Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: None

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
IP Type Details Datetime
117.14.113.141 attack
The IP has triggered Cloudflare WAF. CF-Ray: 543664407c06e7f5 | WAF_Rule_ID: 1025440 | WAF_Kind: firewall | CF_Action: challenge | Country: CN | CF_IPClass: noRecord | Protocol: HTTP/1.1 | Method: GET | Host: api.skk.moe | User-Agent: Mozilla/5.0 (iPad; CPU OS 9_1 like Mac OS X) AppleWebKit/601.1.46 (KHTML, like Gecko) Version/9.0 Mobile/13B143 Safari/601.1 | CF_DC: LAX. Report generated by Cloudflare-WAF-to-AbuseIPDB (https://github.com/SukkaW/Cloudflare-WAF-to-AbuseIPDB).
2019-12-12 06:46:46
117.14.113.96 attackbotsspam
The IP has triggered Cloudflare WAF. CF-Ray: 5436cc9a8c84eef2 | WAF_Rule_ID: 3b40188685924a32bf11d40edea05a27 | WAF_Kind: firewall | CF_Action: drop | Country: CN | CF_IPClass: noRecord | Protocol: HTTP/1.1 | Method: GET | Host: api.skk.moe | User-Agent: Mozilla/5.096783921 Mozilla/5.0 (Windows NT 10.0; WOW64; Trident/7.0; rv:11.0) like Gecko | CF_DC: LAX. Report generated by Cloudflare-WAF-to-AbuseIPDB (https://github.com/SukkaW/Cloudflare-WAF-to-AbuseIPDB).
2019-12-12 01:05:50
117.14.113.177 attackspambots
The IP has triggered Cloudflare WAF. CF-Ray: 54151bbd088aed0f | WAF_Rule_ID: 3b40188685924a32bf11d40edea05a27 | WAF_Kind: firewall | CF_Action: challenge | Country: CN | CF_IPClass: noRecord | Protocol: HTTP/1.1 | Method: GET | Host: blog.skk.moe | User-Agent: Mozilla/5.084743666 Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/64.0.3282.140 Safari/537.36 Edge/17.17134 | CF_DC: SJC. Report generated by Cloudflare-WAF-to-AbuseIPDB (https://github.com/SukkaW/Cloudflare-WAF-to-AbuseIPDB).
2019-12-08 06:03:48
117.14.113.153 attack
The IP has triggered Cloudflare WAF. CF-Ray: 5413b85498596c1a | WAF_Rule_ID: 3b40188685924a32bf11d40edea05a27 | WAF_Kind: firewall | CF_Action: challenge | Country: CN | CF_IPClass: noRecord | Protocol: HTTP/1.1 | Method: GET | Host: theme-suka.skk.moe | User-Agent: Mozilla/5.0101097241 Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/69.0.3497.81 Safari/537.36 | CF_DC: SJC. Report generated by Cloudflare-WAF-to-AbuseIPDB (https://github.com/SukkaW/Cloudflare-WAF-to-AbuseIPDB).
2019-12-08 01:57:49
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 117.14.113.75
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 56126
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;117.14.113.75.			IN	A

;; AUTHORITY SECTION:
.			538	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022022001 1800 900 604800 86400

;; Query time: 47 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Feb 21 12:10:06 CST 2022
;; MSG SIZE  rcvd: 106
Host info
75.113.14.117.in-addr.arpa domain name pointer dns75.online.tj.cn.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
75.113.14.117.in-addr.arpa	name = dns75.online.tj.cn.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
177.10.197.107 attackspambots
Unauthorized connection attempt detected from IP address 177.10.197.107 to port 4899 [J]
2020-02-06 04:44:57
83.39.88.196 attackbotsspam
Unauthorized connection attempt detected from IP address 83.39.88.196 to port 8080 [J]
2020-02-06 04:52:38
192.241.172.175 attack
Unauthorized connection attempt detected from IP address 192.241.172.175 to port 2220 [J]
2020-02-06 04:40:56
81.214.141.10 attackbots
Unauthorized connection attempt detected from IP address 81.214.141.10 to port 23 [J]
2020-02-06 04:52:55
134.209.178.109 attackspam
Unauthorized connection attempt detected from IP address 134.209.178.109 to port 2220 [J]
2020-02-06 04:47:15
187.111.221.221 attack
Unauthorized connection attempt detected from IP address 187.111.221.221 to port 22 [J]
2020-02-06 05:06:35
191.254.3.168 attack
Unauthorized connection attempt detected from IP address 191.254.3.168 to port 23 [J]
2020-02-06 04:41:23
197.156.65.138 attackspam
Unauthorized connection attempt detected from IP address 197.156.65.138 to port 2220 [J]
2020-02-06 05:04:25
42.117.157.221 attackspam
Unauthorized connection attempt detected from IP address 42.117.157.221 to port 81 [J]
2020-02-06 05:19:07
92.118.161.29 attackbots
Unauthorized connection attempt detected from IP address 92.118.161.29 to port 118 [J]
2020-02-06 05:15:10
46.27.179.201 attackspam
Unauthorized connection attempt detected from IP address 46.27.179.201 to port 23 [J]
2020-02-06 04:55:31
178.62.108.111 attackbotsspam
Unauthorized connection attempt detected from IP address 178.62.108.111 to port 2220 [J]
2020-02-06 05:09:57
187.11.140.235 attackspambots
Unauthorized connection attempt detected from IP address 187.11.140.235 to port 2220 [J]
2020-02-06 04:43:34
177.89.112.109 attackbots
Unauthorized connection attempt detected from IP address 177.89.112.109 to port 23 [J]
2020-02-06 04:44:33
182.150.143.155 attackspambots
Unauthorized connection attempt detected from IP address 182.150.143.155 to port 5394 [J]
2020-02-06 05:07:37

Recently Reported IPs

117.14.114.101 117.14.113.40 117.14.114.102 117.14.114.171
117.14.114.248 117.14.114.75 117.14.146.126 117.14.144.239
117.14.114.69 117.14.146.89 117.14.144.237 117.14.114.249
117.14.150.157 117.14.147.156 117.14.153.60 117.14.154.245
117.14.154.128 117.14.157.99 117.14.159.35 117.14.158.37