Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: China

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
IP Type Details Datetime
117.14.145.176 attackbots
The IP has triggered Cloudflare WAF. CF-Ray: 5413fd94bec1ebc1 | WAF_Rule_ID: 3b40188685924a32bf11d40edea05a27 | WAF_Kind: firewall | CF_Action: challenge | Country: CN | CF_IPClass: noRecord | Protocol: HTTP/1.1 | Method: GET | Host: api.skk.moe | User-Agent: Mozilla/5.0 (Linux; Android 6.0; Nexus 5 Build/MRA58N) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/55.0.2883.87 Mobile Safari/537.36 | CF_DC: LAX. Report generated by Cloudflare-WAF-to-AbuseIPDB (https://github.com/SukkaW/Cloudflare-WAF-to-AbuseIPDB).
2019-12-08 06:27:49
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 117.14.145.164
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 16071
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;117.14.145.164.			IN	A

;; AUTHORITY SECTION:
.			170	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022030800 1800 900 604800 86400

;; Query time: 26 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Mar 08 14:44:20 CST 2022
;; MSG SIZE  rcvd: 107
Host info
164.145.14.117.in-addr.arpa domain name pointer dns164.online.tj.cn.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
164.145.14.117.in-addr.arpa	name = dns164.online.tj.cn.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
185.202.1.122 attack
RDP brute force attack detected by fail2ban
2020-09-13 04:00:33
41.66.244.86 attackspambots
Sep 12 17:05:05 ip-172-31-42-142 sshd\[10962\]: Failed password for root from 41.66.244.86 port 59812 ssh2\
Sep 12 17:08:19 ip-172-31-42-142 sshd\[10974\]: Invalid user amanda from 41.66.244.86\
Sep 12 17:08:21 ip-172-31-42-142 sshd\[10974\]: Failed password for invalid user amanda from 41.66.244.86 port 45570 ssh2\
Sep 12 17:11:38 ip-172-31-42-142 sshd\[11068\]: Failed password for root from 41.66.244.86 port 59470 ssh2\
Sep 12 17:14:49 ip-172-31-42-142 sshd\[11086\]: Invalid user exploit from 41.66.244.86\
2020-09-13 03:39:16
51.38.37.89 attackbots
Sep 12 13:59:42 piServer sshd[23790]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.38.37.89 
Sep 12 13:59:44 piServer sshd[23790]: Failed password for invalid user sign from 51.38.37.89 port 45242 ssh2
Sep 12 14:03:53 piServer sshd[24214]: Failed password for root from 51.38.37.89 port 58268 ssh2
...
2020-09-13 03:44:55
123.55.98.17 attackbotsspam
Brute forcing email accounts
2020-09-13 04:09:45
104.206.128.66 attackbots
ET CINS Active Threat Intelligence Poor Reputation IP group 93 - port: 23 proto: tcp cat: Misc Attackbytes: 60
2020-09-13 04:08:51
163.44.169.18 attackbotsspam
Sep 12 20:42:57 haigwepa sshd[12164]: Failed password for root from 163.44.169.18 port 57146 ssh2
...
2020-09-13 03:44:31
185.234.218.39 attack
RDP Bruteforce
2020-09-13 03:59:32
212.118.18.160 attackspam
Unauthorized connection attempt from IP address 212.118.18.160 on Port 445(SMB)
2020-09-13 03:57:01
39.43.106.229 attack
Unauthorized connection attempt from IP address 39.43.106.229 on Port 445(SMB)
2020-09-13 04:12:40
167.248.133.24 attack
ET DROP Dshield Block Listed Source group 1 - port: 8883 proto: tcp cat: Misc Attackbytes: 60
2020-09-13 03:48:50
222.229.109.174 attackspam
 TCP (SYN) 222.229.109.174:42934 -> port 22, len 44
2020-09-13 03:48:21
49.233.85.15 attack
Sep 12 19:59:32 [host] sshd[28058]: pam_unix(sshd:
Sep 12 19:59:34 [host] sshd[28058]: Failed passwor
Sep 12 20:01:14 [host] sshd[28096]: Invalid user g
2020-09-13 03:58:46
222.186.42.155 attack
Sep 12 21:59:01 vps639187 sshd\[11223\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.42.155  user=root
Sep 12 21:59:03 vps639187 sshd\[11223\]: Failed password for root from 222.186.42.155 port 53820 ssh2
Sep 12 21:59:05 vps639187 sshd\[11223\]: Failed password for root from 222.186.42.155 port 53820 ssh2
...
2020-09-13 04:11:15
106.12.175.38 attack
Sep 12 20:09:10 abendstille sshd\[19048\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.175.38  user=root
Sep 12 20:09:12 abendstille sshd\[19048\]: Failed password for root from 106.12.175.38 port 45450 ssh2
Sep 12 20:11:00 abendstille sshd\[20685\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.175.38  user=root
Sep 12 20:11:02 abendstille sshd\[20685\]: Failed password for root from 106.12.175.38 port 41330 ssh2
Sep 12 20:12:58 abendstille sshd\[22466\]: Invalid user administrator from 106.12.175.38
...
2020-09-13 03:55:04
178.128.208.180 attackbotsspam
Sep 12 22:39:05 gw1 sshd[14355]: Failed password for root from 178.128.208.180 port 37310 ssh2
Sep 12 22:42:21 gw1 sshd[14442]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.128.208.180
...
2020-09-13 03:42:51

Recently Reported IPs

117.14.145.203 117.14.145.63 117.14.145.52 117.14.147.165
117.14.145.97 117.14.147.233 117.14.147.78 117.14.148.249
117.14.149.73 117.14.148.102 117.14.148.45 117.14.150.53
117.14.150.74 117.14.150.72 117.14.150.1 108.167.159.26
117.14.149.183 117.14.151.150 117.14.151.245 117.14.150.231