Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Zhongli

Region: Taoyuan

Country: Taiwan, China

Internet Service Provider: Chunghwa

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 114.25.134.1
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 12272
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;114.25.134.1.			IN	A

;; AUTHORITY SECTION:
.			299	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2023050101 1800 900 604800 86400

;; Query time: 64 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue May 02 14:20:51 CST 2023
;; MSG SIZE  rcvd: 105
Host info
1.134.25.114.in-addr.arpa domain name pointer 114-25-134-1.dynamic-ip.hinet.net.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
1.134.25.114.in-addr.arpa	name = 114-25-134-1.dynamic-ip.hinet.net.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
194.99.106.147 attack
Invalid user drweb from 194.99.106.147 port 34096
2020-05-28 13:08:13
184.170.212.94 attackspambots
Invalid user cpanel from 184.170.212.94 port 46014
2020-05-28 13:01:47
5.135.186.52 attack
May 28 05:57:31 melroy-server sshd[14621]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=5.135.186.52 
May 28 05:57:32 melroy-server sshd[14621]: Failed password for invalid user amx from 5.135.186.52 port 50544 ssh2
...
2020-05-28 13:06:35
51.254.143.190 attack
May 27 18:17:04 web1 sshd\[31841\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.254.143.190  user=root
May 27 18:17:06 web1 sshd\[31841\]: Failed password for root from 51.254.143.190 port 50384 ssh2
May 27 18:21:43 web1 sshd\[32260\]: Invalid user douglas from 51.254.143.190
May 27 18:21:43 web1 sshd\[32260\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.254.143.190
May 27 18:21:45 web1 sshd\[32260\]: Failed password for invalid user douglas from 51.254.143.190 port 50497 ssh2
2020-05-28 12:32:46
222.186.180.130 attackbots
May 28 06:31:30 piServer sshd[14187]: Failed password for root from 222.186.180.130 port 33887 ssh2
May 28 06:31:33 piServer sshd[14187]: Failed password for root from 222.186.180.130 port 33887 ssh2
May 28 06:31:36 piServer sshd[14187]: Failed password for root from 222.186.180.130 port 33887 ssh2
...
2020-05-28 12:37:29
36.91.76.171 attackspam
Unauthorised connection attempt detected at AUO MAIN. System is sshd. Protected by AUO Stack Web Application Firewall (WAF)
2020-05-28 12:52:59
45.95.168.93 attack
SSH login attempts.
2020-05-28 12:35:57
141.98.9.161 attackbots
$f2bV_matches
2020-05-28 12:28:45
213.118.170.210 attackbots
SSH Brute-Force Attack
2020-05-28 12:57:59
106.12.163.87 attack
SSH login attempts.
2020-05-28 13:05:38
195.54.160.180 attack
SSH login attempts.
2020-05-28 12:50:43
95.246.252.37 attackbots
SSH login attempts.
2020-05-28 12:34:59
51.75.66.142 attackbots
Auto Fail2Ban report, multiple SSH login attempts.
2020-05-28 12:56:02
171.67.2.22 attack
May 28 05:49:40 server sshd[29109]: Failed password for root from 171.67.2.22 port 58142 ssh2
May 28 05:54:08 server sshd[1428]: Failed password for root from 171.67.2.22 port 60278 ssh2
May 28 05:58:04 server sshd[5612]: Failed password for invalid user hacker from 171.67.2.22 port 56904 ssh2
2020-05-28 12:30:18
198.108.66.176 attackspambots
SSH login attempts.
2020-05-28 12:59:44

Recently Reported IPs

164.24.22.214 59.152.95.27 188.134.111.52 165.184.189.94
134.100.129.185 126.179.122.91 108.30.162.80 111.40.0.124
37.27.8.54 203.64.173.1 140.116.132.232 223.202.216.79
140.116.192.193 141.109.0.75 140.116.245.151 140.135.10.176
192.248.8.17 140.116.92.12 223.255.230.67 132.68.66.39