Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Taiwan (Province of China)

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
IP Type Details Datetime
114.42.156.27 attack
firewall-block, port(s): 445/tcp
2020-08-25 18:39:00
114.42.151.109 attackspambots
Unauthorized connection attempt from IP address 114.42.151.109 on Port 445(SMB)
2020-08-09 20:29:41
114.42.102.128 attack
Icarus honeypot on github
2020-07-11 03:09:47
114.42.149.202 attackbots
Port probing on unauthorized port 23
2020-06-08 18:09:22
114.42.101.155 attackspam
 TCP (SYN) 114.42.101.155:10694 -> port 23, len 44
2020-06-01 18:52:51
114.42.101.155 attackspambots
Port Scan detected!
...
2020-05-31 07:02:58
114.42.149.149 attack
Port Scan
2020-05-30 01:25:19
114.42.107.194 attackspam
Attempted connection to port 23.
2020-05-20 23:29:28
114.42.139.215 attackbots
prod8
...
2020-04-17 17:28:33
114.42.166.31 attackspam
Unauthorised access (Dec  1) SRC=114.42.166.31 LEN=52 TTL=107 ID=30387 DF TCP DPT=445 WINDOW=8192 SYN
2019-12-01 20:17:01
114.42.133.23 attackspam
Unauthorized connection attempt from IP address 114.42.133.23 on Port 445(SMB)
2019-11-03 21:12:25
114.42.162.120 attackbotsspam
" "
2019-09-12 05:07:26
114.42.144.246 attackspambots
23/tcp
[2019-08-15]1pkt
2019-08-16 06:20:36
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 114.42.1.173
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 44234
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;114.42.1.173.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025011400 1800 900 604800 86400

;; Query time: 15 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Jan 14 23:42:26 CST 2025
;; MSG SIZE  rcvd: 105
Host info
173.1.42.114.in-addr.arpa domain name pointer 114-42-1-173.dynamic-ip.hinet.net.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
173.1.42.114.in-addr.arpa	name = 114-42-1-173.dynamic-ip.hinet.net.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
185.156.65.83 attackspambots
This IP is associated with RDP abuse. It was found in a paste by https://twitter.com/RdpSnitch - https://pastebin.com/4Ddmuksx  
For more information, or to report interesting/incorrect findings, contact us - bot@tines.io
2020-04-26 21:26:34
181.189.134.158 attackspambots
This IP is associated with RDP abuse. It was found in a paste by https://twitter.com/RdpSnitch - https://pastebin.com/4Ddmuksx  
For more information, or to report interesting/incorrect findings, contact us - bot@tines.io
2020-04-26 21:18:06
123.207.66.91 attack
This IP is associated with RDP abuse. It was found in a paste by https://twitter.com/RdpSnitch - https://pastebin.com/4Ddmuksx  
For more information, or to report interesting/incorrect findings, contact us - bot@tines.io
2020-04-26 21:33:54
188.239.199.104 attackbots
Automatic report - Port Scan Attack
2020-04-26 21:39:52
79.124.62.66 attackspam
Apr 26 14:31:00 debian-2gb-nbg1-2 kernel: \[10163196.238217\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=79.124.62.66 DST=195.201.40.59 LEN=40 TOS=0x00 PREC=0x00 TTL=244 ID=8441 PROTO=TCP SPT=53123 DPT=3352 WINDOW=1024 RES=0x00 SYN URGP=0
2020-04-26 21:16:04
221.150.226.133 attackspambots
Unauthorized connection attempt detected from IP address 221.150.226.133 to port 3389
2020-04-26 21:24:50
134.209.96.192 attackbots
This IP is associated with RDP abuse. It was found in a paste by https://twitter.com/RdpSnitch - https://pastebin.com/4Ddmuksx  
For more information, or to report interesting/incorrect findings, contact us - bot@tines.io
2020-04-26 21:13:45
195.54.160.210 attackbots
This IP is associated with RDP abuse. It was found in a paste by https://twitter.com/RdpSnitch - https://pastebin.com/4Ddmuksx  
For more information, or to report interesting/incorrect findings, contact us - bot@tines.io
2020-04-26 21:31:06
84.236.132.55 attackbotsspam
This IP is associated with RDP abuse. It was found in a paste by https://twitter.com/RdpSnitch - https://pastebin.com/4Ddmuksx  
For more information, or to report interesting/incorrect findings, contact us - bot@tines.io
2020-04-26 21:43:50
104.140.188.58 attackbotsspam
This IP is associated with RDP abuse. It was found in a paste by https://twitter.com/RdpSnitch - https://pastebin.com/4Ddmuksx  
For more information, or to report interesting/incorrect findings, contact us - bot@tines.io
2020-04-26 21:34:27
104.206.128.22 attack
This IP is associated with RDP abuse. It was found in a paste by https://twitter.com/RdpSnitch - https://pastebin.com/4Ddmuksx  
For more information, or to report interesting/incorrect findings, contact us - bot@tines.io
2020-04-26 21:21:26
103.207.38.217 attackbots
firewall-block, port(s): 3389/tcp
2020-04-26 21:34:46
51.195.131.81 attackspambots
This IP is associated with RDP abuse. It was found in a paste by https://twitter.com/RdpSnitch - https://pastebin.com/4Ddmuksx  
For more information, or to report interesting/incorrect findings, contact us - bot@tines.io
2020-04-26 21:23:13
87.251.74.34 attackspam
This IP is associated with RDP abuse. It was found in a paste by https://twitter.com/RdpSnitch - https://pastebin.com/4Ddmuksx  
For more information, or to report interesting/incorrect findings, contact us - bot@tines.io
2020-04-26 21:28:50
89.248.168.202 attackbotsspam
04/26/2020-09:45:48.268145 89.248.168.202 Protocol: 6 ET SCAN NMAP -sS window 1024
2020-04-26 21:51:16

Recently Reported IPs

104.55.49.105 80.193.160.34 5.98.106.240 31.106.145.6
91.10.46.17 129.205.252.39 137.163.151.168 87.28.120.219
34.46.22.99 71.88.175.42 149.107.253.19 202.92.21.99
143.36.43.249 65.121.141.83 212.251.182.16 160.174.20.129
3.120.11.161 16.16.163.191 191.140.207.171 205.44.118.215