Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Republic of China (ROC)

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
IP Type Details Datetime
114.34.138.95 attackbotsspam
Unauthorized connection attempt detected from IP address 114.34.138.95 to port 9530 [T]
2020-08-14 02:30:09
114.34.138.95 attack
Unauthorized connection attempt detected from IP address 114.34.138.95 to port 4567 [J]
2020-01-28 23:44:43
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 114.34.138.44
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 63466
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;114.34.138.44.			IN	A

;; AUTHORITY SECTION:
.			598	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022020702 1800 900 604800 86400

;; Query time: 18 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Feb 08 08:52:52 CST 2022
;; MSG SIZE  rcvd: 106
Host info
44.138.34.114.in-addr.arpa domain name pointer 114-34-138-44.hinet-ip.hinet.net.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
44.138.34.114.in-addr.arpa	name = 114-34-138-44.hinet-ip.hinet.net.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
92.118.160.49 attackbots
Automatic report - Banned IP Access
2020-10-08 03:07:09
93.174.95.106 attackspambots
Port scan: Attack repeated for 24 hours
2020-10-08 03:25:09
89.248.168.176 attackspambots
ET CINS Active Threat Intelligence Poor Reputation IP group 78 - port: 1064 proto: tcp cat: Misc Attackbytes: 60
2020-10-08 03:19:09
68.183.55.223 attack
Misc Attack - Port=20285
2020-10-08 02:59:19
116.86.157.34 attackspam
SCAN: Host Sweep CloudCIX Reconnaissance Scan Detected, PTR: 34.157.86.116.starhub.net.sg.
2020-10-08 03:23:28
59.45.76.90 attack
fail2ban: brute force SSH detected
2020-10-08 03:08:02
159.203.82.179 attack
Oct  7 10:02:07 game-panel sshd[32184]: Failed password for root from 159.203.82.179 port 34990 ssh2
Oct  7 10:03:58 game-panel sshd[32253]: Failed password for root from 159.203.82.179 port 44493 ssh2
2020-10-08 02:49:52
132.232.31.157 attackspam
Oct  8 00:34:30 web1 sshd[16990]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=132.232.31.157  user=root
Oct  8 00:34:32 web1 sshd[16990]: Failed password for root from 132.232.31.157 port 36820 ssh2
Oct  8 00:47:54 web1 sshd[21548]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=132.232.31.157  user=root
Oct  8 00:47:56 web1 sshd[21548]: Failed password for root from 132.232.31.157 port 47654 ssh2
Oct  8 01:01:30 web1 sshd[26185]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=132.232.31.157  user=root
Oct  8 01:01:32 web1 sshd[26185]: Failed password for root from 132.232.31.157 port 37580 ssh2
Oct  8 01:10:44 web1 sshd[29427]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=132.232.31.157  user=root
Oct  8 01:10:45 web1 sshd[29427]: Failed password for root from 132.232.31.157 port 49686 ssh2
Oct  8 01:19:43 web1 sshd[32
...
2020-10-08 02:50:53
185.165.190.34 attack
" "
2020-10-08 03:22:27
89.248.167.131 attack
Port scan: Attack repeated for 24 hours
2020-10-08 03:20:14
62.109.217.119 attackbotsspam
recursive DNS query (.)
2020-10-08 03:00:57
92.118.161.41 attack
Fail2Ban Ban Triggered
2020-10-08 03:10:15
112.29.171.34 attackbotsspam
" "
2020-10-08 03:02:44
80.244.179.6 attackspambots
(sshd) Failed SSH login from 80.244.179.6 (GB/United Kingdom/school.asazs.co.uk): 5 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: Oct  7 13:12:41 server sshd[16981]: Failed password for root from 80.244.179.6 port 37980 ssh2
Oct  7 13:22:13 server sshd[19286]: Failed password for root from 80.244.179.6 port 41804 ssh2
Oct  7 13:25:09 server sshd[19987]: Failed password for root from 80.244.179.6 port 38632 ssh2
Oct  7 13:28:13 server sshd[20789]: Failed password for root from 80.244.179.6 port 35462 ssh2
Oct  7 13:31:33 server sshd[21565]: Failed password for root from 80.244.179.6 port 60534 ssh2
2020-10-08 03:04:39
192.241.219.35 attack
[N3.H3.VM3] Port Scanner Detected Blocked by UFW
2020-10-08 02:59:46

Recently Reported IPs

201.156.223.123 49.189.72.114 189.208.239.139 200.54.221.236
90.63.131.227 114.7.193.214 123.113.101.137 88.225.213.151
124.121.87.78 154.88.30.28 182.47.6.20 203.81.241.180
31.170.62.198 117.189.179.109 31.59.230.8 201.151.198.99
110.78.141.75 151.238.154.151 36.46.67.44 182.114.48.129