Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Taiwan (Province of China)

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 114.140.193.195
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 43404
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;114.140.193.195.		IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025012201 1800 900 604800 86400

;; Query time: 15 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Jan 23 05:28:57 CST 2025
;; MSG SIZE  rcvd: 108
Host info
195.193.140.114.in-addr.arpa domain name pointer 114-140-193-195.adsl.fetnet.net.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
195.193.140.114.in-addr.arpa	name = 114-140-193-195.adsl.fetnet.net.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
60.166.120.59 attackbots
Dec  1 00:40:37 carla sshd[9430]: Invalid user dumpy from 60.166.120.59
Dec  1 00:40:37 carla sshd[9430]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=60.166.120.59 
Dec  1 00:40:39 carla sshd[9430]: Failed password for invalid user dumpy from 60.166.120.59 port 34749 ssh2
Dec  1 00:40:39 carla sshd[9431]: Received disconnect from 60.166.120.59: 11: Bye Bye
Dec  1 01:01:40 carla sshd[9557]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=60.166.120.59  user=r.r
Dec  1 01:01:41 carla sshd[9557]: Failed password for r.r from 60.166.120.59 port 50335 ssh2
Dec  1 01:01:41 carla sshd[9558]: Received disconnect from 60.166.120.59: 11: Bye Bye
Dec  1 01:05:09 carla sshd[9559]: Invalid user tetsuyuki from 60.166.120.59
Dec  1 01:05:09 carla sshd[9559]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=60.166.120.59 
Dec  1 01:05:12 carla sshd[9559]: Failed pa........
-------------------------------
2019-12-02 02:47:26
185.176.27.30 attackbotsspam
12/01/2019-13:05:43.420942 185.176.27.30 Protocol: 6 ET DROP Dshield Block Listed Source group 1
2019-12-02 02:31:45
71.6.233.246 attack
firewall-block, port(s): 8060/tcp
2019-12-02 03:00:54
223.204.82.48 attack
firewall-block, port(s): 26/tcp
2019-12-02 02:32:58
121.168.115.36 attackspambots
2019-12-01T15:46:23.872432abusebot.cloudsearch.cf sshd\[30372\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.168.115.36  user=smmsp
2019-12-02 02:32:37
81.30.152.54 attackspam
\[2019-12-01 13:19:31\] NOTICE\[2754\] chan_sip.c: Registration from '\' failed for '81.30.152.54:51074' - Wrong password
\[2019-12-01 13:19:31\] SECURITY\[2765\] res_security_log.c: SecurityEvent="InvalidPassword",EventTV="2019-12-01T13:19:31.102-0500",Severity="Error",Service="SIP",EventVersion="2",AccountID="8951",SessionID="0x7f26c4022278",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/81.30.152.54/51074",Challenge="496290bc",ReceivedChallenge="496290bc",ReceivedHash="dd6e083604a34b589113e346376dfdb6"
\[2019-12-01 13:20:03\] NOTICE\[2754\] chan_sip.c: Registration from '\' failed for '81.30.152.54:58473' - Wrong password
\[2019-12-01 13:20:03\] SECURITY\[2765\] res_security_log.c: SecurityEvent="InvalidPassword",EventTV="2019-12-01T13:20:03.817-0500",Severity="Error",Service="SIP",EventVersion="2",AccountID="315",SessionID="0x7f26c4022278",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/81.30.152.54/5
2019-12-02 02:28:24
123.125.71.32 attackbots
Automatic report - Banned IP Access
2019-12-02 02:51:08
68.183.127.93 attackspam
Repeated brute force against a port
