Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: China

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
IP Type Details Datetime
114.246.34.150 attack
1433/tcp
[2020-09-22]1pkt
2020-09-23 03:22:43
114.246.34.150 attackbotsspam
port scan and connect, tcp 1433 (ms-sql-s)
2020-09-22 19:34:23
114.246.34.147 attackbotsspam
Sep 18 13:35:23 piServer sshd[4433]: Failed password for root from 114.246.34.147 port 15239 ssh2
Sep 18 13:40:20 piServer sshd[5018]: Failed password for root from 114.246.34.147 port 15699 ssh2
Sep 18 13:45:19 piServer sshd[5538]: Failed password for root from 114.246.34.147 port 16187 ssh2
...
2020-09-18 19:54:38
114.246.34.147 attackspambots
114.246.34.147 (CN/China/-), 3 distributed sshd attacks on account [root] in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_DISTATTACK; Logs: Sep 17 21:21:41 honeypot sshd[144277]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=114.246.34.147  user=root
Sep 17 21:21:43 honeypot sshd[144277]: Failed password for root from 114.246.34.147 port 5193 ssh2
Sep 17 21:31:00 honeypot sshd[144370]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=107.173.213.6  user=root

IP Addresses Blocked:
2020-09-18 12:11:55
114.246.34.147 attackspam
2020-09-17T21:04:56.227628paragon sshd[129893]: Invalid user abcd123 from 114.246.34.147 port 9412
2020-09-17T21:04:56.230974paragon sshd[129893]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=114.246.34.147
2020-09-17T21:04:56.227628paragon sshd[129893]: Invalid user abcd123 from 114.246.34.147 port 9412
2020-09-17T21:04:58.490699paragon sshd[129893]: Failed password for invalid user abcd123 from 114.246.34.147 port 9412 ssh2
2020-09-17T21:08:43.172511paragon sshd[129944]: Invalid user ada from 114.246.34.147 port 9751
...
2020-09-18 02:25:37
114.246.34.138 attack
Unauthorised access (Sep  9) SRC=114.246.34.138 LEN=52 TTL=106 ID=18485 DF TCP DPT=1433 WINDOW=8192 SYN
2020-09-10 23:14:14
114.246.34.138 attackbotsspam
Unauthorised access (Sep  9) SRC=114.246.34.138 LEN=52 TTL=106 ID=18485 DF TCP DPT=1433 WINDOW=8192 SYN
2020-09-10 14:45:09
114.246.34.138 attackspambots
Unauthorised access (Sep  9) SRC=114.246.34.138 LEN=52 TTL=106 ID=18485 DF TCP DPT=1433 WINDOW=8192 SYN
2020-09-10 05:23:51
114.246.34.18 attackbotsspam
firewall-block, port(s): 5555/tcp
2020-05-05 01:32:18
114.246.34.145 attack
Unauthorised access (Feb 23) SRC=114.246.34.145 LEN=40 TTL=46 ID=52005 TCP DPT=8080 WINDOW=59671 SYN 
Unauthorised access (Feb 20) SRC=114.246.34.145 LEN=40 TTL=46 ID=21484 TCP DPT=8080 WINDOW=7927 SYN
2020-02-23 13:07:48
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 114.246.34.45
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 39503
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;114.246.34.45.			IN	A

;; AUTHORITY SECTION:
.			135	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022020700 1800 900 604800 86400

