Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Korea Republic of

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 117.111.13.214
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 52999
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;117.111.13.214.			IN	A

;; AUTHORITY SECTION:
.			99	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022021301 1800 900 604800 86400

;; Query time: 58 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Feb 14 06:48:54 CST 2022
;; MSG SIZE  rcvd: 107
Host info
Host 214.13.111.117.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 214.13.111.117.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
91.121.30.186 attackspam
2020-09-07 13:46:37 server sshd[56053]: Failed password for invalid user root from 91.121.30.186 port 49293 ssh2
2020-09-08 09:12:28
45.142.120.166 attackbots
2020-09-08 07:03:51 auth_plain authenticator failed for (User) [45.142.120.166]: 535 Incorrect authentication data (set_id=store.mail@com.ua)
2020-09-08 07:04:36 auth_plain authenticator failed for (User) [45.142.120.166]: 535 Incorrect authentication data (set_id=notes@com.ua)
...
2020-09-08 12:07:36
168.194.13.4 attack
Sep  8 01:06:57 hosting sshd[1776]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=168.194.13.4  user=root
Sep  8 01:06:58 hosting sshd[1776]: Failed password for root from 168.194.13.4 port 41616 ssh2
...
2020-09-08 12:25:14
109.237.134.42 attack
http://www.cnc-loft.de
Received:from EdizYaziciPC (unknown [185.135.108.189]) by alfa3085.alfahosting-server.de
Subject: Anfrage Drehen, Fräsen, Lasern, Schweissen
2020-09-08 12:10:11
116.88.168.250 attack
250.168.88.116.starhub.net.sg
2020-09-08 12:18:24
185.232.30.130 attackbotsspam
=Multiport scan 209 ports : 1018(x5) 1111(x7) 1218(x8) 2001(x7) 2048 2222(x7) 3199(x6) 3200(x5) 3289(x7) 3300(x9) 3322(x2) 3344(x9) 3366(x8) 3370(x5) 3371(x4) 3372(x7) 3373(x6) 3374(x4) 3375(x6) 3376(x4) 3377(x10) 3378(x5) 3379(x6) 3380(x11) 3382(x13) 3385(x11) 3386(x10) 3387(x12) 3388(x26) 3391(x35) 3392(x23) 3393(x24) 3394(x20) 3395(x11) 3396(x4) 3397(x5) 3398(x4) 3399(x24) 3400(x17) 3456(x7) 3500(x7) 3501(x7) 3502(x4) 3503(x5) 3504(x5) 3505(x5) 3506(x3) 3507(x7) 3508(x6) 3509(x6) 3510(x5) 3987(x4) 3988(x5) 3989(x5) 3990(x5) 3991(x6) 3992(x7) 3993(x5) 3994(x6) 3995(x7) 3996(x4) 3997(x5) 3998(x5) 4000(x10) 4001(x11) 4002(x8) 4003(x4) 4009(x4) 4040(x5) 4096 4444(x17) 4489(x12) 5000(x10) 5001(x5) 5002(x5) 5004(x6) 5005(x8) 5006(x7) 5007(x8) 5008(x4) 5009(x5) 5010(x8) 5020(x5) 5050(x7) 5100(x7) 5111(x4) 5188(x6) 5200(x4) 5222(x5) 5300(x6) 5333(x6) 5389(x8) 5444(x7) 5555(x14) 5589(x12) 5603(x5) 5650(x5) 5656(x5) 5660(x4) 5665(x4) 5700(x7) 5705(x5) 5707(x4) 5750(x4) 5757(x6) 5775(x5) 5777(x....
2020-09-08 09:01:13
222.186.150.123 attack
Brute force attempt
2020-09-08 12:13:30
111.93.235.74 attackspam
SSH Brute-Force attacks
2020-09-08 12:21:40
49.234.126.35 attack
Automatic report BANNED IP
2020-09-08 12:19:20
91.144.162.118 attackbots
Sep  7 18:47:20 ovpn sshd\[14882\]: Invalid user ps3 from 91.144.162.118
Sep  7 18:47:20 ovpn sshd\[14882\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=91.144.162.118
