Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: China

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 114.138.245.168
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 51571
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;114.138.245.168.		IN	A

;; AUTHORITY SECTION:
.			29	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025022703 1800 900 604800 86400

;; Query time: 62 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 28 12:46:22 CST 2025
;; MSG SIZE  rcvd: 108
Host info
Host 168.245.138.114.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 168.245.138.114.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
124.225.15.15 attack
Automatic report - Port Scan Attack
2019-08-11 12:40:57
112.85.42.194 attackbotsspam
Aug 11 06:41:11 dcd-gentoo sshd[8911]: User root from 112.85.42.194 not allowed because none of user's groups are listed in AllowGroups
Aug 11 06:41:14 dcd-gentoo sshd[8911]: error: PAM: Authentication failure for illegal user root from 112.85.42.194
Aug 11 06:41:11 dcd-gentoo sshd[8911]: User root from 112.85.42.194 not allowed because none of user's groups are listed in AllowGroups
Aug 11 06:41:14 dcd-gentoo sshd[8911]: error: PAM: Authentication failure for illegal user root from 112.85.42.194
Aug 11 06:41:11 dcd-gentoo sshd[8911]: User root from 112.85.42.194 not allowed because none of user's groups are listed in AllowGroups
Aug 11 06:41:14 dcd-gentoo sshd[8911]: error: PAM: Authentication failure for illegal user root from 112.85.42.194
Aug 11 06:41:14 dcd-gentoo sshd[8911]: Failed keyboard-interactive/pam for invalid user root from 112.85.42.194 port 24855 ssh2
...
2019-08-11 12:55:20
94.179.59.229 attackspam
Unauthorised access (Aug 11) SRC=94.179.59.229 LEN=52 TTL=122 ID=748 DF TCP DPT=445 WINDOW=8192 SYN
2019-08-11 13:37:12
115.200.201.207 attackbots
$f2bV_matches
2019-08-11 12:45:43
133.130.119.124 attackbotsspam
Aug 11 06:42:03 vibhu-HP-Z238-Microtower-Workstation sshd\[11124\]: Invalid user Minecraft from 133.130.119.124
Aug 11 06:42:03 vibhu-HP-Z238-Microtower-Workstation sshd\[11124\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=133.130.119.124
Aug 11 06:42:05 vibhu-HP-Z238-Microtower-Workstation sshd\[11124\]: Failed password for invalid user Minecraft from 133.130.119.124 port 42601 ssh2
Aug 11 06:46:53 vibhu-HP-Z238-Microtower-Workstation sshd\[11268\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=133.130.119.124  user=postgres
Aug 11 06:46:55 vibhu-HP-Z238-Microtower-Workstation sshd\[11268\]: Failed password for postgres from 133.130.119.124 port 39972 ssh2
...
2019-08-11 13:38:57
200.0.236.210 attackspambots
Aug 11 00:42:44 localhost sshd\[45720\]: Invalid user ftpuser1 from 200.0.236.210 port 50614
Aug 11 00:42:44 localhost sshd\[45720\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=200.0.236.210
Aug 11 00:42:46 localhost sshd\[45720\]: Failed password for invalid user ftpuser1 from 200.0.236.210 port 50614 ssh2
Aug 11 00:49:41 localhost sshd\[45861\]: Invalid user testuser from 200.0.236.210 port 43080
Aug 11 00:49:41 localhost sshd\[45861\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=200.0.236.210
...
2019-08-11 12:48:34
220.120.109.166 attackspambots
Jan 18 07:27:46 motanud sshd\[10711\]: Invalid user olivia from 220.120.109.166 port 58736
Jan 18 07:27:46 motanud sshd\[10711\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=220.120.109.166
Jan 18 07:27:49 motanud sshd\[10711\]: Failed password for invalid user olivia from 220.120.109.166 port 58736 ssh2
2019-08-11 13:24:08
202.101.250.39 attackbots
2019-08-10 17:22:50 dovecot_login authenticator failed for (hc3bq7) [202.101.250.39]:51625 I=[192.147.25.65]:25: 535 Incorrect authentication data (set_id=rhenderson@lerctr.org)
2019-08-10 17:22:57 dovecot_login authenticator failed for (8h6PHFavKI) [202.101.250.39]:55280 I=[192.147.25.65]:25: 535 Incorrect authentication data (set_id=rhenderson@lerctr.org)
2019-08-10 17:23:09 dovecot_login authenticator failed for (uTkPmvBS) [202.101.250.39]:60970 I=[192.147.25.65]:25: 535 Incorrect authentication data (set_id=rhenderson@lerctr.org)
...
2019-08-11 13:13:41
220.128.133.15 attackbotsspam
Feb 27 09:30:33 motanud sshd\[1860\]: Invalid user jm from 220.128.133.15 port 57298
Feb 27 09:30:33 motanud sshd\[1860\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=220.128.133.15
Feb 27 09:30:35 motanud sshd\[1860\]: Failed password for invalid user jm from 220.128.133.15 port 57298 ssh2
2019-08-11 13:19:49
220.130.228.19 attackspambots
Jan  6 02:07:40 motanud sshd\[18300\]: Invalid user hadoop from 220.130.228.19 port 48192
Jan  6 02:07:40 motanud sshd\[18300\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=220.130.228.19
Jan  6 02:07:42 motanud sshd\[18300\]: Failed password for invalid user hadoop from 220.130.228.19 port 48192 ssh2
2019-08-11 13:15:13
220.191.208.139 attackbotsspam
Apr 21 19:23:05 motanud sshd\[18218\]: Invalid user test from 220.191.208.139 port 49382
Apr 21 19:23:05 motanud sshd\[18218\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=220.191.208.139
Apr 21 19:23:07 motanud sshd\[18218\]: Failed password for invalid user test from 220.191.208.139 port 49382 ssh2
Apr 21 23:45:46 motanud sshd\[12036\]: Invalid user sun from 220.191.208.139 port 52816
Apr 21 23:45:46 motanud sshd\[12036\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=220.191.208.139
Apr 21 23:45:48 motanud sshd\[12036\]: Failed password for invalid user sun from 220.191.208.139 port 52816 ssh2
2019-08-11 12:37:53
177.67.105.7 attack
Aug 11 02:58:09 cp sshd[14383]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=177.67.105.7
2019-08-11 13:17:51
220.176.192.213 attackspam
Feb 23 21:30:00 motanud sshd\[26539\]: Invalid user dev from 220.176.192.213 port 35884
Feb 23 21:30:00 motanud sshd\[26539\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=220.176.192.213
Feb 23 21:30:02 motanud sshd\[26539\]: Failed password for invalid user dev from 220.176.192.213 port 35884 ssh2
2019-08-11 12:41:40
201.51.90.134 attackbots
Automatic report - Port Scan Attack
2019-08-11 13:26:36
220.133.209.148 attackspam
Jan 17 18:21:01 motanud sshd\[3511\]: Invalid user alcione from 220.133.209.148 port 38922
Jan 17 18:21:01 motanud sshd\[3511\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=220.133.209.148
Jan 17 18:21:03 motanud sshd\[3511\]: Failed password for invalid user alcione from 220.133.209.148 port 38922 ssh2
2019-08-11 13:13:13

Recently Reported IPs

42.75.24.165 138.15.166.65 188.37.44.160 96.229.68.148
45.107.114.106 31.71.197.132 191.120.188.223 15.89.86.235
16.40.89.59 26.133.138.126 189.170.11.48 120.232.89.36
187.78.136.187 236.213.178.246 181.37.35.248 227.191.30.102
184.85.111.230 210.176.115.133 17.109.249.145 94.44.156.123