Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: None

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
IP Type Details Datetime
114.99.2.11 attackspam
Sep  1 13:26:43 shivevps sshd[27572]: Bad protocol version identification '\024' from 114.99.2.11 port 44790
...
2020-09-02 04:31:49
114.99.24.103 attackspambots
Email rejected due to spam filtering
2020-06-03 02:24:17
114.99.27.74 attackspambots
Sending SPAM email
2020-06-01 06:15:35
114.99.21.146 attack
Unauthorized IMAP connection attempt
2020-05-05 03:15:18
114.99.247.139 attackspam
Unauthorized connection attempt detected from IP address 114.99.247.139 to port 23 [T]
2020-04-11 20:10:43
114.99.22.89 attack
Lines containing failures of 114.99.22.89


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=114.99.22.89
2020-04-02 17:18:58
114.99.225.109 attackbotsspam
Mar 20 04:49:16 zimbra postfix/smtps/smtpd[21345]: lost connection after CONNECT from unknown[114.99.225.109]
Mar 20 04:50:25 zimbra postfix/smtps/smtpd[21346]: warning: unknown[114.99.225.109]: SASL LOGIN authentication failed: authentication failure
Mar 20 04:50:26 zimbra postfix/smtps/smtpd[21346]: lost connection after AUTH from unknown[114.99.225.109]
Mar 20 04:50:26 zimbra postfix/smtps/smtpd[21346]: disconnect from unknown[114.99.225.109] ehlo=1 auth=0/1 commands=1/2
...
2020-03-20 20:13:18
114.99.27.204 attackspambots
Feb 16 01:09:37 sd-53420 sshd\[29407\]: Invalid user yw from 114.99.27.204
Feb 16 01:09:37 sd-53420 sshd\[29407\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=114.99.27.204
Feb 16 01:09:39 sd-53420 sshd\[29407\]: Failed password for invalid user yw from 114.99.27.204 port 48984 ssh2
Feb 16 01:13:23 sd-53420 sshd\[29909\]: Invalid user rena from 114.99.27.204
Feb 16 01:13:23 sd-53420 sshd\[29909\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=114.99.27.204
...
2020-02-16 08:24:31
114.99.28.175 attackbots
Feb 11 16:48:18 MK-Soft-VM8 sshd[13753]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=114.99.28.175 
Feb 11 16:48:20 MK-Soft-VM8 sshd[13753]: Failed password for invalid user uzp from 114.99.28.175 port 47622 ssh2
...
2020-02-12 01:23:47
114.99.21.163 attackspambots
lfd: (smtpauth) Failed SMTP AUTH login from 114.99.21.163 (CN/China/-): 5 in the last 3600 secs - Tue Jun 19 13:07:46 2018
2020-02-07 06:22:06
114.99.2.253 attack
Unauthorized connection attempt detected from IP address 114.99.2.253 to port 6656 [T]
2020-01-30 19:21:40
114.99.23.221 attackbotsspam
Unauthorized connection attempt detected from IP address 114.99.23.221 to port 6656 [T]
2020-01-30 15:41:25
114.99.22.143 attackbots
Unauthorized connection attempt detected from IP address 114.99.22.143 to port 6656 [T]
2020-01-30 15:18:25
114.99.25.74 attack
Jan 26 00:07:37 pkdns2 sshd\[41380\]: Invalid user willie from 114.99.25.74Jan 26 00:07:39 pkdns2 sshd\[41380\]: Failed password for invalid user willie from 114.99.25.74 port 46914 ssh2Jan 26 00:09:02 pkdns2 sshd\[41454\]: Failed password for root from 114.99.25.74 port 55884 ssh2Jan 26 00:10:21 pkdns2 sshd\[41615\]: Invalid user papa from 114.99.25.74Jan 26 00:10:23 pkdns2 sshd\[41615\]: Failed password for invalid user papa from 114.99.25.74 port 36616 ssh2Jan 26 00:11:39 pkdns2 sshd\[41693\]: Invalid user minecraft from 114.99.25.74Jan 26 00:11:41 pkdns2 sshd\[41693\]: Failed password for invalid user minecraft from 114.99.25.74 port 45584 ssh2
...
2020-01-26 06:17:17
114.99.2.115 attack
2020-01-20 H=\(jFutEfTLlD\) \[114.99.2.115\] F=\<**REMOVED****REMOVED****REMOVED**_perl@**REMOVED**.de\> rejected RCPT \<462441161@qq.com\>: relay not permitted
2020-01-20 dovecot_login authenticator failed for \(uCh2rhk1k\) \[114.99.2.115\]: 535 Incorrect authentication data \(set_id=**REMOVED****REMOVED****REMOVED**_perl\)
2020-01-20 dovecot_login authenticator failed for \(WXxOoV\) \[114.99.2.115\]: 535 Incorrect authentication data \(set_id=**REMOVED****REMOVED****REMOVED**_perl\)
2020-01-21 06:33:15
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 114.99.2.148
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 45023
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;114.99.2.148.			IN	A

