Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Singapore

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 116.14.228.130
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 10021
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;116.14.228.130.			IN	A

;; AUTHORITY SECTION:
.			402	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022020700 1800 900 604800 86400

;; Query time: 64 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Feb 07 20:31:19 CST 2022
;; MSG SIZE  rcvd: 107
Host info
130.228.14.116.in-addr.arpa domain name pointer bb116-14-228-130.singnet.com.sg.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
130.228.14.116.in-addr.arpa	name = bb116-14-228-130.singnet.com.sg.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
202.4.47.123 attack
Email rejected due to spam filtering
2020-03-10 05:40:43
199.115.114.65 attackbotsspam
May 29 18:56:20 ms-srv sshd[25761]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=199.115.114.65
May 29 18:56:23 ms-srv sshd[25761]: Failed password for invalid user zabbix from 199.115.114.65 port 45212 ssh2
2020-03-10 05:29:46
178.171.90.80 attack
Chat Spam
2020-03-10 05:28:06
199.192.24.70 attack
Feb 18 01:31:19 ms-srv sshd[22595]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=199.192.24.70
Feb 18 01:31:21 ms-srv sshd[22595]: Failed password for invalid user stuart from 199.192.24.70 port 59262 ssh2
2020-03-10 05:14:45
112.167.234.230 attack
Jan 28 16:27:33 woltan sshd[29764]: Failed password for invalid user teamspeak from 112.167.234.230 port 56122 ssh2
2020-03-10 05:53:43
178.171.108.191 attackspam
Chat Spam
2020-03-10 05:27:35
199.244.88.131 attackspam
Bad web bot already banned
2020-03-10 05:34:24
199.115.125.234 attack
Oct 31 03:34:18 ms-srv sshd[59531]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=199.115.125.234
Oct 31 03:34:19 ms-srv sshd[59531]: Failed password for invalid user bai from 199.115.125.234 port 39663 ssh2
2020-03-10 05:27:22
45.86.74.40 attackspambots
Portscan or hack attempt detected by psad/fwsnort
2020-03-10 05:30:32
112.186.112.211 attackspam
Dec  8 22:04:18 woltan sshd[22714]: Failed password for daemon from 112.186.112.211 port 41524 ssh2
2020-03-10 05:36:21
123.31.41.20 attackspam
Mar  9 17:08:19 NPSTNNYC01T sshd[9210]: Failed password for root from 123.31.41.20 port 37579 ssh2
Mar  9 17:13:55 NPSTNNYC01T sshd[9543]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=123.31.41.20
Mar  9 17:13:57 NPSTNNYC01T sshd[9543]: Failed password for invalid user 0 from 123.31.41.20 port 62346 ssh2
...
2020-03-10 05:22:49
61.38.37.74 attackspam
Mar  9 22:13:59 host sshd[1559]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.38.37.74  user=root
Mar  9 22:14:01 host sshd[1559]: Failed password for root from 61.38.37.74 port 43518 ssh2
...
2020-03-10 05:17:28
198.50.197.223 attack
Jan 28 06:17:34 ms-srv sshd[48073]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=198.50.197.223  user=root
Jan 28 06:17:36 ms-srv sshd[48073]: Failed password for invalid user root from 198.50.197.223 port 50601 ssh2
2020-03-10 05:54:21
188.166.251.156 attackbotsspam
Mar  9 14:36:15 mockhub sshd[12104]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.166.251.156
Mar  9 14:36:17 mockhub sshd[12104]: Failed password for invalid user passwd12345g from 188.166.251.156 port 36140 ssh2
...
2020-03-10 05:39:57
112.171.248.197 attackspambots
Dec  5 11:28:01 woltan sshd[10731]: Failed password for root from 112.171.248.197 port 43541 ssh2
2020-03-10 05:44:34

Recently Reported IPs

76.168.101.172 88.130.218.126 118.76.43.200 178.151.179.34
103.53.76.51 197.234.13.85 73.28.172.41 197.50.52.53
185.221.253.250 67.205.156.215 54.94.249.0 105.159.138.233
81.193.7.181 14.238.130.251 180.252.118.22 45.191.204.235
203.218.61.96 120.85.114.29 185.49.97.121 69.16.157.29