Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Bengbu

Region: Anhui

Country: China

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 114.97.116.34
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 54662
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;114.97.116.34.			IN	A

;; AUTHORITY SECTION:
.			522	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022070200 1800 900 604800 86400

;; Query time: 16 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Jul 02 16:14:21 CST 2022
;; MSG SIZE  rcvd: 106
Host info
Host 34.116.97.114.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 34.116.97.114.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
46.94.39.225 attackbotsspam
Automatic report - Web App Attack
2019-07-05 17:23:47
106.12.194.234 attack
Jul  5 11:00:06 MK-Soft-Root1 sshd\[24448\]: Invalid user tatiana from 106.12.194.234 port 48120
Jul  5 11:00:06 MK-Soft-Root1 sshd\[24448\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.194.234
Jul  5 11:00:09 MK-Soft-Root1 sshd\[24448\]: Failed password for invalid user tatiana from 106.12.194.234 port 48120 ssh2
...
2019-07-05 17:26:56
107.170.202.101 attackspambots
Portscan or hack attempt detected by psad/fwsnort
2019-07-05 17:56:59
190.197.64.49 attackbots
IMAP brute force
...
2019-07-05 17:16:10
91.210.178.161 attackspam
Scanning and Vuln Attempts
2019-07-05 17:49:12
198.108.67.109 attack
MultiHost/MultiPort Probe, Scan, Hack -
2019-07-05 17:20:38
82.193.101.158 attack
[portscan] Port scan
2019-07-05 17:55:48
83.223.124.15 attack
Scanning and Vuln Attempts
2019-07-05 18:02:14
5.173.169.47 attackspam
$f2bV_matches
2019-07-05 17:28:37
125.94.36.90 attackspam
/TP/public/index.php   /TP/index.php    /thinkphp/html/public/index.php   /html/public/index.php   /public/index.php   /TP/html/public/index.php  /elrekt.php
2019-07-05 18:09:18
77.247.181.162 attackspambots
$f2bV_matches
2019-07-05 17:34:56
67.205.135.127 attackbotsspam
Jul  5 09:51:42 mail sshd\[20199\]: Failed password for invalid user noel from 67.205.135.127 port 49536 ssh2
Jul  5 10:08:08 mail sshd\[20378\]: Invalid user lloyd from 67.205.135.127 port 48324
Jul  5 10:08:08 mail sshd\[20378\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=67.205.135.127
...
2019-07-05 17:11:19
187.214.7.28 attackbotsspam
Honeypot attack, port: 445, PTR: dsl-187-214-7-28-dyn.prod-infinitum.com.mx.
2019-07-05 18:15:08
207.46.13.88 attackspambots
Automatic report - Web App Attack
2019-07-05 17:53:01
212.7.220.134 attackbotsspam
Jul  5 09:53:15 srv1 postfix/smtpd[20490]: connect from spoon.gratefulhope.com[212.7.220.134]
Jul x@x
Jul  5 09:53:20 srv1 postfix/smtpd[20490]: disconnect from spoon.gratefulhope.com[212.7.220.134]
Jul  5 09:53:27 srv1 postfix/smtpd[20493]: connect from spoon.gratefulhope.com[212.7.220.134]
Jul x@x
Jul  5 09:53:33 srv1 postfix/smtpd[20493]: disconnect from spoon.gratefulhope.com[212.7.220.134]


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=212.7.220.134
2019-07-05 17:13:58

Recently Reported IPs

114.42.117.188 116.1.7.97 114.35.155.115 114.97.84.60
45.197.191.51 115.21.206.234 116.8.115.80 116.8.115.55
117.69.159.105 117.94.34.97 117.197.0.106 117.223.133.231
114.35.170.197 116.8.114.137 172.4.74.9 116.8.114.213
119.234.37.153 114.42.57.23 116.8.114.97 114.97.85.130