Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Taiwan (Province of China)

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 114.24.162.13
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 11002
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;114.24.162.13.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025020300 1800 900 604800 86400

;; Query time: 58 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Feb 03 16:32:42 CST 2025
;; MSG SIZE  rcvd: 106
Host info
13.162.24.114.in-addr.arpa domain name pointer 114-24-162-13.dynamic-ip.hinet.net.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
13.162.24.114.in-addr.arpa	name = 114-24-162-13.dynamic-ip.hinet.net.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
176.15.159.165 attack
445/tcp
[2020-07-20]1pkt
2020-07-21 03:01:19
163.172.157.193 attackspambots
Invalid user daniel from 163.172.157.193 port 47092
2020-07-21 02:47:36
167.71.139.81 attackbots
Invalid user admin from 167.71.139.81 port 57372
2020-07-21 02:52:03
103.121.43.11 attackspam
445/tcp
[2020-07-20]1pkt
2020-07-21 02:37:09
58.211.144.220 attackbots
Invalid user mathew from 58.211.144.220 port 45536
2020-07-21 02:56:18
52.33.43.238 attackspambots
Unauthorized connection attempt detected from IP address 52.33.43.238 to port 8545
2020-07-21 02:45:58
185.81.157.19 attackbotsspam
1433/tcp
[2020-07-20]1pkt
2020-07-21 02:54:09
66.37.110.238 attackspambots
Jul 20 20:37:19 vmd36147 sshd[23302]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=66.37.110.238
Jul 20 20:37:20 vmd36147 sshd[23302]: Failed password for invalid user odoo from 66.37.110.238 port 59874 ssh2
Jul 20 20:43:06 vmd36147 sshd[4241]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=66.37.110.238
...
2020-07-21 02:48:48
112.196.144.160 attackspam
Automatic report - XMLRPC Attack
2020-07-21 03:06:53
45.164.160.31 attackspam
445/tcp 445/tcp
[2020-07-20]2pkt
2020-07-21 02:51:32
112.85.42.238 attackspambots
Jul 20 18:33:50 jumpserver sshd[158523]: Failed password for root from 112.85.42.238 port 25057 ssh2
Jul 20 18:34:56 jumpserver sshd[158530]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.85.42.238  user=root
Jul 20 18:34:57 jumpserver sshd[158530]: Failed password for root from 112.85.42.238 port 45280 ssh2
...
2020-07-21 03:07:16
104.251.231.20 attack
2020-07-19T21:20:31.037456hostname sshd[38419]: Failed password for invalid user liyan from 104.251.231.20 port 53634 ssh2
...
2020-07-21 03:05:10
118.36.234.187 attack
Invalid user administrator from 118.36.234.187 port 48630
2020-07-21 02:34:40
123.59.195.245 attack
2020-07-20T19:46:52.120476hostname sshd[66942]: Failed password for invalid user edge from 123.59.195.245 port 60518 ssh2
...
2020-07-21 02:35:45
197.61.126.68 attack
5500/tcp
[2020-07-20]1pkt
2020-07-21 03:02:35

Recently Reported IPs

193.132.253.161 190.70.206.212 98.206.174.49 87.125.22.202
238.233.26.245 237.130.85.89 218.3.128.245 184.201.31.221
132.28.174.11 69.4.144.148 139.45.195.46 160.146.229.120
38.240.23.3 64.206.118.50 90.55.237.220 225.222.193.86
15.3.137.84 120.172.67.180 48.129.128.191 80.228.30.163