Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: China

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 114.92.45.126
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 44029
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;114.92.45.126.			IN	A

;; AUTHORITY SECTION:
.			296	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022030501 1800 900 604800 86400

;; Query time: 74 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Mar 06 11:10:06 CST 2022
;; MSG SIZE  rcvd: 106
Host info
Host 126.45.92.114.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 126.45.92.114.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
194.87.138.35 attack
Brute-Force reported by Fail2Ban
2020-06-22 03:15:21
13.78.29.8 attackbotsspam
spam (f2b h2)
2020-06-22 03:34:34
77.185.195.48 attackspam
Netgear DGN Device Remote Command Execution Vulnerability , PTR: x4db9c330.dyn.telefonica.de.
2020-06-22 03:32:25
157.230.216.233 attackbotsspam
Invalid user guest from 157.230.216.233 port 57304
2020-06-22 03:02:38
79.133.201.82 attack
 TCP (SYN) 79.133.201.82:40481 -> port 15283, len 44
2020-06-22 03:13:53
193.228.91.11 attack
$f2bV_matches | Triggered by Fail2Ban at Vostok web server
2020-06-22 03:33:22
157.230.235.233 attackspambots
Jun 21 15:36:34 santamaria sshd\[11337\]: Invalid user smb from 157.230.235.233
Jun 21 15:36:34 santamaria sshd\[11337\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.230.235.233
Jun 21 15:36:35 santamaria sshd\[11337\]: Failed password for invalid user smb from 157.230.235.233 port 46796 ssh2
...
2020-06-22 03:19:31
62.97.65.190 attackbotsspam
HTTP/80/443/8080 Probe, Hack -
2020-06-22 03:29:19
152.136.106.94 attackbotsspam
Jun 21 15:39:52 gestao sshd[25648]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=152.136.106.94 
Jun 21 15:39:54 gestao sshd[25648]: Failed password for invalid user deployer from 152.136.106.94 port 54940 ssh2
Jun 21 15:44:07 gestao sshd[25693]: Failed password for root from 152.136.106.94 port 43334 ssh2
...
2020-06-22 03:27:15
180.76.53.88 attackspambots
$f2bV_matches
2020-06-22 03:32:03
1.71.129.108 attackbots
Jun 21 06:23:40 pi sshd[2781]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=1.71.129.108 
Jun 21 06:23:42 pi sshd[2781]: Failed password for invalid user gandalf from 1.71.129.108 port 44146 ssh2
2020-06-22 03:12:20
49.36.60.92 attack
IP 49.36.60.92 attacked honeypot on port: 1433 at 6/21/2020 5:10:27 AM
2020-06-22 03:05:16
51.83.74.126 attackspam
$f2bV_matches
2020-06-22 03:25:46
72.82.142.116 attackbots
'Fail2Ban'
2020-06-22 03:04:39
95.156.163.136 attackbotsspam
1592765105 - 06/21/2020 20:45:05 Host: 95.156.163.136/95.156.163.136 Port: 445 TCP Blocked
2020-06-22 03:21:15

Recently Reported IPs

114.92.246.210 114.92.89.162 114.92.91.9 114.92.254.248
114.92.97.83 114.92.83.247 114.92.98.107 114.93.101.122
114.93.10.172 114.92.99.26 114.93.100.214 114.93.107.10
114.226.35.190 114.93.120.26 114.93.12.55 114.93.140.249
114.93.160.151 114.93.14.29 114.93.126.78 114.93.161.114