Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: China

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 119.20.146.214
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 3365
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;119.20.146.214.			IN	A

;; AUTHORITY SECTION:
.			29	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025022700 1800 900 604800 86400

;; Query time: 13 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Feb 27 22:16:12 CST 2025
;; MSG SIZE  rcvd: 107
Host info
Host 214.146.20.119.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 214.146.20.119.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
185.209.0.92 attackspam
11/30/2019-07:32:40.071705 185.209.0.92 Protocol: 6 ET SCAN NMAP -sS window 1024
2019-11-30 20:49:58
159.65.146.141 attack
Nov 30 09:21:32 cvbnet sshd[15266]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.65.146.141 
Nov 30 09:21:34 cvbnet sshd[15266]: Failed password for invalid user mcready from 159.65.146.141 port 35328 ssh2
...
2019-11-30 21:30:17
1.203.115.140 attackbotsspam
Invalid user jeanluc from 1.203.115.140 port 41535
2019-11-30 21:14:15
74.208.252.144 attack
74.208.252.144 - - \[30/Nov/2019:06:19:04 +0000\] "POST /wp-login.php HTTP/1.1" 200 6393 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0"
74.208.252.144 - - \[30/Nov/2019:06:19:05 +0000\] "POST /xmlrpc.php HTTP/1.1" 200 403 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0"
...
2019-11-30 21:16:18
77.53.176.4 attackbots
Nov 30 07:18:50 web2 sshd[24433]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=77.53.176.4
Nov 30 07:18:52 web2 sshd[24433]: Failed password for invalid user l3 from 77.53.176.4 port 41478 ssh2
2019-11-30 21:24:13
162.247.74.200 attackbotsspam
Automatic report - Banned IP Access
2019-11-30 21:20:17
137.74.199.180 attackbots
1575115197 - 11/30/2019 12:59:57 Host: 137.74.199.180/137.74.199.180 Port: 22 TCP Blocked
2019-11-30 20:55:15
61.84.196.50 attackbotsspam
Nov 30 07:11:31 plusreed sshd[20848]: Invalid user slobodrian from 61.84.196.50
...
2019-11-30 21:03:48
104.248.159.69 attack
Nov 30 16:21:39 itv-usvr-01 sshd[24335]: Invalid user carty from 104.248.159.69
Nov 30 16:21:39 itv-usvr-01 sshd[24335]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.248.159.69
Nov 30 16:21:39 itv-usvr-01 sshd[24335]: Invalid user carty from 104.248.159.69
Nov 30 16:21:40 itv-usvr-01 sshd[24335]: Failed password for invalid user carty from 104.248.159.69 port 47502 ssh2
Nov 30 16:29:35 itv-usvr-01 sshd[24613]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.248.159.69  user=sshd
Nov 30 16:29:37 itv-usvr-01 sshd[24613]: Failed password for sshd from 104.248.159.69 port 54082 ssh2
2019-11-30 21:13:51
80.82.65.74 attack
ET CINS Active Threat Intelligence Poor Reputation IP group 70 - port: 6129 proto: TCP cat: Misc Attack
2019-11-30 21:20:41
106.54.238.155 attackbots
Port scan detected on ports: 65530[TCP], 65530[TCP], 65530[TCP]
2019-11-30 21:16:45
116.97.243.142 attackbotsspam
Unauthorised access (Nov 30) SRC=116.97.243.142 LEN=52 TOS=0x10 PREC=0x20 TTL=110 ID=13809 DF TCP DPT=445 WINDOW=8192 SYN 
Unauthorised access (Nov 30) SRC=116.97.243.142 LEN=52 TOS=0x10 PREC=0x20 TTL=110 ID=9448 DF TCP DPT=445 WINDOW=8192 SYN 
Unauthorised access (Nov 28) SRC=116.97.243.142 LEN=52 TOS=0x10 PREC=0x20 TTL=110 ID=29301 DF TCP DPT=445 WINDOW=8192 SYN 
Unauthorised access (Nov 28) SRC=116.97.243.142 LEN=52 TOS=0x10 PREC=0x20 TTL=110 ID=14848 DF TCP DPT=445 WINDOW=8192 SYN 
Unauthorised access (Nov 27) SRC=116.97.243.142 LEN=52 TOS=0x10 PREC=0x20 TTL=110 ID=26412 DF TCP DPT=445 WINDOW=8192 SYN
2019-11-30 20:57:39
201.47.123.100 attack
[SatNov3007:18:54.8578072019][:error][pid16693:tid47933148841728][client201.47.123.100:52756][client201.47.123.100]ModSecurity:Accessdeniedwithcode403\(phase2\).Patternmatch"/wp-config.php"atREQUEST_FILENAME.[file"/etc/apache2/conf.d/modsec_rules/99_asl_jitp.conf"][line"3503"][id"381206"][rev"1"][msg"Atomicorp.comWAFRules-VirtualJustInTimePatch:AccesstoWordPressconfigurationfileblocked"][data"/wp-config.php"][severity"CRITICAL"][hostname"www.ilgiornaledelticino.ch"][uri"/wordpress/wp-config.php.1"][unique_id"XeIJzgqv1FuauzfqLXz6OgAAAM8"][SatNov3007:18:56.4048192019][:error][pid16559:tid47933136234240][client201.47.123.100:53556][client201.47.123.100]ModSecurity:Accessdeniedwithcode403\(phase2\).Patternmatch"/wp-config.php"atREQUEST_FILENAME.[file"/etc/apache2/conf.d/modsec_rules/99_asl_jitp.conf"][line"3503"][id"381206"][rev"1"][msg"Atomicorp.comWAFRules-VirtualJustInTimePatch:AccesstoWordPressconfigurationfileblocked"][data"/wp-config.php"][severity"CRITICAL"][hostname"
2019-11-30 21:15:50
92.222.84.34 attack
Repeated failed SSH attempt
2019-11-30 20:48:23
222.208.193.132 attackspam
11/30/2019-07:19:17.934108 222.208.193.132 Protocol: 6 ET SCAN Suspicious inbound to MSSQL port 1433
2019-11-30 21:10:21

Recently Reported IPs

255.64.146.133 20.170.51.166 128.86.168.231 202.251.162.225
202.117.236.32 234.114.17.221 163.80.15.89 80.114.86.132
83.161.195.206 99.115.87.255 57.197.8.53 194.39.143.32
74.27.234.167 60.33.116.77 89.11.205.43 48.163.172.175
50.112.109.59 59.44.210.126 78.105.92.246 250.119.226.26