Sep  7 18:47:21 ovpn sshd\[14882\]: Failed password for invalid user ps3 from 91.144.162.118 port 40444 ssh2
Sep  7 19:03:50 ovpn sshd\[19011\]: Invalid user lreyes from 91.144.162.118
Sep  7 19:03:50 ovpn sshd\[19011\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=91.144.162.118
2020-09-08 12:10:43
162.243.237.90 attackspambots
(sshd) Failed SSH login from 162.243.237.90 (US/United States/-): 5 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: Sep  7 23:25:09 optimus sshd[14200]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=162.243.237.90  user=root
Sep  7 23:25:11 optimus sshd[14200]: Failed password for root from 162.243.237.90 port 51291 ssh2
Sep  7 23:34:30 optimus sshd[17412]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=162.243.237.90  user=root
Sep  7 23:34:33 optimus sshd[17412]: Failed password for root from 162.243.237.90 port 53955 ssh2
Sep  7 23:39:26 optimus sshd[19005]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=162.243.237.90  user=root
2020-09-08 12:19:42
106.12.17.214 attackspambots
Port Scan/VNC login attempt
...
2020-09-08 09:11:01
112.85.42.238 attack
2020-09-08T03:18:59.807331abusebot-2.cloudsearch.cf sshd[10808]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.85.42.238  user=root
2020-09-08T03:19:02.147254abusebot-2.cloudsearch.cf sshd[10808]: Failed password for root from 112.85.42.238 port 25628 ssh2
2020-09-08T03:19:04.179189abusebot-2.cloudsearch.cf sshd[10808]: Failed password for root from 112.85.42.238 port 25628 ssh2
2020-09-08T03:18:59.807331abusebot-2.cloudsearch.cf sshd[10808]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.85.42.238  user=root
2020-09-08T03:19:02.147254abusebot-2.cloudsearch.cf sshd[10808]: Failed password for root from 112.85.42.238 port 25628 ssh2
2020-09-08T03:19:04.179189abusebot-2.cloudsearch.cf sshd[10808]: Failed password for root from 112.85.42.238 port 25628 ssh2
2020-09-08T03:18:59.807331abusebot-2.cloudsearch.cf sshd[10808]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruse
...
2020-09-08 12:16:20
61.177.172.142 attackbots
Sep  8 02:01:04 rocket sshd[6971]: Failed password for root from 61.177.172.142 port 50321 ssh2
Sep  8 02:01:18 rocket sshd[6971]: error: maximum authentication attempts exceeded for root from 61.177.172.142 port 50321 ssh2 [preauth]
...
2020-09-08 09:05:20
104.236.228.46 attackspam
Sep  8 02:53:29 abendstille sshd\[26505\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.236.228.46  user=root
Sep  8 02:53:31 abendstille sshd\[26505\]: Failed password for root from 104.236.228.46 port 44146 ssh2
Sep  8 02:56:32 abendstille sshd\[29512\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.236.228.46  user=root
Sep  8 02:56:34 abendstille sshd\[29512\]: Failed password for root from 104.236.228.46 port 36272 ssh2
Sep  8 02:59:25 abendstille sshd\[32041\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.236.228.46  user=root
...
2020-09-08 12:23:00

Recently Reported IPs

117.111.11.145 117.111.17.65 117.111.24.53 117.111.19.31
117.111.25.45 117.111.23.168 117.111.26.50 117.111.28.161
117.111.5.166 117.12.37.221 117.12.39.54 117.12.46.19
117.12.47.129 117.13.169.164 117.13.169.50 117.13.169.92
117.136.117.66 117.135.81.92 117.13.226.41 117.139.36.182