Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: China

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
IP Type Details Datetime
114.99.5.215 attackspam
Automatic report - Banned IP Access
2020-03-21 08:33:19
114.99.5.47 attack
MAIL: User Login Brute Force Attempt
2020-03-12 06:35:12
114.99.51.25 attack
"Account brute force using dictionary attack against Exchange Online"
2019-08-06 03:58:21
114.99.51.25 attackspam
failed_logins
2019-07-12 06:59:07
114.99.51.25 attack
imap-login: Disconnected \(auth failed, 1 attempts in 5
2019-07-03 00:22:20
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 114.99.5.145
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 22916
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;114.99.5.145.			IN	A

;; AUTHORITY SECTION:
.			118	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022030501 1800 900 604800 86400

;; Query time: 44 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Mar 06 12:26:39 CST 2022
;; MSG SIZE  rcvd: 105
Host info
Host 145.5.99.114.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 145.5.99.114.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
202.169.248.174 attackbotsspam
Spamassassin_202.169.248.174
2019-11-11 08:52:29
185.156.73.52 attack
11/10/2019-19:51:39.439191 185.156.73.52 Protocol: 6 ET SCAN NMAP -sS window 1024
2019-11-11 08:52:52
177.207.249.96 attackbots
ylmf-pc
2019-11-11 08:39:30
50.253.211.61 attack
Spamassassin_50.253.211.61
2019-11-11 09:00:02
106.53.72.83 attackspambots
Fail2Ban - SSH Bruteforce Attempt
2019-11-11 08:44:59
183.107.101.238 attackspam
Nov 11 02:18:14 docs sshd\[38814\]: Invalid user depeche from 183.107.101.238Nov 11 02:18:16 docs sshd\[38814\]: Failed password for invalid user depeche from 183.107.101.238 port 56770 ssh2Nov 11 02:22:24 docs sshd\[38875\]: Invalid user lcwl80041246 from 183.107.101.238Nov 11 02:22:26 docs sshd\[38875\]: Failed password for invalid user lcwl80041246 from 183.107.101.238 port 37798 ssh2Nov 11 02:26:25 docs sshd\[38940\]: Invalid user carfa from 183.107.101.238Nov 11 02:26:27 docs sshd\[38940\]: Failed password for invalid user carfa from 183.107.101.238 port 47060 ssh2
...
2019-11-11 08:47:49
77.120.163.103 attack
Spamassassin_77.120.163.103
2019-11-11 09:04:44
213.109.235.231 attackspambots
Spamassassin_213.109.235.231
2019-11-11 08:49:03
187.92.175.52 attackbotsspam
Spamassassin_187.92.175.52
2019-11-11 08:53:54
194.87.238.29 attack
Nov 11 02:44:52 sauna sshd[121169]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=194.87.238.29
Nov 11 02:44:54 sauna sshd[121169]: Failed password for invalid user webmaster from 194.87.238.29 port 44226 ssh2
...
2019-11-11 08:58:02
142.44.243.161 attackspambots
MultiHost/MultiPort Probe, Scan, Hack -
2019-11-11 09:03:45
201.91.194.218 attackspam
Spamassassin_201.91.194.218
2019-11-11 08:55:17
222.73.236.95 attackbotsspam
scan r
2019-11-11 08:31:39
118.194.132.112 attack
" "
2019-11-11 08:39:48
80.82.78.100 attack
firewall-block, port(s): 49/udp, 1541/udp, 6881/udp
2019-11-11 09:04:19

Recently Reported IPs

114.99.31.138 114.99.5.146 114.99.5.149 22.22.129.22
114.99.5.154 114.99.5.158 114.99.5.16 114.99.5.160
114.99.5.163 114.99.5.164 114.99.5.165 114.99.5.166
114.99.5.168 114.99.5.170 114.99.5.172 114.99.5.175
114.99.5.177 114.99.5.178 114.99.5.18 114.99.5.180