Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: China

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
IP Type Details Datetime
114.99.131.70 attackbotsspam
Unauthorized connection attempt detected from IP address 114.99.131.70 to port 6656 [T]
2020-01-27 07:04:48
114.99.131.226 attack
Unauthorized connection attempt detected from IP address 114.99.131.226 to port 6656 [T]
2020-01-27 05:35:42
114.99.131.60 attackbots
Unauthorized connection attempt detected from IP address 114.99.131.60 to port 6656 [T]
2020-01-27 04:11:06
114.99.131.199 attackbots
Forbidden directory scan :: 2019/09/28 22:26:34 [error] 1103#1103: *462338 access forbidden by rule, client: 114.99.131.199, server: [censored_1], request: "GET /.../server-stuff/sql-query-find-invalid-email-addresses HTTP/1.1", host: "www.[censored_1]"
2019-09-29 04:14:36
114.99.131.101 attack
Aug  8 23:49:47 localhost postfix/smtpd\[32014\]: warning: unknown\[114.99.131.101\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Aug  8 23:49:55 localhost postfix/smtpd\[32031\]: warning: unknown\[114.99.131.101\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Aug  8 23:50:06 localhost postfix/smtpd\[32014\]: warning: unknown\[114.99.131.101\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Aug  8 23:50:21 localhost postfix/smtpd\[32014\]: warning: unknown\[114.99.131.101\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Aug  8 23:50:29 localhost postfix/smtpd\[32031\]: warning: unknown\[114.99.131.101\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
...
2019-08-09 09:31:43
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 114.99.131.127
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 39288
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;114.99.131.127.			IN	A

;; AUTHORITY SECTION:
.			147	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022032900 1800 900 604800 86400

;; Query time: 66 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Mar 29 13:45:55 CST 2022
;; MSG SIZE  rcvd: 107
Host info
Host 127.131.99.114.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 127.131.99.114.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
159.203.0.156 attack
Port Scan: UDP/53
2019-09-25 08:12:37
47.222.201.44 attack
Port Scan: UDP/500
2019-09-25 08:31:07
93.179.69.53 attackspam
Attempts to deliver email spam by spoofing receiving hostname.
2019-09-25 08:28:28
177.132.210.16 attack
Port Scan: TCP/1588
2019-09-25 07:56:14
185.158.253.97 attackspambots
Port Scan: TCP/8080
2019-09-25 08:25:59
83.136.114.154 attackbotsspam
Port Scan: TCP/445
2019-09-25 08:17:47
185.243.182.58 attackspambots
Port Scan: TCP/25
2019-09-25 08:09:42
188.230.211.128 attackbots
Port Scan: TCP/5555
2019-09-25 08:09:25
162.216.119.74 attack
Port Scan: UDP/137
2019-09-25 07:57:28
119.52.17.151 attackbotsspam
Port Scan: TCP/23
2019-09-25 07:58:17
177.155.134.68 attackbots
Port Scan: TCP/445
2019-09-25 07:55:42
78.12.70.151 attackbots
Port Scan: TCP/8000
2019-09-25 08:18:33
98.152.242.210 attack
Port Scan: UDP/137
2019-09-25 08:28:09
88.253.79.133 attackbotsspam
Port Scan: TCP/84
2019-09-25 08:02:35
64.91.233.73 attackbots
Port Scan: TCP/445
2019-09-25 08:05:09

Recently Reported IPs

114.99.130.193 114.99.131.234 114.99.17.50 114.99.18.147
114.99.19.245 114.99.20.107 115.112.175.12 21.1.105.202
149.28.142.233 151.149.46.128 203.158.27.70 159.205.144.103
178.37.172.177 25.254.119.19 147.161.185.95 173.248.248.94
81.165.214.224 250.62.1.134 27.241.174.89 201.169.67.163