Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: China

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 114.141.148.219
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 32148
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;114.141.148.219.		IN	A

;; AUTHORITY SECTION:
.			579	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022011000 1800 900 604800 86400

;; Query time: 43 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Jan 10 23:40:06 CST 2022
;; MSG SIZE  rcvd: 108
Host info
Host 219.148.141.114.in-addr.arpa not found: 2(SERVFAIL)
Nslookup info:
server can't find 114.141.148.219.in-addr.arpa: SERVFAIL
Related IP info:
Related comments:
IP Type Details Datetime
94.191.93.34 attackbots
Aug 27 22:12:08 kapalua sshd\[32052\]: Invalid user andrew from 94.191.93.34
Aug 27 22:12:08 kapalua sshd\[32052\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=94.191.93.34
Aug 27 22:12:10 kapalua sshd\[32052\]: Failed password for invalid user andrew from 94.191.93.34 port 60786 ssh2
Aug 27 22:18:17 kapalua sshd\[32543\]: Invalid user admln from 94.191.93.34
Aug 27 22:18:17 kapalua sshd\[32543\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=94.191.93.34
2019-08-28 18:10:12
203.177.19.123 attack
2019-08-28T11:54:08.392061  sshd[9684]: Invalid user user from 203.177.19.123 port 50805
2019-08-28T11:54:08.407026  sshd[9684]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=203.177.19.123
2019-08-28T11:54:08.392061  sshd[9684]: Invalid user user from 203.177.19.123 port 50805
2019-08-28T11:54:10.450713  sshd[9684]: Failed password for invalid user user from 203.177.19.123 port 50805 ssh2
2019-08-28T12:03:15.926571  sshd[9813]: Invalid user manager from 203.177.19.123 port 46057
...
2019-08-28 18:05:55
142.93.198.86 attackbots
Triggered by Fail2Ban at Ares web server
2019-08-28 17:52:02
51.68.188.67 attackbotsspam
Aug 27 09:17:33 itv-usvr-01 sshd[10205]: Invalid user tommie from 51.68.188.67
Aug 27 09:17:33 itv-usvr-01 sshd[10205]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.68.188.67
Aug 27 09:17:33 itv-usvr-01 sshd[10205]: Invalid user tommie from 51.68.188.67
Aug 27 09:17:36 itv-usvr-01 sshd[10205]: Failed password for invalid user tommie from 51.68.188.67 port 50256 ssh2
Aug 27 09:21:17 itv-usvr-01 sshd[10361]: Invalid user cyrus from 51.68.188.67
2019-08-28 17:51:02
172.108.154.2 attack
Automatic report - Banned IP Access
2019-08-28 18:32:17
54.36.150.182 attack
Automatic report - Banned IP Access
2019-08-28 18:35:11
54.37.68.66 attack
Aug 28 13:24:33 icinga sshd[22828]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=54.37.68.66
Aug 28 13:24:34 icinga sshd[22828]: Failed password for invalid user admin from 54.37.68.66 port 43996 ssh2
...
2019-08-28 19:34:11
128.199.170.77 attackspambots
Aug 28 06:37:19 eventyay sshd[31128]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.199.170.77
Aug 28 06:37:21 eventyay sshd[31128]: Failed password for invalid user nc from 128.199.170.77 port 34542 ssh2
Aug 28 06:42:10 eventyay sshd[32385]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.199.170.77
...
2019-08-28 18:14:31
139.59.180.53 attack
$f2bV_matches
2019-08-28 17:35:13
182.31.65.31 attackbotsspam
Telnet Server BruteForce Attack
2019-08-28 17:39:43
82.208.177.139 attack
Invalid user uta from 82.208.177.139 port 48672
2019-08-28 17:43:51
77.223.36.250 attackbotsspam
Aug 28 11:12:17 ArkNodeAT sshd\[19008\]: Invalid user plex from 77.223.36.250
Aug 28 11:12:17 ArkNodeAT sshd\[19008\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=77.223.36.250
Aug 28 11:12:18 ArkNodeAT sshd\[19008\]: Failed password for invalid user plex from 77.223.36.250 port 48908 ssh2
2019-08-28 17:25:17
181.49.117.136 attackbots
Aug 28 07:18:56 mail1 sshd\[24962\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=181.49.117.136  user=root
Aug 28 07:18:58 mail1 sshd\[24962\]: Failed password for root from 181.49.117.136 port 54920 ssh2
Aug 28 07:28:59 mail1 sshd\[29402\]: Invalid user minecraft from 181.49.117.136 port 44134
Aug 28 07:28:59 mail1 sshd\[29402\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=181.49.117.136
Aug 28 07:29:01 mail1 sshd\[29402\]: Failed password for invalid user minecraft from 181.49.117.136 port 44134 ssh2
...
2019-08-28 17:42:59
103.197.48.98 attackspambots
fail2ban honeypot
2019-08-28 18:33:49
206.189.65.11 attackbots
vulcan
2019-08-28 18:15:14

Recently Reported IPs

205.159.82.144 205.133.138.240 107.199.109.46 1.133.67.170
24.105.53.70 186.169.226.202 125.248.51.174 228.233.85.23
195.165.84.4 23.177.15.248 2.79.215.255 0.120.6.59
110.199.59.108 182.1.229.149 221.33.154.150 217.66.39.2
166.168.125.69 193.116.90.40 169.77.27.132 243.235.144.147