Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Taiwan (Province of China)

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 114.140.205.119
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 22337
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;114.140.205.119.		IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025013101 1800 900 604800 86400

;; Query time: 18 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Feb 01 02:27:17 CST 2025
;; MSG SIZE  rcvd: 108
Host info
119.205.140.114.in-addr.arpa domain name pointer 114-140-205-119.adsl.fetnet.net.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
119.205.140.114.in-addr.arpa	name = 114-140-205-119.adsl.fetnet.net.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
61.53.157.202 attackbots
Telnet/23 MH Probe, BF, Hack -
2019-12-23 03:32:44
23.254.229.169 attack
IP: 23.254.229.169
ASN: AS54290 Hostwinds LLC.
Port: Simple Mail Transfer 25
Found in one or more Blacklists
Date: 22/12/2019 2:48:40 PM UTC
2019-12-23 03:11:34
186.13.81.75 attackspam
Botnet spam UTC Dec 22 14:24:37 from= proto=ESMTP helo=
2019-12-23 03:05:32
134.175.39.108 attackspambots
Dec 22 07:22:55 kapalua sshd\[11320\]: Invalid user andy2 from 134.175.39.108
Dec 22 07:22:55 kapalua sshd\[11320\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.175.39.108
Dec 22 07:22:58 kapalua sshd\[11320\]: Failed password for invalid user andy2 from 134.175.39.108 port 42650 ssh2
Dec 22 07:29:56 kapalua sshd\[11986\]: Invalid user salete123 from 134.175.39.108
Dec 22 07:29:56 kapalua sshd\[11986\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.175.39.108
2019-12-23 02:57:55
188.13.167.103 attack
SSH Brute Force
2019-12-23 03:24:41
223.200.155.28 attackbotsspam
Dec 22 09:09:16 php1 sshd\[28784\]: Invalid user gazo from 223.200.155.28
Dec 22 09:09:16 php1 sshd\[28784\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=223-200-155-28.hinet-ip.hinet.net
Dec 22 09:09:18 php1 sshd\[28784\]: Failed password for invalid user gazo from 223.200.155.28 port 49456 ssh2
Dec 22 09:15:16 php1 sshd\[29662\]: Invalid user admin from 223.200.155.28
Dec 22 09:15:16 php1 sshd\[29662\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=223-200-155-28.hinet-ip.hinet.net
2019-12-23 03:25:01
182.53.97.192 attack
1577026099 - 12/22/2019 15:48:19 Host: 182.53.97.192/182.53.97.192 Port: 445 TCP Blocked
2019-12-23 03:24:19
54.154.209.237 attack
CloudCIX Reconnaissance Scan Detected, PTR: ec2-54-154-209-237.eu-west-1.compute.amazonaws.com.
2019-12-23 02:54:05
103.106.137.39 attackspambots
Brute force SMTP login attempts.
2019-12-23 03:03:29
183.56.212.91 attack
2019-12-22T17:36:32.231276shield sshd\[17823\]: Invalid user uucp from 183.56.212.91 port 33320
2019-12-22T17:36:32.235582shield sshd\[17823\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=183.56.212.91
2019-12-22T17:36:34.010646shield sshd\[17823\]: Failed password for invalid user uucp from 183.56.212.91 port 33320 ssh2
2019-12-22T17:43:09.878493shield sshd\[20874\]: Invalid user hung from 183.56.212.91 port 32938
2019-12-22T17:43:09.882922shield sshd\[20874\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=183.56.212.91
2019-12-23 03:28:36
153.122.101.119 attackspambots
Dec 16 12:23:16 uapps sshd[29671]: Failed password for invalid user norum from 153.122.101.119 port 21653 ssh2
Dec 16 12:23:16 uapps sshd[29671]: Received disconnect from 153.122.101.119: 11: Bye Bye [preauth]


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=153.122.101.119
2019-12-23 03:21:41
191.232.163.135 attackspambots
Dec 22 09:01:16 auw2 sshd\[22209\]: Invalid user higang from 191.232.163.135
Dec 22 09:01:16 auw2 sshd\[22209\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=191.232.163.135
Dec 22 09:01:18 auw2 sshd\[22209\]: Failed password for invalid user higang from 191.232.163.135 port 39076 ssh2
Dec 22 09:07:50 auw2 sshd\[22828\]: Invalid user lxd from 191.232.163.135
Dec 22 09:07:50 auw2 sshd\[22828\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=191.232.163.135
2019-12-23 03:12:25
126.51.247.65 attackspambots
Dec 22 15:48:49 pornomens sshd\[5798\]: Invalid user haig from 126.51.247.65 port 35509
Dec 22 15:48:49 pornomens sshd\[5798\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=126.51.247.65
Dec 22 15:48:51 pornomens sshd\[5798\]: Failed password for invalid user haig from 126.51.247.65 port 35509 ssh2
...
2019-12-23 03:00:54
79.131.195.195 attack
Unauthorized IMAP connection attempt
2019-12-23 03:28:54
78.188.208.254 attack
Dec 22 15:48:22 h2177944 kernel: \[224890.135871\] \[UFW BLOCK\] IN=venet0 OUT= MAC= SRC=78.188.208.254 DST=85.214.117.9 LEN=60 TOS=0x00 PREC=0x00 TTL=49 ID=53342 DF PROTO=TCP SPT=57385 DPT=88 WINDOW=14600 RES=0x00 SYN URGP=0 
Dec 22 15:48:22 h2177944 kernel: \[224890.135887\] \[UFW BLOCK\] IN=venet0 OUT= MAC= SRC=78.188.208.254 DST=85.214.117.9 LEN=60 TOS=0x00 PREC=0x00 TTL=49 ID=53342 DF PROTO=TCP SPT=57385 DPT=88 WINDOW=14600 RES=0x00 SYN URGP=0 
Dec 22 15:48:23 h2177944 kernel: \[224891.118693\] \[UFW BLOCK\] IN=venet0 OUT= MAC= SRC=78.188.208.254 DST=85.214.117.9 LEN=60 TOS=0x00 PREC=0x00 TTL=49 ID=53343 DF PROTO=TCP SPT=57385 DPT=88 WINDOW=14600 RES=0x00 SYN URGP=0 
Dec 22 15:48:23 h2177944 kernel: \[224891.118707\] \[UFW BLOCK\] IN=venet0 OUT= MAC= SRC=78.188.208.254 DST=85.214.117.9 LEN=60 TOS=0x00 PREC=0x00 TTL=49 ID=53343 DF PROTO=TCP SPT=57385 DPT=88 WINDOW=14600 RES=0x00 SYN URGP=0 
Dec 22 15:48:25 h2177944 kernel: \[224893.116464\] \[UFW BLOCK\] IN=venet0 OUT= MAC= SRC=78.188.208.254 DST=85.214.1
2019-12-23 03:19:11

Recently Reported IPs

241.90.4.76 124.112.241.209 173.14.217.34 14.235.26.135
36.57.26.227 6.241.55.73 59.151.16.107 58.23.111.226
246.49.127.226 220.240.119.91 79.155.230.105 167.179.37.230
201.125.13.12 251.118.234.249 250.109.230.100 51.100.140.195
84.103.126.57 126.0.34.100 22.217.76.148 15.45.159.58