Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: China

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 118.194.214.28
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 34623
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;118.194.214.28.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025021300 1800 900 604800 86400

;; Query time: 33 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Feb 13 21:20:18 CST 2025
;; MSG SIZE  rcvd: 107
Host info
Host 28.214.194.118.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 28.214.194.118.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
49.235.196.250 attackspam
Jul 23 14:34:16 ns381471 sshd[3415]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.235.196.250
Jul 23 14:34:18 ns381471 sshd[3415]: Failed password for invalid user qcluster from 49.235.196.250 port 61038 ssh2
2020-07-23 21:13:37
201.17.111.214 attackbotsspam
Jul 23 09:01:24 ws12vmsma01 sshd[39788]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=201.17.111.214 
Jul 23 09:01:24 ws12vmsma01 sshd[39788]: Invalid user pibid from 201.17.111.214
Jul 23 09:01:26 ws12vmsma01 sshd[39788]: Failed password for invalid user pibid from 201.17.111.214 port 12064 ssh2
...
2020-07-23 21:31:27
112.85.42.174 attack
Jul 23 15:28:20 marvibiene sshd[15745]: Failed password for root from 112.85.42.174 port 8805 ssh2
Jul 23 15:28:25 marvibiene sshd[15745]: Failed password for root from 112.85.42.174 port 8805 ssh2
2020-07-23 21:35:08
212.70.149.51 attackbots
2020-07-23T07:02:25.509126linuxbox-skyline auth[155437]: pam_unix(dovecot:auth): authentication failure; logname= uid=0 euid=0 tty=dovecot ruser=em rhost=212.70.149.51
...
2020-07-23 21:03:09
123.206.23.106 attackbots
Brute force SMTP login attempted.
...
2020-07-23 21:39:44
24.178.198.185 attack
port
2020-07-23 21:33:36
149.28.168.195 attack
User signup posting spam links and content.
2020-07-23 21:25:15
202.129.41.94 attack
Failed password for invalid user tuan from 202.129.41.94 port 39538 ssh2
2020-07-23 21:25:55
179.107.147.142 attackspam
Jul 23 09:01:42 ws12vmsma01 sshd[39935]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=179-107-147-142.zamix.com.br 
Jul 23 09:01:42 ws12vmsma01 sshd[39935]: Invalid user pibid from 179.107.147.142
Jul 23 09:01:44 ws12vmsma01 sshd[39935]: Failed password for invalid user pibid from 179.107.147.142 port 15932 ssh2
...
2020-07-23 21:09:31
134.122.96.20 attackspambots
2020-07-23T12:59:37.753645shield sshd\[12774\]: Invalid user postgres from 134.122.96.20 port 51346
2020-07-23T12:59:37.761576shield sshd\[12774\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.122.96.20
2020-07-23T12:59:39.636770shield sshd\[12774\]: Failed password for invalid user postgres from 134.122.96.20 port 51346 ssh2
2020-07-23T13:03:36.819503shield sshd\[13647\]: Invalid user testuser from 134.122.96.20 port 59350
2020-07-23T13:03:36.828014shield sshd\[13647\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.122.96.20
2020-07-23 21:10:24
116.25.44.184 attack
1595505793 - 07/23/2020 14:03:13 Host: 116.25.44.184/116.25.44.184 Port: 445 TCP Blocked
2020-07-23 21:04:11
79.11.202.12 attackspam
Jul 23 15:22:48 meumeu sshd[1383345]: Invalid user dwb from 79.11.202.12 port 63999
Jul 23 15:22:48 meumeu sshd[1383345]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=79.11.202.12 
Jul 23 15:22:48 meumeu sshd[1383345]: Invalid user dwb from 79.11.202.12 port 63999
Jul 23 15:22:50 meumeu sshd[1383345]: Failed password for invalid user dwb from 79.11.202.12 port 63999 ssh2
Jul 23 15:27:18 meumeu sshd[1383494]: Invalid user weixin from 79.11.202.12 port 65296
Jul 23 15:27:18 meumeu sshd[1383494]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=79.11.202.12 
Jul 23 15:27:18 meumeu sshd[1383494]: Invalid user weixin from 79.11.202.12 port 65296
Jul 23 15:27:20 meumeu sshd[1383494]: Failed password for invalid user weixin from 79.11.202.12 port 65296 ssh2
Jul 23 15:31:46 meumeu sshd[1383672]: Invalid user csgo from 79.11.202.12 port 64709
...
2020-07-23 21:35:27
211.234.119.189 attackspambots
Jul 23 14:52:21 abendstille sshd\[523\]: Invalid user sharad from 211.234.119.189
Jul 23 14:52:21 abendstille sshd\[523\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=211.234.119.189
Jul 23 14:52:23 abendstille sshd\[523\]: Failed password for invalid user sharad from 211.234.119.189 port 38788 ssh2
Jul 23 14:56:55 abendstille sshd\[5060\]: Invalid user peter from 211.234.119.189
Jul 23 14:56:55 abendstille sshd\[5060\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=211.234.119.189
...
2020-07-23 21:03:33
75.44.16.251 attackbots
fail2ban/Jul 23 13:57:10 h1962932 sshd[5391]: Invalid user tester from 75.44.16.251 port 35594
Jul 23 13:57:10 h1962932 sshd[5391]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=75.44.16.251
Jul 23 13:57:10 h1962932 sshd[5391]: Invalid user tester from 75.44.16.251 port 35594
Jul 23 13:57:11 h1962932 sshd[5391]: Failed password for invalid user tester from 75.44.16.251 port 35594 ssh2
Jul 23 14:02:54 h1962932 sshd[5589]: Invalid user maluks from 75.44.16.251 port 55018
2020-07-23 21:26:29
203.150.137.94 attackbots
Failed password for invalid user tuan from 203.150.137.94 port 33200 ssh2
2020-07-23 21:16:25

Recently Reported IPs

230.41.12.70 35.37.148.228 182.125.161.78 215.159.28.222
216.86.200.61 58.202.41.24 152.52.168.139 115.145.16.211
48.235.49.8 199.67.120.70 212.8.158.214 127.224.241.34
243.242.12.204 133.100.48.254 3.166.188.16 135.213.103.99
89.218.48.13 48.189.245.100 108.147.50.237 42.217.63.108