Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Xindian

Region: Changhua

Country: Taiwan, China

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 114.34.32.116
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 18249
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;114.34.32.116.			IN	A

;; AUTHORITY SECTION:
.			292	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2020081802 1800 900 604800 86400

;; Query time: 84 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Aug 19 08:29:05 CST 2020
;; MSG SIZE  rcvd: 117
Host info
116.32.34.114.in-addr.arpa domain name pointer 114-34-32-116.HINET-IP.hinet.net.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
116.32.34.114.in-addr.arpa	name = 114-34-32-116.HINET-IP.hinet.net.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
106.32.220.5 attackbots
Aug 10 07:28:12 ovpn sshd[27651]: Invalid user admin from 106.32.220.5
Aug 10 07:28:12 ovpn sshd[27651]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.32.220.5
Aug 10 07:28:15 ovpn sshd[27651]: Failed password for invalid user admin from 106.32.220.5 port 57218 ssh2
Aug 10 07:28:18 ovpn sshd[27651]: Failed password for invalid user admin from 106.32.220.5 port 57218 ssh2
Aug 10 07:28:20 ovpn sshd[27651]: Failed password for invalid user admin from 106.32.220.5 port 57218 ssh2
Aug 10 07:28:22 ovpn sshd[27651]: Failed password for invalid user admin from 106.32.220.5 port 57218 ssh2

........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=106.32.220.5
2019-08-10 18:03:39
213.133.3.8 attackspam
Aug 10 08:35:49 pornomens sshd\[10516\]: Invalid user amadeus from 213.133.3.8 port 47362
Aug 10 08:35:49 pornomens sshd\[10516\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=213.133.3.8
Aug 10 08:35:51 pornomens sshd\[10516\]: Failed password for invalid user amadeus from 213.133.3.8 port 47362 ssh2
...
2019-08-10 17:46:20
162.243.144.216 attack
Portscan or hack attempt detected by psad/fwsnort
2019-08-10 17:42:07
43.228.183.106 attack
firewall-block, port(s): 445/tcp
2019-08-10 17:53:39
177.8.255.162 attackspam
failed_logins
2019-08-10 18:03:07
211.181.237.29 attackspam
Unauthorized connection attempt from IP address 211.181.237.29 on Port 445(SMB)
2019-08-10 17:34:44
114.5.38.68 attackbots
Unauthorized connection attempt from IP address 114.5.38.68 on Port 445(SMB)
2019-08-10 17:40:55
125.211.102.253 attackspambots
SSH authentication failure x 6 reported by Fail2Ban
...
2019-08-10 17:21:00
171.25.193.78 attackspam
SSH Bruteforce attack
2019-08-10 17:20:01
124.127.132.22 attack
$f2bV_matches
2019-08-10 18:21:39
104.198.171.133 attackbotsspam
Time:     Fri Aug  9 23:54:24 2019 -0300
IP:       104.198.171.133 (US/United States/133.171.198.104.bc.googleusercontent.com)
Failures: 30 (smtpauth)
Interval: 3600 seconds
Blocked:  Permanent Block
2019-08-10 17:54:49
81.22.45.148 attack
Aug 10 11:05:53 lumpi kernel: INPUT:DROP:SPAMHAUS_EDROP:IN=eth0 OUT= MAC=52:54:a2:01:a5:04:d2:74:7f:6e:37:e3:08:00 SRC=81.22.45.148 DST=172.31.1.100 LEN=40 TOS=0x00 PREC=0x00 TTL=244 ID=56344 PROTO=TCP SPT=44617 DPT=8295 WINDOW=1024 RES=0x00 SYN URGP=0 
...
2019-08-10 18:09:45
69.162.113.233 attack
[SMB remote code execution attempt: port tcp/445]
*(RWIN=1024)(08101032)
2019-08-10 17:23:23
194.28.115.251 attackspam
Automatic report - Banned IP Access
2019-08-10 18:06:42
207.107.67.67 attackbotsspam
Aug 10 04:31:05 * sshd[4515]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=207.107.67.67
Aug 10 04:31:07 * sshd[4515]: Failed password for invalid user matthew from 207.107.67.67 port 55842 ssh2
2019-08-10 17:18:16

Recently Reported IPs

178.236.47.34 95.142.157.116 114.245.31.200 109.228.171.173
165.212.186.28 177.16.232.87 138.102.100.54 72.119.81.218
50.102.71.97 142.73.90.227 196.129.217.221 73.12.237.153
123.48.173.28 219.10.75.167 208.34.138.207 133.242.182.114
87.25.17.182 91.169.255.186 173.200.29.238 86.69.6.216