Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Kaohsiung City

Region: Kaohsiung

Country: Taiwan, China

Internet Service Provider: unknown

Hostname: unknown

Organization: Data Communication Business Group

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:

; <<>> DiG 9.10.3-P4-Ubuntu <<>> 114.33.195.114
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 20791
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;114.33.195.114.			IN	A

;; AUTHORITY SECTION:
.			600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019062900 1800 900 604800 86400

;; Query time: 108 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Jun 30 01:50:44 CST 2019
;; MSG SIZE  rcvd: 118

Host info
114.195.33.114.in-addr.arpa domain name pointer 114-33-195-114.HINET-IP.hinet.net.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
*** Can't find 114.195.33.114.in-addr.arpa.: No answer

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
221.12.124.190 attack
Apr 20 03:09:59 firewall sshd[15924]: Invalid user oti from 221.12.124.190
Apr 20 03:10:01 firewall sshd[15924]: Failed password for invalid user oti from 221.12.124.190 port 44278 ssh2
Apr 20 03:14:47 firewall sshd[16094]: Invalid user autopista from 221.12.124.190
...
2020-04-20 14:45:02
114.88.128.78 attackbots
Apr 20 06:19:47 dev0-dcde-rnet sshd[12205]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=114.88.128.78
Apr 20 06:19:48 dev0-dcde-rnet sshd[12205]: Failed password for invalid user ftpuser from 114.88.128.78 port 44664 ssh2
Apr 20 06:27:23 dev0-dcde-rnet sshd[12273]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=114.88.128.78
2020-04-20 14:42:32
129.211.59.87 attackbotsspam
2020-04-19T23:53:30.679425linuxbox-skyline sshd[266094]: Invalid user wi from 129.211.59.87 port 59712
...
2020-04-20 15:15:15
106.12.6.136 attackspam
$f2bV_matches
2020-04-20 14:57:53
125.119.35.28 attackbotsspam
Apr 20 05:46:28 web01.agentur-b-2.de postfix/smtpd[457508]: warning: unknown[125.119.35.28]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Apr 20 05:46:28 web01.agentur-b-2.de postfix/smtpd[457508]: lost connection after AUTH from unknown[125.119.35.28]
Apr 20 05:46:35 web01.agentur-b-2.de postfix/smtpd[462307]: warning: unknown[125.119.35.28]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Apr 20 05:46:35 web01.agentur-b-2.de postfix/smtpd[462307]: lost connection after AUTH from unknown[125.119.35.28]
Apr 20 05:46:46 web01.agentur-b-2.de postfix/smtpd[457508]: warning: unknown[125.119.35.28]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
2020-04-20 15:12:42
138.197.141.233 attack
Unauthorized connection attempt detected from IP address 138.197.141.233 to port 23
2020-04-20 15:08:01
77.42.123.13 attackspambots
Automatic report - Port Scan Attack
2020-04-20 15:05:08
181.63.146.187 attackspambots
F2B blocked SSH BF
2020-04-20 15:06:08
181.40.76.162 attack
Invalid user postgres from 181.40.76.162 port 47846
2020-04-20 15:08:50
152.136.104.78 attackspam
2020-04-20T07:14:35.915858  sshd[31466]: Invalid user fn from 152.136.104.78 port 50312
2020-04-20T07:14:35.930231  sshd[31466]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=152.136.104.78
2020-04-20T07:14:35.915858  sshd[31466]: Invalid user fn from 152.136.104.78 port 50312
2020-04-20T07:14:37.454124  sshd[31466]: Failed password for invalid user fn from 152.136.104.78 port 50312 ssh2
...
2020-04-20 14:51:37
104.236.142.89 attackbotsspam
*Port Scan* detected from 104.236.142.89 (US/United States/California/San Francisco/-). 4 hits in the last 35 seconds
2020-04-20 15:00:08
5.115.131.200 attackbotsspam
Apr 20 05:56:46 vmd17057 sshd[14529]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=5.115.131.200 
Apr 20 05:56:48 vmd17057 sshd[14529]: Failed password for invalid user test from 5.115.131.200 port 11426 ssh2
...
2020-04-20 14:57:39
222.187.81.130 attack
Port probing on unauthorized port 5555
2020-04-20 15:05:32
128.199.174.201 attack
Apr 20 03:54:11 game-panel sshd[19659]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.199.174.201
Apr 20 03:54:13 game-panel sshd[19659]: Failed password for invalid user test from 128.199.174.201 port 37604 ssh2
Apr 20 03:57:11 game-panel sshd[19787]: Failed password for root from 128.199.174.201 port 55894 ssh2
2020-04-20 14:38:01
139.59.94.24 attack
Invalid user git from 139.59.94.24 port 59676
2020-04-20 15:14:49

Recently Reported IPs

213.143.48.74 201.219.197.42 98.196.53.164 45.21.236.230
41.63.85.202 115.72.172.146 118.61.9.160 134.73.161.3
51.140.235.116 132.145.213.87 199.27.180.200 221.81.139.53
110.130.72.220 54.39.173.190 151.166.148.182 202.162.204.90
184.145.168.25 183.236.34.133 183.236.34.130 139.93.32.166