Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Indonesia

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 114.14.60.11
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 46771
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;114.14.60.11.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025021100 1800 900 604800 86400

;; Query time: 32 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Feb 11 14:12:46 CST 2025
;; MSG SIZE  rcvd: 105
Host info
Host 11.60.14.114.in-addr.arpa not found: 2(SERVFAIL)
Nslookup info:
;; Got SERVFAIL reply from 183.60.83.19, trying next server
Server:		183.60.82.98
Address:	183.60.82.98#53

** server can't find 11.60.14.114.in-addr.arpa: SERVFAIL
Related IP info:
Related comments:
IP Type Details Datetime
222.186.15.158 attack
Unauthorized connection attempt detected from IP address 222.186.15.158 to port 22
2020-01-15 15:52:16
94.179.129.85 attackspam
Unauthorized connection attempt detected from IP address 94.179.129.85 to port 2220 [J]
2020-01-15 16:03:01
106.54.102.127 attack
Jan 15 07:55:42 vps58358 sshd\[6280\]: Invalid user qt from 106.54.102.127Jan 15 07:55:44 vps58358 sshd\[6280\]: Failed password for invalid user qt from 106.54.102.127 port 40670 ssh2Jan 15 07:59:18 vps58358 sshd\[6315\]: Invalid user webmaster from 106.54.102.127Jan 15 07:59:19 vps58358 sshd\[6315\]: Failed password for invalid user webmaster from 106.54.102.127 port 40286 ssh2Jan 15 08:03:24 vps58358 sshd\[6350\]: Invalid user king from 106.54.102.127Jan 15 08:03:26 vps58358 sshd\[6350\]: Failed password for invalid user king from 106.54.102.127 port 39900 ssh2
...
2020-01-15 15:40:01
185.53.91.150 attackbotsspam
Unauthorized access on Port 443 [https]
2020-01-15 15:28:14
159.89.110.45 attackspambots
159.89.110.45 - - \[15/Jan/2020:05:53:39 +0100\] "POST /wp-login.php HTTP/1.0" 200 7085 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0"
159.89.110.45 - - \[15/Jan/2020:05:53:45 +0100\] "POST /wp-login.php HTTP/1.0" 200 6952 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0"
159.89.110.45 - - \[15/Jan/2020:05:53:45 +0100\] "POST /wp-login.php HTTP/1.0" 200 6948 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0"
2020-01-15 15:35:57
113.141.70.199 attackbotsspam
$f2bV_matches
2020-01-15 15:36:53
50.116.97.126 attackspam
Automatic report - XMLRPC Attack
2020-01-15 15:59:31
105.73.80.91 attack
2020-01-15T07:35:08.543238shield sshd\[10739\]: Invalid user git from 105.73.80.91 port 26329
2020-01-15T07:35:08.552271shield sshd\[10739\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=oict-91-80-73-105.inwitelecom.com
2020-01-15T07:35:10.126925shield sshd\[10739\]: Failed password for invalid user git from 105.73.80.91 port 26329 ssh2
2020-01-15T07:38:20.869800shield sshd\[11908\]: Invalid user test from 105.73.80.91 port 26330
2020-01-15T07:38:20.875738shield sshd\[11908\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=oict-91-80-73-105.inwitelecom.com
2020-01-15 15:47:41
184.105.247.223 attackspam
Honeypot hit.
2020-01-15 15:21:55
78.94.119.186 attack
Unauthorized connection attempt detected from IP address 78.94.119.186 to port 2220 [J]
2020-01-15 15:58:06
68.183.233.171 attack
Jan 15 05:50:45 meumeu sshd[31082]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=68.183.233.171 
Jan 15 05:50:47 meumeu sshd[31082]: Failed password for invalid user hjw from 68.183.233.171 port 38122 ssh2
Jan 15 05:53:58 meumeu sshd[31484]: Failed password for root from 68.183.233.171 port 35670 ssh2
...
2020-01-15 15:24:16
192.241.182.161 attackbotsspam
Port 22 Scan, PTR: min-extra-scan-206-usny-prod.binaryedge.ninja.
2020-01-15 15:34:18
58.42.212.177 attackspambots
2020-01-15 16:03:18
89.232.192.101 attackbots
20/1/15@01:50:54: FAIL: Alarm-Network address from=89.232.192.101
20/1/15@01:50:54: FAIL: Alarm-Network address from=89.232.192.101
...
2020-01-15 15:52:47
181.49.219.114 attack
Jan 15 01:16:37 ny01 sshd[20922]: Failed password for root from 181.49.219.114 port 52753 ssh2
Jan 15 01:19:37 ny01 sshd[21303]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=181.49.219.114
Jan 15 01:19:40 ny01 sshd[21303]: Failed password for invalid user localadmin from 181.49.219.114 port 36931 ssh2
2020-01-15 15:53:19

Recently Reported IPs

160.160.93.152 185.210.38.150 63.163.118.65 189.163.162.182
115.108.121.143 146.70.134.21 115.24.66.13 75.0.233.66
93.112.60.87 191.232.153.133 115.241.55.36 151.43.231.232
86.55.164.117 58.2.110.46 27.91.249.179 234.132.146.5
245.96.158.124 9.159.199.112 145.186.103.120 75.30.98.172