Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Japan

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 114.145.220.57
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 59834
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;114.145.220.57.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025021500 1800 900 604800 86400

;; Query time: 10 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Feb 16 00:27:40 CST 2025
;; MSG SIZE  rcvd: 107
Host info
57.220.145.114.in-addr.arpa domain name pointer p11516057-ipxg44301marunouchi.tokyo.ocn.ne.jp.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
57.220.145.114.in-addr.arpa	name = p11516057-ipxg44301marunouchi.tokyo.ocn.ne.jp.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
49.204.90.205 attackspambots
Mar 12 08:28:41 cp sshd[24312]: Failed password for root from 49.204.90.205 port 56392 ssh2
Mar 12 08:28:41 cp sshd[24312]: Failed password for root from 49.204.90.205 port 56392 ssh2
2020-03-12 16:00:41
182.61.173.127 attack
$f2bV_matches
2020-03-12 16:09:16
123.206.69.81 attackspambots
Mar 12 04:50:43 mout sshd[12803]: Invalid user dspace from 123.206.69.81 port 59356
2020-03-12 16:31:19
202.153.34.244 attackbots
Invalid user live from 202.153.34.244 port 23692
2020-03-12 16:36:01
95.58.94.53 attack
Automatic report - Port Scan Attack
2020-03-12 16:12:43
122.54.247.83 attack
Invalid user cpanelphppgadmin from 122.54.247.83 port 56728
2020-03-12 16:11:39
85.185.131.189 attackspambots
Automatic report - Port Scan Attack
2020-03-12 16:40:57
159.192.242.115 attackbotsspam
Automatic report - SSH Brute-Force Attack
2020-03-12 16:33:49
14.29.215.5 attackbotsspam
Invalid user dave from 14.29.215.5 port 60650
2020-03-12 16:32:47
92.240.207.81 attackspam
Chat Spam
2020-03-12 16:42:33
103.87.129.238 attack
scan z
2020-03-12 16:39:59
43.250.81.155 attackbotsspam
$f2bV_matches
2020-03-12 16:34:09
222.186.30.35 attackspam
Mar 12 08:56:41 [host] sshd[12823]: pam_unix(sshd:
Mar 12 08:56:43 [host] sshd[12823]: Failed passwor
Mar 12 08:56:45 [host] sshd[12823]: Failed passwor
2020-03-12 16:02:43
14.236.21.167 attack
Mar 12 04:50:36 ns381471 sshd[3520]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=14.236.21.167
Mar 12 04:50:38 ns381471 sshd[3520]: Failed password for invalid user 888888 from 14.236.21.167 port 49745 ssh2
2020-03-12 16:35:17
222.186.30.76 attack
Mar 12 09:39:13 santamaria sshd\[13951\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.30.76  user=root
Mar 12 09:39:15 santamaria sshd\[13951\]: Failed password for root from 222.186.30.76 port 34189 ssh2
Mar 12 09:39:17 santamaria sshd\[13951\]: Failed password for root from 222.186.30.76 port 34189 ssh2
...
2020-03-12 16:39:42

Recently Reported IPs

59.219.227.131 15.215.85.115 143.126.192.83 120.226.122.136
64.156.84.229 193.101.230.150 206.138.127.237 232.148.134.4
77.188.181.216 97.242.52.200 217.225.212.59 136.117.217.29
15.232.120.200 62.63.161.207 127.116.27.156 214.81.49.121
80.230.68.77 43.79.144.110 205.253.242.247 57.202.88.151