Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Yahata

Region: Tiba (Chiba)

Country: Japan

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 114.145.199.79
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 44677
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;114.145.199.79.			IN	A

;; AUTHORITY SECTION:
.			231	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2023060602 1800 900 604800 86400

;; Query time: 67 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Jun 07 13:41:11 CST 2023
;; MSG SIZE  rcvd: 107
Host info
Host 79.199.145.114.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 79.199.145.114.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
34.80.215.54 attack
Aug  8 04:08:32 linuxrulz sshd[12593]: Invalid user kai from 34.80.215.54 port 44036
Aug  8 04:08:32 linuxrulz sshd[12593]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=34.80.215.54
Aug  8 04:08:34 linuxrulz sshd[12593]: Failed password for invalid user kai from 34.80.215.54 port 44036 ssh2
Aug  8 04:08:35 linuxrulz sshd[12593]: Received disconnect from 34.80.215.54 port 44036:11: Bye Bye [preauth]
Aug  8 04:08:35 linuxrulz sshd[12593]: Disconnected from 34.80.215.54 port 44036 [preauth]


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=34.80.215.54
2019-08-08 15:18:21
38.143.169.241 attack
SSH/22 MH Probe, BF, Hack -
2019-08-08 14:51:28
216.155.93.77 attack
Aug  8 08:21:56 OPSO sshd\[17223\]: Invalid user derick from 216.155.93.77 port 36148
Aug  8 08:21:56 OPSO sshd\[17223\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=216.155.93.77
Aug  8 08:21:58 OPSO sshd\[17223\]: Failed password for invalid user derick from 216.155.93.77 port 36148 ssh2
Aug  8 08:27:36 OPSO sshd\[17903\]: Invalid user maint from 216.155.93.77 port 57182
Aug  8 08:27:36 OPSO sshd\[17903\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=216.155.93.77
2019-08-08 15:02:50
123.125.71.43 attackspam
Automatic report - Banned IP Access
2019-08-08 14:49:11
180.211.219.5 attackbotsspam
WordPress wp-login brute force :: 180.211.219.5 0.184 BYPASS [08/Aug/2019:12:19:42  1000] [censored_1] "POST /wp-login.php HTTP/1.1" 200 3990 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
2019-08-08 15:04:17
193.9.115.24 attackspam
ssh failed login
2019-08-08 15:08:49
103.204.109.173 attackbotsspam
Registration form abuse
2019-08-08 14:56:23
175.176.40.210 attackspambots
missing rdns
2019-08-08 15:07:27
177.10.241.95 attackbotsspam
Autoban   177.10.241.95 AUTH/CONNECT
2019-08-08 15:23:56
179.124.204.194 attackspam
Excessive failed login attempts on port 587
2019-08-08 15:33:40
81.22.45.148 attackspambots
firewall-block, port(s): 8009/tcp, 8036/tcp, 8076/tcp, 8086/tcp, 8137/tcp, 8394/tcp, 8408/tcp, 8423/tcp, 8449/tcp, 8459/tcp, 8475/tcp, 8487/tcp, 8488/tcp, 8585/tcp, 8677/tcp, 8679/tcp, 8693/tcp, 8732/tcp, 8812/tcp, 8920/tcp, 8934/tcp
2019-08-08 15:11:49
216.244.66.233 attackbots
20 attempts against mh-misbehave-ban on pluto.magehost.pro
2019-08-08 15:37:58
159.226.5.101 attack
Aug  8 08:19:37 pornomens sshd\[3245\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.226.5.101  user=root
Aug  8 08:19:38 pornomens sshd\[3245\]: Failed password for root from 159.226.5.101 port 41156 ssh2
Aug  8 08:26:45 pornomens sshd\[3275\]: Invalid user zou from 159.226.5.101 port 57576
Aug  8 08:26:45 pornomens sshd\[3275\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.226.5.101
...
2019-08-08 15:10:42
67.205.140.232 attack
xmlrpc attack
2019-08-08 15:22:47
190.52.196.246 attack
19/8/7@22:19:42: FAIL: IoT-Telnet address from=190.52.196.246
...
2019-08-08 15:03:58

Recently Reported IPs

58.179.153.21 198.35.193.62 28.153.39.33 66.117.89.19
149.156.90.227 52.9.190.154 14.82.3.207 37.164.179.84
102.2.116.38 199.65.115.71 202.56.8.7 241.4.2.217
1.88.251.46 196.98.40.7 22.23.37.50 144.18.251.118
32.31.91.211 90.96.119.0 220.149.66.57 17.10.51.1