Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: China

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
IP Type Details Datetime
114.99.22.89 attack
Lines containing failures of 114.99.22.89


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=114.99.22.89
2020-04-02 17:18:58
114.99.225.109 attackbotsspam
Mar 20 04:49:16 zimbra postfix/smtps/smtpd[21345]: lost connection after CONNECT from unknown[114.99.225.109]
Mar 20 04:50:25 zimbra postfix/smtps/smtpd[21346]: warning: unknown[114.99.225.109]: SASL LOGIN authentication failed: authentication failure
Mar 20 04:50:26 zimbra postfix/smtps/smtpd[21346]: lost connection after AUTH from unknown[114.99.225.109]
Mar 20 04:50:26 zimbra postfix/smtps/smtpd[21346]: disconnect from unknown[114.99.225.109] ehlo=1 auth=0/1 commands=1/2
...
2020-03-20 20:13:18
114.99.22.143 attackbots
Unauthorized connection attempt detected from IP address 114.99.22.143 to port 6656 [T]
2020-01-30 15:18:25
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 114.99.22.244
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 780
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;114.99.22.244.			IN	A

;; AUTHORITY SECTION:
.			348	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022030501 1800 900 604800 86400

;; Query time: 22 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Mar 06 12:22:41 CST 2022
;; MSG SIZE  rcvd: 106
Host info
Host 244.22.99.114.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 244.22.99.114.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
110.87.106.196 attack
Invalid user admin from 110.87.106.196 port 9328
2019-09-13 10:53:49
218.92.0.210 attack
Sep 13 03:06:28 game-panel sshd[29471]: Failed password for root from 218.92.0.210 port 42168 ssh2
Sep 13 03:08:06 game-panel sshd[29505]: Failed password for root from 218.92.0.210 port 62771 ssh2
2019-09-13 11:11:08
180.182.47.132 attackspam
Invalid user benson from 180.182.47.132 port 32982
2019-09-13 10:42:21
182.61.181.138 attackspam
Invalid user teste from 182.61.181.138 port 36700
2019-09-13 11:20:07
61.147.50.29 attackspambots
Invalid user service from 61.147.50.29 port 62680
2019-09-13 11:03:14
190.52.128.8 attackbotsspam
Invalid user server from 190.52.128.8 port 41546
2019-09-13 10:40:53
117.0.35.153 attackspam
Invalid user admin from 117.0.35.153 port 50885
2019-09-13 10:51:31
70.89.88.3 attack
Invalid user git from 70.89.88.3 port 38595
2019-09-13 11:01:36
89.36.220.145 attack
F2B jail: sshd. Time: 2019-09-13 04:46:12, Reported by: VKReport
2019-09-13 10:58:35
23.92.225.228 attack
Invalid user cactiuser from 23.92.225.228 port 42703
2019-09-13 11:09:01
125.99.58.98 attack
Sep 13 03:58:01 meumeu sshd[25899]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=125.99.58.98 
Sep 13 03:58:03 meumeu sshd[25899]: Failed password for invalid user admin from 125.99.58.98 port 37264 ssh2
Sep 13 03:58:06 meumeu sshd[25899]: Failed password for invalid user admin from 125.99.58.98 port 37264 ssh2
Sep 13 03:58:09 meumeu sshd[25899]: Failed password for invalid user admin from 125.99.58.98 port 37264 ssh2
...
2019-09-13 10:48:55
125.67.237.251 attackspambots
Invalid user test from 125.67.237.251 port 46714
2019-09-13 10:49:34
211.22.222.251 attackbotsspam
Invalid user hadoop from 211.22.222.251 port 55259
2019-09-13 10:38:13
124.156.103.34 attack
Invalid user test from 124.156.103.34 port 50514
2019-09-13 10:49:58
165.22.218.7 attackbotsspam
Invalid user fake from 165.22.218.7 port 41664
2019-09-13 11:22:17

Recently Reported IPs

114.99.22.243 114.99.22.246 114.99.22.87 114.99.234.102
117.242.38.36 117.242.38.52 117.242.38.252 117.242.38.43
117.242.38.49 117.242.38.32 117.242.38.40 117.242.38.30
117.242.38.4 117.242.38.55 117.242.38.46 117.242.38.64
114.99.234.105 117.242.38.60 117.242.38.62 117.242.38.57