Honeypot hit.
2020-05-28 06:28:33
209.141.33.133 attackspam
Tor exit node
2020-05-28 06:05:05
106.12.20.3 attackspam
Invalid user joh from 106.12.20.3 port 58580
2020-05-28 06:22:07
218.92.0.208 attack
May 28 00:14:26 eventyay sshd[7540]: Failed password for root from 218.92.0.208 port 18295 ssh2
May 28 00:15:28 eventyay sshd[7565]: Failed password for root from 218.92.0.208 port 12935 ssh2
May 28 00:15:31 eventyay sshd[7565]: Failed password for root from 218.92.0.208 port 12935 ssh2
...
2020-05-28 06:21:17
14.173.26.238 attackspambots
May 28 00:01:35 vpn01 sshd[849]: Failed password for root from 14.173.26.238 port 59517 ssh2
...
2020-05-28 06:13:28

Recently Reported IPs

43.12.251.208 227.15.120.61 59.149.215.218 128.82.173.88
49.231.205.28 88.129.176.245 32.235.116.92 72.196.229.79
135.174.7.100 13.20.146.169 127.5.59.197 217.163.48.62
240.108.65.144 48.219.177.232 27.0.41.126 47.126.140.55
206.185.69.188 166.128.241.185 193.185.48.158 189.151.31.132