Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Republic of China (ROC)

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 114.44.216.162
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 3534
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;114.44.216.162.			IN	A

;; AUTHORITY SECTION:
.			101	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022030501 1800 900 604800 86400

;; Query time: 67 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Mar 06 11:08:35 CST 2022
;; MSG SIZE  rcvd: 107
Host info
162.216.44.114.in-addr.arpa domain name pointer 114-44-216-162.dynamic-ip.hinet.net.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
162.216.44.114.in-addr.arpa	name = 114-44-216-162.dynamic-ip.hinet.net.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
170.106.36.97 attackbots
Unauthorized connection attempt detected from IP address 170.106.36.97 to port 5902
2020-06-29 04:39:03
179.109.150.102 attackspambots
Unauthorized connection attempt detected from IP address 179.109.150.102 to port 88
2020-06-29 04:10:59
150.95.138.39 attackbotsspam
Fail2Ban Ban Triggered
2020-06-29 04:40:25
197.156.65.138 attackbots
Jun 28 23:34:52 journals sshd\[33069\]: Invalid user ftphome from 197.156.65.138
Jun 28 23:34:52 journals sshd\[33069\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=197.156.65.138
Jun 28 23:34:55 journals sshd\[33069\]: Failed password for invalid user ftphome from 197.156.65.138 port 53384 ssh2
Jun 28 23:38:59 journals sshd\[33411\]: Invalid user xwj from 197.156.65.138
Jun 28 23:38:59 journals sshd\[33411\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=197.156.65.138
...
2020-06-29 04:43:53
177.68.214.210 attackbots
Honeypot attack, port: 81, PTR: 177-68-214-210.dsl.telesp.net.br.
2020-06-29 04:13:33
46.209.239.202 attack
Unauthorized connection attempt detected from IP address 46.209.239.202 to port 445
2020-06-29 04:29:01
5.126.71.213 attackbots
Unauthorized connection attempt detected from IP address 5.126.71.213 to port 445
2020-06-29 04:31:36
103.214.15.132 attackspam
Unauthorized connection attempt detected from IP address 103.214.15.132 to port 8080
2020-06-29 04:19:36
213.81.147.251 attackspam
Unauthorized connection attempt detected from IP address 213.81.147.251 to port 23
2020-06-29 04:08:16
148.244.240.231 attackbots
Unauthorized connection attempt detected from IP address 148.244.240.231 to port 445
2020-06-29 04:39:27
191.207.69.96 attackspambots
Unauthorized connection attempt detected from IP address 191.207.69.96 to port 22
2020-06-29 04:35:02
96.69.132.161 attack
Unauthorized connection attempt detected from IP address 96.69.132.161 to port 23
2020-06-29 04:20:55
218.75.207.11 attack
Unauthorized connection attempt detected from IP address 218.75.207.11 to port 10922
2020-06-29 04:32:42
192.241.222.140 attack
Unauthorized SSH login attempts
2020-06-29 04:42:22
78.27.151.101 attackspambots
Unauthorized connection attempt detected from IP address 78.27.151.101 to port 23
2020-06-29 04:25:44

Recently Reported IPs

114.44.218.224 114.44.218.229 114.44.218.239 114.44.218.237
114.44.218.23 114.225.168.3 114.44.218.245 114.44.218.249
114.44.218.233 114.44.218.250 114.44.218.26 114.44.218.38
114.44.218.227 114.44.218.247 114.44.218.40 114.44.218.56
114.44.218.71 114.44.218.55 114.225.168.81 114.44.218.75