Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Republic of China (ROC)

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 114.47.54.108
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 37375
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;114.47.54.108.			IN	A

;; AUTHORITY SECTION:
.			415	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022020702 1800 900 604800 86400

;; Query time: 20 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Feb 08 11:23:44 CST 2022
;; MSG SIZE  rcvd: 106
Host info
108.54.47.114.in-addr.arpa domain name pointer 114-47-54-108.dynamic-ip.hinet.net.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
108.54.47.114.in-addr.arpa	name = 114-47-54-108.dynamic-ip.hinet.net.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
46.101.61.207 attackbots
46.101.61.207 - - [27/Jul/2020:16:01:42 +0200] "GET /wp-login.php HTTP/1.1" 200 6310 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
46.101.61.207 - - [27/Jul/2020:16:01:43 +0200] "POST /wp-login.php HTTP/1.1" 200 6561 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
46.101.61.207 - - [27/Jul/2020:16:01:43 +0200] "POST /xmlrpc.php HTTP/1.1" 200 427 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
2020-07-28 02:19:40
221.228.109.146 attack
Jul 27 18:14:32 Ubuntu-1404-trusty-64-minimal sshd\[15934\]: Invalid user fujino from 221.228.109.146
Jul 27 18:14:32 Ubuntu-1404-trusty-64-minimal sshd\[15934\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=221.228.109.146
Jul 27 18:14:34 Ubuntu-1404-trusty-64-minimal sshd\[15934\]: Failed password for invalid user fujino from 221.228.109.146 port 53010 ssh2
Jul 27 18:28:03 Ubuntu-1404-trusty-64-minimal sshd\[25192\]: Invalid user matt from 221.228.109.146
Jul 27 18:28:03 Ubuntu-1404-trusty-64-minimal sshd\[25192\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=221.228.109.146
2020-07-28 02:02:36
49.213.181.91 attackspam
firewall-block, port(s): 445/tcp
2020-07-28 02:16:29
188.166.1.95 attack
[ssh] SSH attack
2020-07-28 02:11:11
87.246.7.74 attackspam
Over 400 attempts.
2020-07-28 01:42:27
37.115.214.7 attack
port scan and connect, tcp 22 (ssh)
2020-07-28 02:20:39
41.39.89.171 attackspambots
1595850629 - 07/27/2020 13:50:29 Host: 41.39.89.171/41.39.89.171 Port: 445 TCP Blocked
2020-07-28 01:53:27
173.236.176.107 attackspam
173.236.176.107 - - [27/Jul/2020:13:32:38 +0100] "POST /wp-login.php HTTP/1.1" 200 1950 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
173.236.176.107 - - [27/Jul/2020:13:32:39 +0100] "POST /wp-login.php HTTP/1.1" 200 1907 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
173.236.176.107 - - [27/Jul/2020:13:32:41 +0100] "POST /wp-login.php HTTP/1.1" 200 1909 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
...
2020-07-28 02:03:09
45.67.234.74 attackbots
From adminbounce@segseguro.live Mon Jul 27 08:50:08 2020
Received: from segmx10.segseguro.live ([45.67.234.74]:42780)
2020-07-28 02:06:44
80.82.65.74 attackspambots
Persistent port scanning [15 denied]
2020-07-28 02:20:22
74.6.128.37 attackbotsspam
Received: from 10.217.150.12
 by atlas103.free.mail.ne1.yahoo.com with HTTP; Mon, 27 Jul 2020 08:51:49 +0000
Return-Path: 
Received: from 74.6.128.37 (EHLO sonic304-14.consmr.mail.bf2.yahoo.com)
 by 10.217.150.12 with SMTPs; Mon, 27 Jul 2020 08:51:49 +0000
X-Originating-Ip: [74.6.128.37]
Received-SPF: none (domain of nuedsend.online does not designate permitted sender hosts)
Authentication-Results: atlas103.free.mail.ne1.yahoo.com;
 dkim=pass header.i=@yahoo.com header.s=s2048;
 spf=none smtp.mailfrom=nuedsend.online;
 dmarc=unknown
2020-07-28 02:02:05
189.47.215.72 attackbotsspam
1595850633 - 07/27/2020 13:50:33 Host: 189.47.215.72/189.47.215.72 Port: 445 TCP Blocked
2020-07-28 01:49:15
103.216.239.125 attackbots
firewall-block, port(s): 445/tcp
2020-07-28 02:11:36
163.172.42.123 attack
"XSS Attack Detected via libinjection - Matched Data: XSS data found within ARGS_NAMES:
2020-07-28 02:03:21
113.193.25.98 attack
malicious Brute-Force reported by https://www.patrick-binder.de
...
2020-07-28 02:09:29

Recently Reported IPs

187.162.172.47 83.239.108.174 173.89.4.133 36.79.144.23
114.119.146.70 202.89.73.130 58.16.14.207 24.138.48.141
187.190.133.236 45.56.98.226 35.205.6.123 176.195.174.213
151.251.44.52 187.167.68.198 170.239.138.91 24.69.138.178
43.132.241.214 197.49.54.209 220.143.76.107 109.236.53.112