;; Query time: 15 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Feb 07 16:26:06 CST 2022
;; MSG SIZE  rcvd: 106
Host info
Host 45.34.246.114.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 45.34.246.114.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
193.188.22.188 attack
2019-10-20T20:28:07.855018abusebot-8.cloudsearch.cf sshd\[14265\]: Invalid user helpdesk from 193.188.22.188 port 18792
2019-10-21 04:45:21
162.243.50.8 attackbotsspam
Oct 20 22:28:01 localhost sshd\[23957\]: Invalid user woaini3344 from 162.243.50.8 port 40050
Oct 20 22:28:01 localhost sshd\[23957\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=162.243.50.8
Oct 20 22:28:03 localhost sshd\[23957\]: Failed password for invalid user woaini3344 from 162.243.50.8 port 40050 ssh2
2019-10-21 04:47:27
192.99.245.135 attackspam
Oct 20 13:50:47 mout sshd[22013]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=192.99.245.135  user=root
Oct 20 13:50:49 mout sshd[22013]: Failed password for root from 192.99.245.135 port 39480 ssh2
Oct 20 13:54:09 mout sshd[22281]: Invalid user admin from 192.99.245.135 port 49070
2019-10-21 04:25:19
45.136.109.215 attack
Oct 20 22:27:23 mc1 kernel: \[2889599.421503\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:11:a9:7b:d2:74:7f:6e:37:e3:08:00 SRC=45.136.109.215 DST=159.69.205.51 LEN=40 TOS=0x00 PREC=0x00 TTL=243 ID=59614 PROTO=TCP SPT=43015 DPT=5837 WINDOW=1024 RES=0x00 SYN URGP=0 
Oct 20 22:27:41 mc1 kernel: \[2889617.671554\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:11:a9:7b:d2:74:7f:6e:37:e3:08:00 SRC=45.136.109.215 DST=159.69.205.51 LEN=40 TOS=0x00 PREC=0x00 TTL=243 ID=40176 PROTO=TCP SPT=43015 DPT=974 WINDOW=1024 RES=0x00 SYN URGP=0 
Oct 20 22:28:26 mc1 kernel: \[2889662.211750\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:11:a9:7b:d2:74:7f:6e:37:e3:08:00 SRC=45.136.109.215 DST=159.69.205.51 LEN=40 TOS=0x00 PREC=0x00 TTL=244 ID=27955 PROTO=TCP SPT=43015 DPT=681 WINDOW=1024 RES=0x00 SYN URGP=0 
...
2019-10-21 04:34:34
106.51.80.198 attack
Oct 20 21:28:43 SilenceServices sshd[18492]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.51.80.198
Oct 20 21:28:45 SilenceServices sshd[18492]: Failed password for invalid user goatgoat from 106.51.80.198 port 48630 ssh2
Oct 20 21:32:57 SilenceServices sshd[19666]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.51.80.198
2019-10-21 04:16:42
47.74.190.56 attackspambots
2019-10-20T17:17:17.623891mizuno.rwx.ovh sshd[2429881]: Connection from 47.74.190.56 port 36114 on 78.46.61.178 port 22 rdomain ""
2019-10-20T17:17:19.194042mizuno.rwx.ovh sshd[2429881]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=47.74.190.56  user=root
2019-10-20T17:17:21.108259mizuno.rwx.ovh sshd[2429881]: Failed password for root from 47.74.190.56 port 36114 ssh2
2019-10-20T17:28:02.036672mizuno.rwx.ovh sshd[2431822]: Connection from 47.74.190.56 port 48304 on 78.46.61.178 port 22 rdomain ""
2019-10-20T17:28:03.523860mizuno.rwx.ovh sshd[2431822]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=47.74.190.56  user=root
2019-10-20T17:28:05.849291mizuno.rwx.ovh sshd[2431822]: Failed password for root from 47.74.190.56 port 48304 ssh2
...
2019-10-21 04:46:59
106.12.189.89 attackbotsspam
SSH Bruteforce attack
2019-10-21 04:16:59
95.222.252.254 attackbotsspam
Oct 20 23:12:59 server sshd\[2075\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=ip-95-222-252-254.hsi15.unitymediagroup.de  user=root
Oct 20 23:13:01 server sshd\[2075\]: Failed password for root from 95.222.252.254 port 45341 ssh2
Oct 20 23:24:29 server sshd\[5059\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=ip-95-222-252-254.hsi15.unitymediagroup.de  user=root
Oct 20 23:24:31 server sshd\[5059\]: Failed password for root from 95.222.252.254 port 33096 ssh2
Oct 20 23:28:27 server sshd\[6164\]: Invalid user nogroup from 95.222.252.254
Oct 20 23:28:27 server sshd\[6164\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=ip-95-222-252-254.hsi15.unitymediagroup.de 
...
2019-10-21 04:33:58
13.127.190.65 attackspam
xmlrpc attack
2019-10-21 04:17:31
49.88.112.70 attack
Oct 20 22:28:13 MK-Soft-VM5 sshd[19262]: Failed password for root from 49.88.112.70 port 20728 ssh2
Oct 20 22:28:17 MK-Soft-VM5 sshd[19262]: Failed password for root from 49.88.112.70 port 20728 ssh2
...
2019-10-21 04:41:09
198.108.67.89 attackbots
Port scan: Attack repeated for 24 hours
2019-10-21 04:41:45
51.77.210.216 attackspambots
Oct 20 02:51:49 web9 sshd\[14894\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.77.210.216  user=root
Oct 20 02:51:50 web9 sshd\[14894\]: Failed password for root from 51.77.210.216 port 54554 ssh2
Oct 20 02:55:50 web9 sshd\[15374\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.77.210.216  user=root
Oct 20 02:55:51 web9 sshd\[15374\]: Failed password for root from 51.77.210.216 port 37412 ssh2
Oct 20 02:59:46 web9 sshd\[15904\]: Invalid user doku from 51.77.210.216
2019-10-21 04:21:43
43.242.212.81 attackbotsspam
Oct 20 22:28:05 lnxmysql61 sshd[15632]: Failed password for root from 43.242.212.81 port 41105 ssh2
Oct 20 22:28:05 lnxmysql61 sshd[15632]: Failed password for root from 43.242.212.81 port 41105 ssh2
2019-10-21 04:45:54
222.242.223.75 attack
Oct 20 22:28:16 localhost sshd\[24005\]: Invalid user 123456 from 222.242.223.75 port 58082
Oct 20 22:28:16 localhost sshd\[24005\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.242.223.75
Oct 20 22:28:18 localhost sshd\[24005\]: Failed password for invalid user 123456 from 222.242.223.75 port 58082 ssh2
2019-10-21 04:38:24
138.68.250.76 attackbotsspam
Oct 20 22:28:26 srv206 sshd[7177]: Invalid user ftp0 from 138.68.250.76
Oct 20 22:28:26 srv206 sshd[7177]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.68.250.76
Oct 20 22:28:26 srv206 sshd[7177]: Invalid user ftp0 from 138.68.250.76
Oct 20 22:28:28 srv206 sshd[7177]: Failed password for invalid user ftp0 from 138.68.250.76 port 59790 ssh2
...
2019-10-21 04:31:40

Recently Reported IPs

23.108.42.45 125.164.48.98 78.38.22.173 202.21.125.182
178.72.75.174 5.201.188.200 178.130.172.3 223.204.64.193
91.231.239.2 83.4.88.244 34.121.234.231 209.141.61.236
188.19.170.103 39.45.51.5 181.129.65.194 115.52.34.4
36.68.111.112 183.2.115.179 117.84.156.254 2.134.3.106