Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Republic of China (ROC)

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
IP Type Details Datetime
114.34.44.137 attack
Port scan denied
2020-07-14 03:42:56
114.34.44.19 attack
Unauthorized connection attempt detected from IP address 114.34.44.19 to port 81 [J]
2020-01-07 19:56:40
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 114.34.44.51
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 2434
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;114.34.44.51.			IN	A

;; AUTHORITY SECTION:
.			462	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022030800 1800 900 604800 86400

;; Query time: 40 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Mar 08 16:49:18 CST 2022
;; MSG SIZE  rcvd: 105
Host info
51.44.34.114.in-addr.arpa domain name pointer 114-34-44-51.hinet-ip.hinet.net.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
51.44.34.114.in-addr.arpa	name = 114-34-44-51.hinet-ip.hinet.net.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
122.114.109.220 attackbots
Invalid user yuyue from 122.114.109.220 port 59454
2020-07-01 01:51:18
134.209.148.107 attack
TCP port : 5989
2020-07-01 01:30:20
139.99.66.210 attack
Port Scan detected!
...
2020-07-01 01:39:28
139.162.177.15 attackspambots
1593534257 - 06/30/2020 18:24:17 Host: li1494-15.members.linode.com/139.162.177.15 Port: 69 UDP Blocked
2020-07-01 02:04:30
13.78.70.233 attackbots
SSH brute-force attempt
2020-07-01 01:41:20
37.49.227.109 attack
Unauthorized connection attempt detected from IP address 37.49.227.109 to port 81
2020-07-01 01:53:24
95.189.76.116 attackspam
Email rejected due to spam filtering
2020-07-01 01:37:45
193.8.83.6 attack
Jun 30 18:25:00 root sshd[11449]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=193.8.83.6  user=root
Jun 30 18:25:03 root sshd[11449]: Failed password for root from 193.8.83.6 port 56764 ssh2
...
2020-07-01 01:46:59
103.43.152.121 attackbotsspam
Invalid user user2 from 103.43.152.121 port 36268
2020-07-01 02:06:33
46.84.198.87 attackspambots
Lines containing failures of 46.84.198.87
Jun 30 14:12:09 ghostnameioc sshd[4840]: Invalid user navy from 46.84.198.87 port 39776
Jun 30 14:12:09 ghostnameioc sshd[4840]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=46.84.198.87 
Jun 30 14:12:11 ghostnameioc sshd[4840]: Failed password for invalid user navy from 46.84.198.87 port 39776 ssh2
Jun 30 14:12:13 ghostnameioc sshd[4840]: Received disconnect from 46.84.198.87 port 39776:11: Bye Bye [preauth]
Jun 30 14:12:13 ghostnameioc sshd[4840]: Disconnected from invalid user navy 46.84.198.87 port 39776 [preauth]
Jun 30 14:19:08 ghostnameioc sshd[4911]: Invalid user admin from 46.84.198.87 port 41708
Jun 30 14:19:08 ghostnameioc sshd[4911]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=46.84.198.87 


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=46.84.198.87
2020-07-01 01:52:49
49.233.53.111 attack
Invalid user deployer from 49.233.53.111 port 57370
2020-07-01 01:52:18
116.178.66.238 attack
Email rejected due to spam filtering
2020-07-01 01:50:30
76.65.216.208 attack
ua spoofing "Mozilla/5.0 (Windows; U; Windows NT 5.1; en-US; rv:x.x.x) Gecko/20041107 Firefox"
2020-07-01 02:02:22
129.211.52.192 attack
Attempted connection to port 9421.
2020-07-01 01:43:14
111.224.82.200 attack
serveres are UTC -0400
Lines containing failures of 111.224.82.200
Jun 30 08:18:41 tux2 sshd[23477]: Invalid user pi from 111.224.82.200 port 32387
Jun 30 08:18:41 tux2 sshd[23477]: Failed password for invalid user pi from 111.224.82.200 port 32387 ssh2
Jun 30 08:18:41 tux2 sshd[23477]: Connection closed by invalid user pi 111.224.82.200 port 32387 [preauth]
Jun 30 08:18:42 tux2 sshd[23479]: Invalid user pi from 111.224.82.200 port 52204
Jun 30 08:18:42 tux2 sshd[23479]: Failed password for invalid user pi from 111.224.82.200 port 52204 ssh2
Jun 30 08:18:42 tux2 sshd[23479]: Connection closed by invalid user pi 111.224.82.200 port 52204 [preauth]



........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=111.224.82.200
2020-07-01 01:40:26

Recently Reported IPs

118.174.102.140 118.174.102.237 118.174.102.55 118.174.102.80
118.174.102.96 118.174.102.45 118.174.103.103 118.174.103.131
118.174.103.181 114.34.70.228 118.174.102.91 118.174.103.74
118.174.103.80 118.174.103.66 118.174.103.88 118.174.104.0
118.174.104.1 118.174.104.132 118.174.104.106 118.174.104.14