;; AUTHORITY SECTION:
.			329	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022030700 1800 900 604800 86400

;; Query time: 97 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Mar 08 01:04:32 CST 2022
;; MSG SIZE  rcvd: 105
Host info
Host 148.2.99.114.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 148.2.99.114.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
93.116.119.127 attackbotsspam
Unauthorized connection attempt detected from IP address 93.116.119.127 to port 445 [T]
2020-07-22 01:33:59
46.151.9.61 attack
Unauthorized connection attempt detected from IP address 46.151.9.61 to port 23 [T]
2020-07-22 01:40:10
13.68.247.181 attack
port scan and connect, tcp 1433 (ms-sql-s)
2020-07-22 01:44:46
92.118.160.49 attackbots
ET CINS Active Threat Intelligence Poor Reputation IP group 83 - port: 2484 proto: tcp cat: Misc Attackbytes: 60
2020-07-22 01:34:43
103.108.87.133 attackspambots
 TCP (SYN) 103.108.87.133:56701 -> port 7465, len 44
2020-07-22 01:13:10
122.155.212.244 attackspam
23921/tcp 24783/tcp 3118/tcp...
[2020-06-21/07-21]86pkt,34pt.(tcp)
2020-07-22 01:30:50
52.246.248.80 attackbotsspam
Unauthorized connection attempt detected from IP address 52.246.248.80 to port 1433
2020-07-22 01:15:18
13.72.82.73 attackbotsspam
Unauthorized connection attempt detected from IP address 13.72.82.73 to port 1433 [T]
2020-07-22 01:03:37
89.248.168.176 attackspambots
ET DROP Dshield Block Listed Source group 1 - port: 8182 proto: tcp cat: Misc Attackbytes: 60
2020-07-22 01:35:18
92.222.74.255 attackbots
Jul 21 17:58:37 santamaria sshd\[5391\]: Invalid user ashish from 92.222.74.255
Jul 21 17:58:37 santamaria sshd\[5391\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=92.222.74.255
Jul 21 17:58:39 santamaria sshd\[5391\]: Failed password for invalid user ashish from 92.222.74.255 port 47278 ssh2
...
2020-07-22 01:34:29
37.192.226.174 attack
Unauthorized connection attempt detected from IP address 37.192.226.174 to port 445 [T]
2020-07-22 01:41:58
13.75.186.128 attackbots
Unauthorized connection attempt detected from IP address 13.75.186.128 to port 1433 [T]
2020-07-22 01:22:27
185.234.52.223 attackspam
Unauthorized connection attempt detected from IP address 185.234.52.223 to port 9191 [T]
2020-07-22 01:28:34
49.247.208.185 attack
Jul 21 19:23:43 vm0 sshd[3544]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.247.208.185
Jul 21 19:23:45 vm0 sshd[3544]: Failed password for invalid user bet from 49.247.208.185 port 59550 ssh2
...
2020-07-22 01:39:26
187.174.237.26 attack
Unauthorized connection attempt detected from IP address 187.174.237.26 to port 445 [T]
2020-07-22 01:05:32

Recently Reported IPs

114.99.2.146 114.99.2.150 114.99.2.152 114.99.20.12
114.99.20.128 114.99.30.244 114.99.30.249 114.99.30.255
114.99.30.27 114.99.30.30 114.99.30.36 114.99.30.44
114.99.30.46 114.99.30.53 114.99.30.55 114.99.30.58
114.99.30.60 114.99.30.63 114.99.30.65 114.99.30.67