2019-12-02 02:52:37
222.186.42.4 attackbots
Dec  1 19:50:17 mail sshd[26983]: Failed password for root from 222.186.42.4 port 18138 ssh2
Dec  1 19:50:21 mail sshd[26983]: Failed password for root from 222.186.42.4 port 18138 ssh2
Dec  1 19:50:27 mail sshd[26983]: Failed password for root from 222.186.42.4 port 18138 ssh2
Dec  1 19:50:33 mail sshd[26983]: Failed password for root from 222.186.42.4 port 18138 ssh2
2019-12-02 02:55:50
66.96.230.26 attack
Dec  1 15:41:05 ns37 sshd[9524]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=66.96.230.26
Dec  1 15:41:05 ns37 sshd[9525]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=66.96.230.26
Dec  1 15:41:07 ns37 sshd[9524]: Failed password for invalid user pi from 66.96.230.26 port 53104 ssh2
Dec  1 15:41:07 ns37 sshd[9525]: Failed password for invalid user pi from 66.96.230.26 port 53106 ssh2
2019-12-02 02:25:33
49.149.103.196 attack
Unauthorised access (Dec  1) SRC=49.149.103.196 LEN=52 TTL=117 ID=6555 DF TCP DPT=445 WINDOW=8192 SYN
2019-12-02 02:23:19
49.235.108.92 attackbots
Dec  1 09:40:32 plusreed sshd[13289]: Invalid user scaner from 49.235.108.92
...
2019-12-02 02:45:22
51.158.97.13 attack
Dec  1 08:47:18 nimbus postfix/postscreen[18099]: CONNECT from [51.158.97.13]:39098 to [192.168.14.12]:25
Dec  1 08:47:24 nimbus postfix/postscreen[18099]: PASS NEW [51.158.97.13]:39098
Dec  1 08:47:24 nimbus postfix/smtpd[19681]: warning: hostname 13-97-158-51.rev.cloud.scaleway.com does not resolve to address 51.158.97.13: Name or service not known
Dec  1 08:47:24 nimbus postfix/smtpd[19681]: connect from unknown[51.158.97.13]
Dec  1 08:47:25 nimbus policyd-spf[19716]: Permerror; identhostnamey=helo; client-ip=51.158.97.13; helo=zafraanic.tk; envelope-from=x@x
Dec  1 08:47:25 nimbus policyd-spf[19716]: Permerror; identhostnamey=mailfrom; client-ip=51.158.97.13; helo=zafraanic.tk; envelope-from=x@x
Dec  1 08:47:25 nimbus sqlgrey: grey: new: 51.158.97.13(51.158.97.13), x@x -> x@x
Dec x@x
Dec  1 08:47:25 nimbus postfix/smtpd[19681]: disconnect from unknown[51.158.97.13]
Dec  1 09:02:51 nimbus postfix/postscreen[18099]: CONNECT from [51.158.97.13]:52387 to [192.168.14.12]........
-------------------------------
2019-12-02 03:05:30
27.69.242.187 attack
01.12.2019 18:39:04 SSH access blocked by firewall
2019-12-02 02:40:19
182.184.44.6 attackspam
2019-12-01T11:55:12.1836081495-001 sshd\[8252\]: Failed password for invalid user iy from 182.184.44.6 port 58564 ssh2
2019-12-01T12:56:25.9833791495-001 sshd\[10537\]: Invalid user P@55WORD22 from 182.184.44.6 port 57946
2019-12-01T12:56:25.9870011495-001 sshd\[10537\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.184.44.6
2019-12-01T12:56:27.3512751495-001 sshd\[10537\]: Failed password for invalid user P@55WORD22 from 182.184.44.6 port 57946 ssh2
2019-12-01T13:00:28.8688591495-001 sshd\[10680\]: Invalid user adine from 182.184.44.6 port 33208
2019-12-01T13:00:28.8721781495-001 sshd\[10680\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.184.44.6
...
2019-12-02 02:37:48

Recently Reported IPs

71.171.67.159 191.251.178.225 82.0.0.0 86.7.99.165
99.228.244.66 216.12.237.136 32.67.83.229 28.225.164.189
222.231.106.155 173.170.225.220 115.202.234.91 188.98.82.51
5.13.137.171 140.118.119.114 96.118.99.219 128.239.137.136
24.123.113.117 218.200.47.246 135.206.202.151 250.164.157.58