Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: None

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
IP Type Details Datetime
114.226.245.157 attackspambots
Unauthorised access (Oct  8) SRC=114.226.245.157 LEN=40 TOS=0x10 PREC=0x40 TTL=49 ID=49157 TCP DPT=8080 WINDOW=11794 SYN 
Unauthorised access (Oct  8) SRC=114.226.245.157 LEN=40 TOS=0x10 PREC=0x40 TTL=49 ID=9569 TCP DPT=8080 WINDOW=46723 SYN 
Unauthorised access (Oct  7) SRC=114.226.245.157 LEN=40 TOS=0x10 PREC=0x40 TTL=49 ID=4729 TCP DPT=8080 WINDOW=11794 SYN 
Unauthorised access (Oct  6) SRC=114.226.245.157 LEN=40 TOS=0x10 PREC=0x40 TTL=49 ID=59991 TCP DPT=8080 WINDOW=11794 SYN 
Unauthorised access (Oct  6) SRC=114.226.245.157 LEN=40 TOS=0x10 PREC=0x40 TTL=49 ID=43896 TCP DPT=8080 WINDOW=46723 SYN 
Unauthorised access (Oct  6) SRC=114.226.245.157 LEN=40 TOS=0x10 PREC=0x40 TTL=49 ID=46381 TCP DPT=8080 WINDOW=11794 SYN 
Unauthorised access (Oct  6) SRC=114.226.245.157 LEN=40 TOS=0x10 PREC=0x40 TTL=49 ID=58639 TCP DPT=8080 WINDOW=11794 SYN
2019-10-09 02:03:38
114.226.245.157 attackbots
Unauthorised access (Oct  4) SRC=114.226.245.157 LEN=40 TOS=0x10 PREC=0x40 TTL=49 ID=45593 TCP DPT=8080 WINDOW=46723 SYN 
Unauthorised access (Oct  3) SRC=114.226.245.157 LEN=40 TOS=0x10 PREC=0x40 TTL=49 ID=39422 TCP DPT=8080 WINDOW=46723 SYN 
Unauthorised access (Oct  1) SRC=114.226.245.157 LEN=40 TOS=0x10 PREC=0x40 TTL=49 ID=48240 TCP DPT=8080 WINDOW=46723 SYN 
Unauthorised access (Oct  1) SRC=114.226.245.157 LEN=40 TOS=0x10 PREC=0x40 TTL=49 ID=41436 TCP DPT=8080 WINDOW=11794 SYN
2019-10-05 00:29:00
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 114.226.245.114
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 8126
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;114.226.245.114.		IN	A

;; AUTHORITY SECTION:
.			252	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022030400 1800 900 604800 86400

;; Query time: 99 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Mar 05 03:10:32 CST 2022
;; MSG SIZE  rcvd: 108
Host info
Host 114.245.226.114.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 114.245.226.114.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
14.188.110.23 attackspam
Honeypot attack, port: 445, PTR: static.vnpt.vn.
2020-07-04 10:33:35
222.128.14.106 attackspambots
Jul 03 17:50:53 askasleikir sshd[12334]: Failed password for invalid user vbox from 222.128.14.106 port 22021 ssh2
2020-07-04 10:58:54
222.186.31.127 attack
Jul  4 04:33:20 dbanaszewski sshd[12272]: Unable to negotiate with 222.186.31.127 port 24637: no matching key exchange method found. Their offer: ecdh-sha2-nistp256,ecdh-sha2-nistp384,ecdh-sha2-nistp521,diffie-hellman-group-exchange-sha256,diffie-hellman-group-exchange-sha1,diffie-hellman-group14-sha1,diffie-hellman-group1-sha1 [preauth]
Jul  4 04:38:46 dbanaszewski sshd[12319]: Unable to negotiate with 222.186.31.127 port 45642: no matching key exchange method found. Their offer: ecdh-sha2-nistp256,ecdh-sha2-nistp384,ecdh-sha2-nistp521,diffie-hellman-group-exchange-sha256,diffie-hellman-group-exchange-sha1,diffie-hellman-group14-sha1,diffie-hellman-group1-sha1 [preauth]
Jul  4 04:40:25 dbanaszewski sshd[12374]: Unable to negotiate with 222.186.31.127 port 27075: no matching key exchange method found. Their offer: ecdh-sha2-nistp256,ecdh-sha2-nistp384,ecdh-sha2-nistp521,diffie-hellman-group-exchange-sha256,diffie-hellman-group-exchange-sha1,diffie-hellman-group14-sha1,diffie-hellman-group1-sha1 [preauth]
2020-07-04 10:51:48
160.238.227.153 attackspambots
VNC brute force attack detected by fail2ban
2020-07-04 10:45:08
51.68.229.73 attackbots
Jul  4 04:42:39 vps647732 sshd[16785]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.68.229.73
Jul  4 04:42:40 vps647732 sshd[16785]: Failed password for invalid user wuyan from 51.68.229.73 port 55830 ssh2
...
2020-07-04 10:57:24
87.103.213.56 attackbots
Unauthorized connection attempt from IP address 87.103.213.56 on Port 445(SMB)
2020-07-04 10:26:47
92.38.136.69 attackspambots
(From myahmarks1989@bumikind.bizml.ru) Предлагаем услугу: 
"Стопроцентная ликвидация интернет-ресурсов конкурентов!" 
Разве это возможно?! 
- Опыт нашей компании - более 10 лет. 
- Секретная разработка. 
- Наращивание большой ссылочной массы при помощи вирусных и порно ссылок. 
- Любой поисковик мгновенно реагирует на наши базы. 
- Все тексты с веб сайта спамятся, они становятся неуникальными. 
- У наших экспертов большие возможности и опыт в данной области. 
 
