Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: China

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 114.234.81.11
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 6175
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;114.234.81.11.			IN	A

;; AUTHORITY SECTION:
.			491	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022030400 1800 900 604800 86400

;; Query time: 87 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Mar 04 23:11:31 CST 2022
;; MSG SIZE  rcvd: 106
Host info
Host 11.81.234.114.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 11.81.234.114.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
106.54.189.93 attackspam
Jun 26 14:28:13 ArkNodeAT sshd\[7463\]: Invalid user ab from 106.54.189.93
Jun 26 14:28:13 ArkNodeAT sshd\[7463\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.54.189.93
Jun 26 14:28:15 ArkNodeAT sshd\[7463\]: Failed password for invalid user ab from 106.54.189.93 port 35568 ssh2
2020-06-27 00:40:08
106.52.3.114 attack
prod6
...
2020-06-27 00:43:16
189.59.5.81 attackspambots
189.59.5.81 - - [26/Jun/2020:14:53:26 +0100] "POST /wp-login.php HTTP/1.1" 200 5644 "http://mintpa.com/wp-login.php" "Mozilla/5.0 (Windows NT 6.1; rv:60.0) Gecko/20100101 Firefox/60.0"
189.59.5.81 - - [26/Jun/2020:14:53:28 +0100] "POST /wp-login.php HTTP/1.1" 200 5644 "http://mintpa.com/wp-login.php" "Mozilla/5.0 (Windows NT 6.1; rv:60.0) Gecko/20100101 Firefox/60.0"
189.59.5.81 - - [26/Jun/2020:14:53:30 +0100] "POST /wp-login.php HTTP/1.1" 200 5644 "http://mintpa.com/wp-login.php" "Mozilla/5.0 (Windows NT 6.1; rv:60.0) Gecko/20100101 Firefox/60.0"
...
2020-06-27 00:43:46
181.31.101.35 attackspam
Invalid user william from 181.31.101.35 port 13729
2020-06-27 00:39:14
193.228.57.222 attack
(mod_security) mod_security (id:210740) triggered by 193.228.57.222 (IT/Italy/-): 5 in the last 3600 secs
2020-06-27 00:25:57
62.12.115.233 attackbots
[H1] Blocked by UFW
2020-06-27 00:42:06
78.83.178.240 attackbots
GET /wp-login.php HTTP/1.1
2020-06-27 00:18:48
141.98.81.209 attackbots
Jun 26 16:08:58 *** sshd[10957]: User root from 141.98.81.209 not allowed because not listed in AllowUsers
2020-06-27 00:15:36
178.63.131.185 attackspambots
Jun 25 06:47:04 plesk sshd[9751]: Invalid user lance from 178.63.131.185
Jun 25 06:47:07 plesk sshd[9751]: Failed password for invalid user lance from 178.63.131.185 port 35636 ssh2
Jun 25 06:47:07 plesk sshd[9751]: Received disconnect from 178.63.131.185: 11: Bye Bye [preauth]
Jun 25 07:06:01 plesk sshd[11069]: Invalid user support from 178.63.131.185
Jun 25 07:06:03 plesk sshd[11069]: Failed password for invalid user support from 178.63.131.185 port 35596 ssh2
Jun 25 07:06:03 plesk sshd[11069]: Received disconnect from 178.63.131.185: 11: Bye Bye [preauth]
Jun 25 07:09:05 plesk sshd[11300]: Invalid user vue from 178.63.131.185
Jun 25 07:09:07 plesk sshd[11300]: Failed password for invalid user vue from 178.63.131.185 port 38534 ssh2
Jun 25 07:09:07 plesk sshd[11300]: Received disconnect from 178.63.131.185: 11: Bye Bye [preauth]
Jun 25 07:12:16 plesk sshd[11485]: Failed password for r.r from 178.63.131.185 port 41480 ssh2
Jun 25 07:12:16 plesk sshd[11485]: Received di........
-------------------------------
2020-06-27 00:19:37
137.117.67.63 attackspam
Jun 26 14:34:29 mellenthin sshd[29810]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=137.117.67.63  user=root
Jun 26 14:34:31 mellenthin sshd[29810]: Failed password for invalid user root from 137.117.67.63 port 53486 ssh2
2020-06-27 00:54:40
82.165.98.154 attackbotsspam
2020-06-26T13:03:56.265427shield sshd\[21566\]: Invalid user galia from 82.165.98.154 port 35112
2020-06-26T13:03:56.269062shield sshd\[21566\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=82.165.98.154
2020-06-26T13:03:57.556740shield sshd\[21566\]: Failed password for invalid user galia from 82.165.98.154 port 35112 ssh2
2020-06-26T13:07:54.502224shield sshd\[21844\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=82.165.98.154  user=sync
2020-06-26T13:07:56.798243shield sshd\[21844\]: Failed password for sync from 82.165.98.154 port 43316 ssh2
2020-06-27 00:41:19
191.102.148.103 attackbotsspam
(mod_security) mod_security (id:210740) triggered by 191.102.148.103 (US/United States/-): 5 in the last 3600 secs
2020-06-27 00:26:10
111.229.165.57 attackbots
Jun 26 17:02:14 ns381471 sshd[8805]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.229.165.57
Jun 26 17:02:16 ns381471 sshd[8805]: Failed password for invalid user dss from 111.229.165.57 port 54548 ssh2
2020-06-27 00:32:07
218.92.0.221 attackbotsspam
Jun 26 16:43:46 rush sshd[11034]: Failed password for root from 218.92.0.221 port 17772 ssh2
Jun 26 16:43:58 rush sshd[11046]: Failed password for root from 218.92.0.221 port 60125 ssh2
Jun 26 16:44:00 rush sshd[11046]: Failed password for root from 218.92.0.221 port 60125 ssh2
...
2020-06-27 00:44:28
194.28.133.40 attackbotsspam
(imapd) Failed IMAP login from 194.28.133.40 (UA/Ukraine/-): 1 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_TRIGGER; Logs: Jun 26 15:56:06 ir1 dovecot[2885757]: imap-login: Disconnected (auth failed, 1 attempts in 5 secs): user=, method=PLAIN, rip=194.28.133.40, lip=5.63.12.44, TLS, session=
2020-06-27 00:09:47

Recently Reported IPs

114.234.81.109 114.234.81.114 114.234.81.116 117.92.131.132
117.92.131.112 117.92.131.249 117.92.131.178 117.92.131.187
117.92.131.250 117.92.131.163 117.92.131.189 117.92.131.142
117.92.131.185 114.234.81.12 117.92.131.26 117.92.131.59
117.92.131.38 117.92.131.57 117.92.131.63 117.92.131.67