Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Japan

Internet Service Provider: KDDI Corporation

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 114.21.212.114
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 35466
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;114.21.212.114.			IN	A

;; AUTHORITY SECTION:
.			457	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022120702 1800 900 604800 86400

;; Query time: 163 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Dec 08 13:15:05 CST 2022
;; MSG SIZE  rcvd: 107
Host info
114.212.21.114.in-addr.arpa domain name pointer KD114021212114.ppp.prin.ne.jp.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
114.212.21.114.in-addr.arpa	name = KD114021212114.ppp.prin.ne.jp.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
142.93.174.47 attack
Jul 20 10:13:28 plusreed sshd[32466]: Invalid user geng from 142.93.174.47
...
2019-07-20 22:15:05
97.91.135.91 attackbots
9000/tcp
[2019-07-20]1pkt
2019-07-20 22:07:27
117.0.193.183 attack
2323/tcp
[2019-07-20]1pkt
2019-07-20 22:09:52
139.59.81.185 attackspambots
Malware
2019-07-20 21:28:20
196.195.14.59 attackspambots
Jul 20 05:40:29 mail postfix/postscreen[15655]: PREGREET 22 after 0.37 from [196.195.14.59]:50938: HELO [196.195.14.59]

...
2019-07-20 21:54:18
190.254.195.234 attackspambots
9527/tcp
[2019-07-20]1pkt
2019-07-20 21:43:12
54.38.82.14 attackspambots
$f2bV_matches
2019-07-20 21:26:42
14.244.117.213 attackspambots
445/tcp
[2019-07-20]1pkt
2019-07-20 21:24:45
14.231.139.178 attackspam
445/tcp
[2019-07-20]1pkt
2019-07-20 21:33:03
54.37.151.239 attackbotsspam
Jul 20 15:31:38 SilenceServices sshd[14436]: Failed password for root from 54.37.151.239 port 54925 ssh2
Jul 20 15:37:31 SilenceServices sshd[17500]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=54.37.151.239
Jul 20 15:37:34 SilenceServices sshd[17500]: Failed password for invalid user user from 54.37.151.239 port 50718 ssh2
2019-07-20 21:47:22
105.112.120.66 attack
445/tcp 445/tcp
[2019-07-20]2pkt
2019-07-20 21:39:22
92.153.175.111 attack
23/tcp
[2019-07-20]1pkt
2019-07-20 21:53:14
177.69.26.97 attack
2019-07-20T20:46:49.967736enmeeting.mahidol.ac.th sshd\[26442\]: Invalid user mailtest from 177.69.26.97 port 55588
2019-07-20T20:46:49.982749enmeeting.mahidol.ac.th sshd\[26442\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=177.69.26.97
2019-07-20T20:46:51.901286enmeeting.mahidol.ac.th sshd\[26442\]: Failed password for invalid user mailtest from 177.69.26.97 port 55588 ssh2
...
2019-07-20 21:55:21
92.127.155.237 attackspambots
60001/tcp
[2019-07-20]1pkt
2019-07-20 21:21:36
36.71.192.85 attackbots
@LucianNitescu Personal Honeypot Network <<<>>> Donate at paypal.me/LNitescu <<<>>> 2019-07-20 12:45:00,898 INFO [amun_request_handler] PortScan Detected on Port: 445 (36.71.192.85)
2019-07-20 22:04:38

Recently Reported IPs

114.4.53.18 114.144.224.234 30.232.171.121 113.162.213.219
172.33.176.43 113.157.77.128 80.190.159.202 169.181.111.163
252.177.112.212 113.141.143.176 243.128.169.118 39.122.34.146
226.87.76.140 222.106.0.204 186.110.179.125 11.219.240.144
173.51.43.108 109.146.109.203 168.214.194.104 155.100.52.69