Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Taiwan (Province of China)

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 120.105.80.214
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 9439
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;120.105.80.214.			IN	A

;; AUTHORITY SECTION:
.			29	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025021501 1800 900 604800 86400

;; Query time: 120 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Feb 16 12:38:04 CST 2025
;; MSG SIZE  rcvd: 107
Host info
Host 214.80.105.120.in-addr.arpa not found: 2(SERVFAIL)
Nslookup info:
;; Got SERVFAIL reply from 183.60.83.19, trying next server
Server:		183.60.82.98
Address:	183.60.82.98#53

** server can't find 214.80.105.120.in-addr.arpa: SERVFAIL
Related IP info:
Related comments:
IP Type Details Datetime
67.205.144.244 attackspam
Port scan(s) denied
2020-04-24 07:25:59
104.140.188.38 attackbots
Port 3389 (MS RDP) access denied
2020-04-24 07:32:03
104.236.175.127 attack
Apr 24 03:03:24 gw1 sshd[23429]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.236.175.127
Apr 24 03:03:26 gw1 sshd[23429]: Failed password for invalid user jq from 104.236.175.127 port 49402 ssh2
...
2020-04-24 07:30:07
162.243.128.186 attack
520/tcp 9990/tcp 2078/tcp...
[2020-03-16/04-22]36pkt,26pt.(tcp),3pt.(udp)
2020-04-24 08:00:15
178.128.215.32 attackbots
Apr 21 18:31:10 h1946882 sshd[11130]: pam_unix(sshd:auth): authenticati=
on failure; logname=3D uid=3D0 euid=3D0 tty=3Dssh ruser=3D rhost=3D178.=
128.215.32=20
Apr 21 18:31:12 h1946882 sshd[11130]: Failed password for invalid user =
ha from 178.128.215.32 port 32970 ssh2
Apr 21 18:31:12 h1946882 sshd[11130]: Received disconnect from 178.128.=
215.32: 11: Bye Bye [preauth]
Apr 21 18:46:00 h1946882 sshd[11275]: pam_unix(sshd:auth): authenticati=
on failure; logname=3D uid=3D0 euid=3D0 tty=3Dssh ruser=3D rhost=3D178.=
128.215.32  user=3Dr.r
Apr 21 18:46:03 h1946882 sshd[11275]: Failed password for r.r from 178=
.128.215.32 port 33620 ssh2
Apr 21 18:46:03 h1946882 sshd[11275]: Received disconnect from 178.128.=
215.32: 11: Bye Bye [preauth]


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=178.128.215.32
2020-04-24 07:35:22
200.187.165.218 attackspam
Automatic report - Port Scan Attack
2020-04-24 07:58:23
206.189.182.217 attackspam
Port scan(s) denied
2020-04-24 07:37:15
146.196.45.213 attack
Repeated attempts against wp-login
2020-04-24 07:32:52
186.92.39.18 attackbotsspam
1587659914 - 04/23/2020 18:38:34 Host: 186.92.39.18/186.92.39.18 Port: 445 TCP Blocked
2020-04-24 07:58:44
180.168.141.246 attack
SSH / Telnet Brute Force Attempts on Honeypot
2020-04-24 08:01:41
193.37.255.114 attack
Port scan(s) denied
2020-04-24 07:57:26
80.82.64.124 botsattack
Honeypot shows nearly 3k vnc attack records
2020-04-24 07:27:17
85.93.20.34 attackspam
1 attempts against mh-modsecurity-ban on sand
2020-04-24 07:33:54
139.59.32.51 attackbots
Port scan(s) denied
2020-04-24 07:31:29
192.241.235.76 attack
Fail2Ban Ban Triggered
2020-04-24 07:55:06

Recently Reported IPs

37.27.11.87 72.225.15.8 73.112.29.226 22.61.75.232
158.131.137.160 21.97.55.185 218.77.37.145 171.192.137.51
38.248.130.85 145.232.181.113 242.52.36.44 204.160.75.23
139.89.214.64 118.122.71.20 247.125.220.156 230.197.125.203
50.145.101.143 35.85.244.14 49.203.176.255 164.81.213.83