Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Taichung

Region: Taichung City

Country: Taiwan, China

Internet Service Provider: Chunghwa Telecom Co. Ltd.

Hostname: unknown

Organization: Data Communication Business Group

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
IP Type Details Datetime
114.38.25.114 attackbotsspam
unauthorized connection attempt
2020-01-15 18:27:12
114.38.25.223 attackbotsspam
23/tcp
[2019-07-19]1pkt
2019-07-20 05:39:26
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 114.38.25.145
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 30219
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;114.38.25.145.			IN	A

;; AUTHORITY SECTION:
.			3600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019081300 1800 900 604800 86400

;; Query time: 2 msec
;; SERVER: 67.207.67.2#53(67.207.67.2)
;; WHEN: Wed Aug 14 02:12:49 CST 2019
;; MSG SIZE  rcvd: 117
Host info
145.25.38.114.in-addr.arpa domain name pointer 114-38-25-145.dynamic-ip.hinet.net.
Nslookup info:
Server:		67.207.67.2
Address:	67.207.67.2#53

Non-authoritative answer:
145.25.38.114.in-addr.arpa	name = 114-38-25-145.dynamic-ip.hinet.net.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
60.18.86.30 attackspambots
[DoS attack: ACK Scan] (2) attack packets
2019-06-29 03:07:31
200.35.74.78 attackbots
445/tcp
[2019-06-28]1pkt
2019-06-29 02:49:55
41.236.144.242 attackbotsspam
23/tcp
[2019-06-28]1pkt
2019-06-29 02:41:07
171.241.143.150 attack
445/tcp
[2019-06-28]1pkt
2019-06-29 03:09:27
117.216.12.231 attack
445/tcp
[2019-06-28]1pkt
2019-06-29 03:14:45
109.239.215.26 attack
8080/tcp
[2019-06-28]1pkt
2019-06-29 03:04:27
50.200.136.108 attack
3395/udp 3395/udp
[2019-06-28]2pkt
2019-06-29 03:18:31
114.43.221.141 attackspam
37215/tcp
[2019-06-28]1pkt
2019-06-29 02:41:41
183.89.168.193 attackspam
445/tcp
[2019-06-28]1pkt
2019-06-29 02:58:41
112.245.208.215 attackbotsspam
22/tcp
[2019-06-28]1pkt
2019-06-29 02:42:22
112.87.60.30 attackspam
8080/tcp
[2019-06-28]1pkt
2019-06-29 03:22:19
49.83.38.243 attackbotsspam
Jun 28 15:43:51 SilenceServices sshd[8586]: Failed password for root from 49.83.38.243 port 60217 ssh2
Jun 28 15:43:53 SilenceServices sshd[8586]: Failed password for root from 49.83.38.243 port 60217 ssh2
Jun 28 15:43:55 SilenceServices sshd[8586]: Failed password for root from 49.83.38.243 port 60217 ssh2
2019-06-29 02:37:04
212.83.129.106 attack
Spam email sent to honeypot from hull@transiteurope.org
2019-06-29 02:37:31
116.211.171.189 attack
[DoS attack: ACK Scan] (1) attack packets
2019-06-29 02:40:10
212.22.64.153 attackspam
From CCTV User Interface Log
...::ffff:212.22.64.153 - - [28/Jun/2019:09:43:45 +0000] "-" 400 0
...
2019-06-29 02:42:43

Recently Reported IPs

212.177.22.134 80.234.44.81 147.86.160.162 140.105.236.93
139.119.133.53 78.79.48.154 102.168.174.132 68.67.53.238
58.246.187.102 85.15.128.238 141.233.0.40 123.78.202.152
93.19.12.31 126.11.202.44 71.173.241.162 5.135.101.228
77.167.1.236 14.227.48.205 201.172.136.132 111.125.204.121