Цена  $50 
Полная отчётность. 
Оплата: Киви, Яндекс.Деньги, Bitcoin, Visa, MasterCard... 
Телегрм: @exrumer 
Whatssap: +7(906)53-121-55 
Skype: XRumer.pro 
email: support@xrumer.cc
2020-07-04 10:43:13
158.140.171.122 attackspam
Unauthorized connection attempt from IP address 158.140.171.122 on Port 445(SMB)
2020-07-04 10:34:36
141.98.9.161 attackspam
Jul  3 23:34:06 dns1 sshd[31998]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=141.98.9.161 
Jul  3 23:34:08 dns1 sshd[31998]: Failed password for invalid user admin from 141.98.9.161 port 42005 ssh2
Jul  3 23:34:51 dns1 sshd[32067]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=141.98.9.161
2020-07-04 10:53:40
67.205.158.241 attackspambots
Jul  4 09:34:48 webhost01 sshd[20357]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=67.205.158.241
Jul  4 09:34:50 webhost01 sshd[20357]: Failed password for invalid user weblogic from 67.205.158.241 port 60344 ssh2
...
2020-07-04 10:35:49
52.66.197.212 attackspambots
Jul  4 02:06:54 vps639187 sshd\[26938\]: Invalid user admin from 52.66.197.212 port 47832
Jul  4 02:06:54 vps639187 sshd\[26938\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=52.66.197.212
Jul  4 02:06:56 vps639187 sshd\[26938\]: Failed password for invalid user admin from 52.66.197.212 port 47832 ssh2
...
2020-07-04 11:00:32
112.78.133.252 attackbotsspam
Unauthorized connection attempt from IP address 112.78.133.252 on Port 445(SMB)
2020-07-04 10:28:01
46.32.45.207 attackbots
Jul  4 04:26:36 vm0 sshd[582]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=46.32.45.207
Jul  4 04:26:38 vm0 sshd[582]: Failed password for invalid user ubuntu from 46.32.45.207 port 57352 ssh2
...
2020-07-04 10:57:42
141.98.9.157 attack
 TCP (SYN) 141.98.9.157:43185 -> port 22, len 60
2020-07-04 11:05:07
51.145.0.150 attackspambots
Jul  3 22:47:16 server sshd[6030]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.145.0.150  user=r.r
Jul  3 22:47:18 server sshd[6030]: Failed password for r.r from 51.145.0.150 port 57348 ssh2
Jul  3 22:47:18 server sshd[6030]: Received disconnect from 51.145.0.150: 11: Bye Bye [preauth]
Jul  3 23:04:01 server sshd[6866]: Failed password for invalid user sa from 51.145.0.150 port 48882 ssh2
Jul  3 23:04:02 server sshd[6866]: Received disconnect from 51.145.0.150: 11: Bye Bye [preauth]
Jul  3 23:07:00 server sshd[7020]: Failed password for invalid user alarm from 51.145.0.150 port 53474 ssh2
Jul  3 23:07:00 server sshd[7020]: Received disconnect from 51.145.0.150: 11: Bye Bye [preauth]


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=51.145.0.150
2020-07-04 10:34:57

Recently Reported IPs

114.226.245.110 114.226.245.112 114.226.245.120 114.226.245.116
114.226.245.11 114.226.245.123 115.212.192.76 114.226.245.125
114.226.245.130 114.226.245.13 114.226.245.132 114.226.245.134
114.226.245.137 114.226.245.141 114.226.246.242 114.226.245.143
114.226.246.236 114.226.246.246 114.226.246.25 115.212.195.19