Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: China

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 114.238.130.34
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 18353
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;114.238.130.34.			IN	A

;; AUTHORITY SECTION:
.			513	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022030501 1800 900 604800 86400

;; Query time: 113 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Mar 06 11:19:07 CST 2022
;; MSG SIZE  rcvd: 107
Host info
Host 34.130.238.114.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 34.130.238.114.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
178.62.28.79 attackbotsspam
Nov  9 20:27:39 eddieflores sshd\[16838\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.62.28.79  user=root
Nov  9 20:27:40 eddieflores sshd\[16838\]: Failed password for root from 178.62.28.79 port 43182 ssh2
Nov  9 20:31:24 eddieflores sshd\[17115\]: Invalid user Anonymous from 178.62.28.79
Nov  9 20:31:24 eddieflores sshd\[17115\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.62.28.79
Nov  9 20:31:27 eddieflores sshd\[17115\]: Failed password for invalid user Anonymous from 178.62.28.79 port 51984 ssh2
2019-11-10 15:53:40
164.132.104.58 attackspambots
Nov 10 10:07:19 server sshd\[3229\]: Invalid user glenn from 164.132.104.58
Nov 10 10:07:19 server sshd\[3229\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=58.ip-164-132-104.eu 
Nov 10 10:07:21 server sshd\[3229\]: Failed password for invalid user glenn from 164.132.104.58 port 33488 ssh2
Nov 10 10:30:10 server sshd\[9602\]: Invalid user login from 164.132.104.58
Nov 10 10:30:10 server sshd\[9602\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=58.ip-164-132-104.eu 
...
2019-11-10 16:30:49
192.144.161.40 attack
Nov 10 08:33:21 vps691689 sshd[15857]: Failed password for root from 192.144.161.40 port 49694 ssh2
Nov 10 08:38:28 vps691689 sshd[15916]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=192.144.161.40
...
2019-11-10 15:52:41
175.207.219.185 attack
Nov 10 10:37:13 server sshd\[11449\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=175.207.219.185  user=root
Nov 10 10:37:15 server sshd\[11449\]: Failed password for root from 175.207.219.185 port 57573 ssh2
Nov 10 10:42:25 server sshd\[12761\]: Invalid user admin from 175.207.219.185
Nov 10 10:42:25 server sshd\[12761\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=175.207.219.185 
Nov 10 10:42:27 server sshd\[12761\]: Failed password for invalid user admin from 175.207.219.185 port 22493 ssh2
...
2019-11-10 16:28:40
172.245.252.236 attackspambots
1,23-04/04 [bc03/m148] PostRequest-Spammer scoring: paris
2019-11-10 16:10:00
222.186.180.17 attack
pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.180.17  user=root
Failed password for root from 222.186.180.17 port 49108 ssh2
Failed password for root from 222.186.180.17 port 49108 ssh2
Failed password for root from 222.186.180.17 port 49108 ssh2
Failed password for root from 222.186.180.17 port 49108 ssh2
2019-11-10 16:19:04
62.234.66.145 attackspam
Nov 10 07:25:44 sd-53420 sshd\[27765\]: Invalid user pass1234 from 62.234.66.145
Nov 10 07:25:44 sd-53420 sshd\[27765\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=62.234.66.145
Nov 10 07:25:46 sd-53420 sshd\[27765\]: Failed password for invalid user pass1234 from 62.234.66.145 port 34250 ssh2
Nov 10 07:30:51 sd-53420 sshd\[29191\]: Invalid user ftptestuser from 62.234.66.145
Nov 10 07:30:51 sd-53420 sshd\[29191\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=62.234.66.145
...
2019-11-10 15:57:27
80.67.172.162 attack
Automatic report - XMLRPC Attack
2019-11-10 16:23:14
196.43.196.108 attackspam
5x Failed Password
2019-11-10 16:06:15
187.16.255.99 attackbotsspam
Nov 10 07:53:07 game-panel sshd[25479]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=187.16.255.99
Nov 10 07:53:09 game-panel sshd[25479]: Failed password for invalid user hdm777 from 187.16.255.99 port 35316 ssh2
Nov 10 07:57:42 game-panel sshd[25590]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=187.16.255.99
2019-11-10 16:07:17
167.71.121.36 attackbots
Nov 10 06:31:15 hermescis postfix/smtpd\[20284\]: NOQUEUE: reject: RCPT from unknown\[167.71.121.36\]: 550 5.1.1 \: Recipient address rejected:* from=\ to=\ proto=ESMTP helo=\
2019-11-10 15:54:03
122.224.214.18 attack
Nov 10 08:56:02 vps01 sshd[14683]: Failed password for root from 122.224.214.18 port 33448 ssh2
Nov 10 09:01:16 vps01 sshd[14817]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.224.214.18
2019-11-10 16:11:37
5.188.206.14 attack
Scanning (more than 2 packets) random ports - tries to find possible vulnerable services
2019-11-10 16:18:29
51.89.169.104 attackspam
Bad Postfix AUTH attempts
...
2019-11-10 16:15:37
71.6.158.166 attack
71.6.158.166 was recorded 5 times by 4 hosts attempting to connect to the following ports: 25565,7547,44818,5858,9000. Incident counter (4h, 24h, all-time): 5, 44, 271
2019-11-10 16:15:20

Recently Reported IPs

115.151.19.70 115.151.192.117 115.151.19.37 115.151.192.125
115.151.19.83 115.151.192.114 115.151.192.123 115.151.19.92
115.151.192.158 115.151.192.153 115.151.192.160 114.238.130.54
115.151.192.190 115.151.192.184 115.151.192.21 115.151.192.216
115.151.192.177 115.151.192.212 115.151.192.241 115.151.192.30