Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: China

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 114.221.56.74
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 17022
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;114.221.56.74.			IN	A

;; AUTHORITY SECTION:
.			4	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022030400 1800 900 604800 86400

;; Query time: 19 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Mar 04 14:59:46 CST 2022
;; MSG SIZE  rcvd: 106
Host info
Host 74.56.221.114.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 74.56.221.114.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
2.229.19.80 attack
139/tcp 139/tcp
[2019-08-16]2pkt
2019-08-16 22:23:49
177.204.205.188 attackbotsspam
Automatic report - Port Scan Attack
2019-08-16 23:01:13
106.12.78.161 attackbotsspam
Invalid user fake from 106.12.78.161 port 43100
2019-08-16 22:35:15
23.129.64.188 attack
[ssh] SSH attack
2019-08-16 21:43:27
23.129.64.190 attackspam
Aug 16 15:31:03 ns41 sshd[9730]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=23.129.64.190
Aug 16 15:31:05 ns41 sshd[9730]: Failed password for invalid user admin from 23.129.64.190 port 59899 ssh2
Aug 16 15:31:07 ns41 sshd[9730]: Failed password for invalid user admin from 23.129.64.190 port 59899 ssh2
Aug 16 15:31:10 ns41 sshd[9730]: Failed password for invalid user admin from 23.129.64.190 port 59899 ssh2
2019-08-16 21:40:17
203.129.241.87 attack
$f2bV_matches
2019-08-16 22:16:03
36.75.195.153 attack
445/tcp
[2019-08-16]1pkt
2019-08-16 22:59:22
148.70.35.109 attackspam
$f2bV_matches
2019-08-16 22:32:17
123.20.243.147 attack
SSHD brute force attack detected by fail2ban
2019-08-16 21:38:41
120.52.152.17 attack
16.08.2019 14:24:50 Connection to port 16010 blocked by firewall
2019-08-16 22:58:27
36.237.106.8 attack
23/tcp
[2019-08-16]1pkt
2019-08-16 22:48:48
139.199.164.87 attackspambots
Aug 15 20:29:47 tdfoods sshd\[20642\]: Invalid user webusr from 139.199.164.87
Aug 15 20:29:47 tdfoods sshd\[20642\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.199.164.87
Aug 15 20:29:49 tdfoods sshd\[20642\]: Failed password for invalid user webusr from 139.199.164.87 port 39446 ssh2
Aug 15 20:35:41 tdfoods sshd\[21281\]: Invalid user 123456 from 139.199.164.87
Aug 15 20:35:41 tdfoods sshd\[21281\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.199.164.87
2019-08-16 21:58:42
106.12.108.23 attack
Aug 16 09:43:47 debian sshd\[11191\]: Invalid user darius from 106.12.108.23 port 33388
Aug 16 09:43:47 debian sshd\[11191\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.108.23
Aug 16 09:43:48 debian sshd\[11191\]: Failed password for invalid user darius from 106.12.108.23 port 33388 ssh2
...
2019-08-16 22:05:51
72.235.0.138 attack
Aug 16 11:52:11 bouncer sshd\[345\]: Invalid user rails from 72.235.0.138 port 40230
Aug 16 11:52:11 bouncer sshd\[345\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=72.235.0.138 
Aug 16 11:52:13 bouncer sshd\[345\]: Failed password for invalid user rails from 72.235.0.138 port 40230 ssh2
...
2019-08-16 22:41:56
36.79.67.194 attackbots
445/tcp
[2019-08-16]1pkt
2019-08-16 22:00:22

Recently Reported IPs

114.221.50.107 114.221.60.9 114.221.65.153 114.221.51.48
113.53.14.166 114.221.72.120 114.221.57.250 114.221.73.77
114.221.69.172 114.221.72.154 114.221.80.110 114.221.80.154
114.221.80.11 114.221.52.240 114.221.80.202 114.221.80.83
114.221.80.96 114.221.80.75 114.221.80.119 113.53.14.180