Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Taiwan (Province of China)

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 114.42.199.219
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 27869
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;114.42.199.219.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025012301 1800 900 604800 86400

;; Query time: 32 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Jan 24 06:05:25 CST 2025
;; MSG SIZE  rcvd: 107
Host info
219.199.42.114.in-addr.arpa domain name pointer 114-42-199-219.dynamic-ip.hinet.net.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
219.199.42.114.in-addr.arpa	name = 114-42-199-219.dynamic-ip.hinet.net.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
81.19.215.174 attackspam
2020-01-03T00:58:12.728167xentho-1 sshd[397021]: Invalid user rahim from 81.19.215.174 port 51488
2020-01-03T00:58:12.735976xentho-1 sshd[397021]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=81.19.215.174
2020-01-03T00:58:12.728167xentho-1 sshd[397021]: Invalid user rahim from 81.19.215.174 port 51488
2020-01-03T00:58:15.289627xentho-1 sshd[397021]: Failed password for invalid user rahim from 81.19.215.174 port 51488 ssh2
2020-01-03T01:00:34.152227xentho-1 sshd[397060]: Invalid user dw from 81.19.215.174 port 43046
2020-01-03T01:00:34.162240xentho-1 sshd[397060]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=81.19.215.174
2020-01-03T01:00:34.152227xentho-1 sshd[397060]: Invalid user dw from 81.19.215.174 port 43046
2020-01-03T01:00:35.541183xentho-1 sshd[397060]: Failed password for invalid user dw from 81.19.215.174 port 43046 ssh2
2020-01-03T01:02:50.414054xentho-1 sshd[397137]: Invalid user test fr
...
2020-01-03 18:57:33
120.29.225.101 attackspam
Unauthorized connection attempt from IP address 120.29.225.101 on Port 445(SMB)
2020-01-03 19:02:57
113.169.80.26 attackbots
Unauthorized connection attempt from IP address 113.169.80.26 on Port 445(SMB)
2020-01-03 19:03:51
80.88.90.86 attackspambots
Jan  3 12:02:56 server sshd\[1811\]: Invalid user ts3 from 80.88.90.86
Jan  3 12:02:56 server sshd\[1811\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=80.88.90.86 
Jan  3 12:02:59 server sshd\[1811\]: Failed password for invalid user ts3 from 80.88.90.86 port 34806 ssh2
Jan  3 12:11:40 server sshd\[3892\]: Invalid user admin from 80.88.90.86
Jan  3 12:11:40 server sshd\[3892\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=80.88.90.86 
...
2020-01-03 19:17:06
196.219.39.250 attackbotsspam
Unauthorized connection attempt from IP address 196.219.39.250 on Port 445(SMB)
2020-01-03 19:05:53
129.211.144.217 attack
Dec 31 19:41:49 h2034429 sshd[31062]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.211.144.217  user=r.r
Dec 31 19:41:51 h2034429 sshd[31062]: Failed password for r.r from 129.211.144.217 port 40804 ssh2
Dec 31 19:41:51 h2034429 sshd[31062]: Received disconnect from 129.211.144.217 port 40804:11: Bye Bye [preauth]
Dec 31 19:41:51 h2034429 sshd[31062]: Disconnected from 129.211.144.217 port 40804 [preauth]
Dec 31 19:53:34 h2034429 sshd[31167]: Invalid user kori from 129.211.144.217
Dec 31 19:53:34 h2034429 sshd[31167]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.211.144.217
Dec 31 19:53:36 h2034429 sshd[31167]: Failed password for invalid user kori from 129.211.144.217 port 60972 ssh2
Dec 31 19:53:37 h2034429 sshd[31167]: Received disconnect from 129.211.144.217 port 60972:11: Bye Bye [preauth]
Dec 31 19:53:37 h2034429 sshd[31167]: Disconnected from 129.211.144.217 port 60972 [........
-------------------------------
2020-01-03 19:30:56
117.20.23.182 attack
Unauthorized connection attempt from IP address 117.20.23.182 on Port 445(SMB)
2020-01-03 19:11:03
188.165.215.138 attack
\[2020-01-03 06:10:44\] SECURITY\[2857\] res_security_log.c: SecurityEvent="FailedACL",EventTV="2020-01-03T06:10:44.468-0500",Severity="Error",Service="SIP",EventVersion="1",AccountID="441902933947",SessionID="0x7f0fb4a5a908",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/188.165.215.138/62900",ACLName="no_extension_match"
\[2020-01-03 06:11:49\] SECURITY\[2857\] res_security_log.c: SecurityEvent="FailedACL",EventTV="2020-01-03T06:11:49.259-0500",Severity="Error",Service="SIP",EventVersion="1",AccountID="011441902933947",SessionID="0x7f0fb4812b98",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/188.165.215.138/56246",ACLName="no_extension_match"
\[2020-01-03 06:12:56\] SECURITY\[2857\] res_security_log.c: SecurityEvent="FailedACL",EventTV="2020-01-03T06:12:56.418-0500",Severity="Error",Service="SIP",EventVersion="1",AccountID="9011441902933947",SessionID="0x7f0fb4a5a908",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/188.165.215.138/50828",ACLName="no
2020-01-03 19:23:13
190.77.7.194 attack
Unauthorized connection attempt from IP address 190.77.7.194 on Port 445(SMB)
2020-01-03 19:20:05
116.111.142.35 attack
Unauthorized connection attempt from IP address 116.111.142.35 on Port 445(SMB)
2020-01-03 19:28:02
51.38.186.200 attack
Jan  3 07:58:37 silence02 sshd[14773]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.38.186.200
Jan  3 07:58:39 silence02 sshd[14773]: Failed password for invalid user xwm from 51.38.186.200 port 60552 ssh2
Jan  3 08:01:35 silence02 sshd[14855]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.38.186.200
2020-01-03 19:37:20
118.89.240.188 attackspam
Jan  3 07:19:33 [host] sshd[19730]: Invalid user ispconfig from 118.89.240.188
Jan  3 07:19:33 [host] sshd[19730]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.89.240.188
Jan  3 07:19:35 [host] sshd[19730]: Failed password for invalid user ispconfig from 118.89.240.188 port 39928 ssh2
2020-01-03 19:19:25
209.17.96.34 attackbotsspam
IP: 209.17.96.34
Ports affected
    http protocol over TLS/SSL (443) 
Abuse Confidence rating 100%
Found in DNSBL('s)
ASN Details
   AS174 Cogent Communications
   United States (US)
   CIDR 209.17.96.0/20
Log Date: 3/01/2020 4:42:35 AM UTC
2020-01-03 19:15:21
117.4.32.116 attack
Unauthorized connection attempt from IP address 117.4.32.116 on Port 445(SMB)
2020-01-03 19:24:13
145.239.91.88 attack
Invalid user uucp from 145.239.91.88 port 48206
2020-01-03 19:18:50

Recently Reported IPs

44.171.214.87 253.175.215.186 251.76.144.78 94.134.87.146
146.245.150.62 63.250.165.73 178.21.246.213 12.225.184.129
123.82.198.27 237.163.115.93 51.13.22.136 46.135.38.187
140.127.234.66 173.188.119.10 40.190.14.60 243.151.36.22
132.54.200.249 241.156.106.204 238.200.101.69 101.150.34.55