Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: None

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 114.179.48.140
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 14106
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;114.179.48.140.			IN	A

;; AUTHORITY SECTION:
.			599	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022030400 1800 900 604800 86400

;; Query time: 85 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Mar 04 14:53:58 CST 2022
;; MSG SIZE  rcvd: 107
Host info
140.48.179.114.in-addr.arpa is an alias for 140.128.48.179.114.in-addr.arpa.
140.128.48.179.114.in-addr.arpa domain name pointer www.ryukyujima.net.
140.128.48.179.114.in-addr.arpa domain name pointer datanext.co.jp.
140.128.48.179.114.in-addr.arpa domain name pointer ryukyujima.net.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
140.48.179.114.in-addr.arpa	canonical name = 140.128.48.179.114.in-addr.arpa.
140.128.48.179.114.in-addr.arpa	name = ryukyujima.net.
140.128.48.179.114.in-addr.arpa	name = www.ryukyujima.net.
140.128.48.179.114.in-addr.arpa	name = datanext.co.jp.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
112.208.223.202 attack
Telnet/23 MH Probe, BF, Hack -
2019-11-16 19:38:55
150.109.63.147 attack
Repeated brute force against a port
2019-11-16 19:23:04
147.139.136.237 attackspam
Nov 16 00:44:29 dallas01 sshd[12318]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=147.139.136.237
Nov 16 00:44:31 dallas01 sshd[12318]: Failed password for invalid user ftp from 147.139.136.237 port 38624 ssh2
Nov 16 00:51:40 dallas01 sshd[13517]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=147.139.136.237
2019-11-16 19:15:11
85.11.48.222 attackbots
Port scan
2019-11-16 19:26:53
46.38.144.17 attackspam
Nov 16 12:24:10 relay postfix/smtpd\[28972\]: warning: unknown\[46.38.144.17\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Nov 16 12:24:30 relay postfix/smtpd\[18719\]: warning: unknown\[46.38.144.17\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Nov 16 12:24:48 relay postfix/smtpd\[23825\]: warning: unknown\[46.38.144.17\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Nov 16 12:25:06 relay postfix/smtpd\[19138\]: warning: unknown\[46.38.144.17\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Nov 16 12:25:25 relay postfix/smtpd\[26079\]: warning: unknown\[46.38.144.17\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
...
2019-11-16 19:37:13
180.76.134.238 attackbotsspam
Invalid user roussier from 180.76.134.238 port 37986
pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.76.134.238
Failed password for invalid user roussier from 180.76.134.238 port 37986 ssh2
Invalid user tony from 180.76.134.238 port 45358
pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.76.134.238
2019-11-16 19:41:21
91.121.211.59 attackbotsspam
Nov 16 11:08:03 vmanager6029 sshd\[22930\]: Invalid user hooton from 91.121.211.59 port 42520
Nov 16 11:08:03 vmanager6029 sshd\[22930\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=91.121.211.59
Nov 16 11:08:05 vmanager6029 sshd\[22930\]: Failed password for invalid user hooton from 91.121.211.59 port 42520 ssh2
2019-11-16 19:04:09
195.78.63.197 attack
Tried sshing with brute force.
2019-11-16 19:45:00
94.10.49.143 attackbotsspam
IP Ban Report :  
 https://help-dysk.pl/wordpress-firewall-plugins/ip/94.10.49.143/ 
 
 GB - 1H : (67)  
 Protection Against DDoS WordPress plugin :  
 "odzyskiwanie danych help-dysk" 
 IP Address Ranges by Country : GB 
 NAME ASN : ASN5607 
 
 IP : 94.10.49.143 
 
 CIDR : 94.0.0.0/12 
 
 PREFIX COUNT : 35 
 
 UNIQUE IP COUNT : 5376768 
 
 
 ATTACKS DETECTED ASN5607 :  
  1H - 1 
  3H - 1 
  6H - 3 
 12H - 5 
 24H - 10 
 
 DateTime : 2019-11-16 07:21:38 
 
 INFO :  HACK ! - Looking for resource vulnerabilities Scan Detected and Blocked by ADMIN  - data recovery
2019-11-16 19:36:26
36.92.95.10 attackspambots
Nov 16 11:00:54 ncomp sshd[4735]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=36.92.95.10  user=root
Nov 16 11:00:56 ncomp sshd[4735]: Failed password for root from 36.92.95.10 port 36000 ssh2
Nov 16 11:07:32 ncomp sshd[4816]: Invalid user 123 from 36.92.95.10
2019-11-16 19:10:10
61.181.15.75 attackspambots
Nov 16 08:32:33 vps666546 sshd\[5711\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.181.15.75  user=root
Nov 16 08:32:34 vps666546 sshd\[5711\]: Failed password for root from 61.181.15.75 port 44966 ssh2
Nov 16 08:35:09 vps666546 sshd\[5823\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.181.15.75  user=root
Nov 16 08:35:11 vps666546 sshd\[5823\]: Failed password for root from 61.181.15.75 port 58240 ssh2
Nov 16 08:37:46 vps666546 sshd\[5912\]: Invalid user kuromai from 61.181.15.75 port 43280
Nov 16 08:37:46 vps666546 sshd\[5912\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.181.15.75
...
2019-11-16 19:31:15
86.61.66.59 attack
k+ssh-bruteforce
2019-11-16 19:08:51
64.202.188.205 attack
eintrachtkultkellerfulda.de 64.202.188.205 [16/Nov/2019:07:22:32 +0100] "POST /xmlrpc.php HTTP/1.1" 200 408 "-" "Mozilla/5.0 (Windows; U; Windows NT 5.1; en-US; rv:1.9.0.1) Gecko/2008070208 Firefox/3.0.1"
eintrachtkultkellerfulda.de 64.202.188.205 [16/Nov/2019:07:22:33 +0100] "POST /xmlrpc.php HTTP/1.1" 200 408 "-" "Mozilla/5.0 (Windows; U; Windows NT 5.1; en-US; rv:1.9.0.1) Gecko/2008070208 Firefox/3.0.1"
2019-11-16 19:13:21
112.112.205.192 attackbotsspam
Port 1433 Scan
2019-11-16 19:29:23
106.12.141.112 attackspam
Nov 16 13:22:19 server sshd\[14040\]: Invalid user info from 106.12.141.112
Nov 16 13:22:19 server sshd\[14040\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.141.112 
Nov 16 13:22:21 server sshd\[14040\]: Failed password for invalid user info from 106.12.141.112 port 54540 ssh2
Nov 16 13:46:56 server sshd\[19796\]: Invalid user test from 106.12.141.112
Nov 16 13:46:56 server sshd\[19796\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.141.112 
...
2019-11-16 19:15:46

Recently Reported IPs

114.179.239.105 114.179.201.135 114.18.78.220 114.180.227.206
114.179.81.4 114.179.245.22 114.180.254.123 114.181.175.98
114.181.21.37 113.53.121.137 114.184.214.244 114.182.3.95
114.182.127.106 114.182.152.131 114.186.151.1 114.181.3.102
114.183.21.65 114.187.154.94 114.187.190.125 113.53.121.179