Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: China

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
IP Type Details Datetime
114.55.171.1 attack
SASL PLAIN auth failed: ruser=...
2020-06-02 07:38:08
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 114.55.171.138
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 19082
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;114.55.171.138.			IN	A

;; AUTHORITY SECTION:
.			99	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022031801 1800 900 604800 86400

;; Query time: 114 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Mar 19 10:51:52 CST 2022
;; MSG SIZE  rcvd: 107
Host info
Host 138.171.55.114.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 138.171.55.114.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
114.34.218.219 attack
FTP Brute-Force reported by Fail2Ban
2019-08-12 04:07:54
78.108.69.2 attackspambots
$f2bV_matches
2019-08-12 03:36:13
78.189.231.226 attackspambots
Automatic report - Port Scan Attack
2019-08-12 04:03:02
191.241.66.69 attack
proto=tcp  .  spt=49580  .  dpt=25  .     (listed on Blocklist de  Aug 11)     (622)
2019-08-12 04:09:06
82.64.25.207 attackspam
Aug 11 14:14:50 spiceship sshd\[41718\]: Invalid user pi from 82.64.25.207
...
2019-08-12 03:42:54
51.83.41.120 attack
Automatic report - Banned IP Access
2019-08-12 03:35:19
185.129.124.167 attackbotsspam
Automatic report - Port Scan Attack
2019-08-12 03:55:05
206.189.181.12 attackspam
Scanning random ports - tries to find possible vulnerable services
2019-08-12 04:20:50
46.19.43.36 attack
Caught in portsentry honeypot
2019-08-12 04:01:35
177.69.124.245 attackspam
proto=tcp  .  spt=36712  .  dpt=25  .     (listed on Blocklist de  Aug 11)     (628)
2019-08-12 03:58:26
107.180.121.57 attack
fail2ban honeypot
2019-08-12 04:04:55
59.63.60.119 attackspam
Brute force attempt
2019-08-12 03:57:02
142.93.33.62 attackbotsspam
Aug 11 22:26:14 yabzik sshd[13461]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.33.62
Aug 11 22:26:17 yabzik sshd[13461]: Failed password for invalid user gray from 142.93.33.62 port 33474 ssh2
Aug 11 22:30:07 yabzik sshd[14665]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.33.62
2019-08-12 03:44:22
177.69.237.49 attackbotsspam
Aug 11 22:28:53 yabzik sshd[14166]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=177.69.237.49
Aug 11 22:28:56 yabzik sshd[14166]: Failed password for invalid user york from 177.69.237.49 port 33994 ssh2
Aug 11 22:34:10 yabzik sshd[15757]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=177.69.237.49
2019-08-12 03:47:26
213.203.173.179 attackbots
Automatic report - Banned IP Access
2019-08-12 03:33:20

Recently Reported IPs

226.88.9.78 114.55.18.189 114.55.185.1 114.55.188.172
93.121.152.238 114.55.224.232 114.55.226.215 203.116.112.31
114.55.228.116 114.55.255.197 114.55.255.225 50.97.250.61
114.55.36.214 114.55.36.252 114.55.41.8 219.125.23.172
114.55.42.97 114.55.43.211 114.55.47.169 114.55.52.115