Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: China

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 114.99.36.180
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 42659
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;114.99.36.180.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025020300 1800 900 604800 86400

;; Query time: 16 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Feb 03 16:25:11 CST 2025
;; MSG SIZE  rcvd: 106
Host info
Host 180.36.99.114.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 180.36.99.114.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
162.243.129.7 attack
SSH login attempts with user root at 2020-03-12.
2020-03-17 06:27:29
117.71.170.57 attackbots
465/tcp 465/tcp 465/tcp
[2020-03-16]3pkt
2020-03-17 06:23:44
64.227.35.131 attackbots
Invalid user zhangbo from 64.227.35.131 port 32832
2020-03-17 06:36:25
189.50.44.2 attackspambots
SSH login attempts with user root at 2020-03-12.
2020-03-17 06:03:55
202.58.238.30 attack
port scan and connect, tcp 1433 (ms-sql-s)
2020-03-17 06:12:26
187.147.151.109 attackbotsspam
Unauthorized connection attempt from IP address 187.147.151.109 on Port 445(SMB)
2020-03-17 06:04:23
142.4.204.122 attackbotsspam
Mar 16 18:04:58 meumeu sshd[31872]: Failed password for root from 142.4.204.122 port 42166 ssh2
Mar 16 18:12:58 meumeu sshd[767]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.4.204.122 
Mar 16 18:12:59 meumeu sshd[767]: Failed password for invalid user pietre from 142.4.204.122 port 53356 ssh2
...
2020-03-17 06:37:56
178.46.210.48 attackspam
23/tcp
[2020-03-16]1pkt
2020-03-17 06:27:03
91.210.224.130 attack
SSH Brute-Forcing (server2)
2020-03-17 06:17:52
5.249.164.6 attackspam
Mar 16 22:49:06 mail postfix/smtpd\[14099\]: warning: unknown\[5.249.164.6\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6\
Mar 16 22:49:10 mail postfix/smtpd\[14082\]: warning: unknown\[5.249.164.6\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6\
Mar 16 22:50:14 mail postfix/smtpd\[14220\]: warning: unknown\[5.249.164.6\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6\
Mar 16 23:21:16 mail postfix/smtpd\[14336\]: warning: unknown\[5.249.164.6\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6\
Mar 16 23:21:16 mail postfix/smtpd\[14902\]: warning: unknown\[5.249.164.6\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6\
2020-03-17 06:34:35
191.184.28.67 attackspambots
61672/udp
[2020-03-16]1pkt
2020-03-17 06:29:37
3.86.154.52 attackspambots
1433/tcp
[2020-03-16]1pkt
2020-03-17 06:05:56
172.86.125.164 attackspam
Mar 16 20:04:26 vps sshd[15727]: Failed password for root from 172.86.125.164 port 38508 ssh2
Mar 16 20:30:06 vps sshd[17236]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=172.86.125.164 
Mar 16 20:30:07 vps sshd[17236]: Failed password for invalid user usuario from 172.86.125.164 port 51884 ssh2
...
2020-03-17 06:17:33
165.50.68.237 attackbots
445/tcp
[2020-03-16]1pkt
2020-03-17 06:36:46
51.68.181.57 attackbots
Port probing on unauthorized port 8789
2020-03-17 06:27:55

Recently Reported IPs

150.134.136.71 231.140.31.6 226.109.24.128 135.230.241.191
6.120.34.88 205.79.148.92 60.28.197.6 49.110.36.182
236.9.109.193 227.42.138.174 208.27.36.169 179.150.180.236
173.20.192.232 171.127.83.153 52.251.90.239 213.68.31.190
176.210.149.142 228.160.157.173 245.86.63.95 115.113.43.78