Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Tainan

Region: Tainan

Country: Taiwan, China

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 120.114.101.100
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 34419
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;120.114.101.100.		IN	A

;; AUTHORITY SECTION:
.			600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2023051300 1800 900 604800 86400

;; Query time: 66 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat May 13 16:32:08 CST 2023
;; MSG SIZE  rcvd: 108
Host info
100.101.114.120.in-addr.arpa domain name pointer 120-114-101-100.ksu.edu.tw.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
100.101.114.120.in-addr.arpa	name = 120-114-101-100.ksu.edu.tw.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
222.208.125.158 attack
IMAP brute force
...
2019-07-03 05:22:09
34.76.47.206 attackbots
5902/tcp 5901/tcp
[2019-07-02]2pkt
2019-07-03 05:05:03
132.232.45.138 attack
Jul  2 21:33:43 fr01 sshd[7097]: Invalid user prestashop from 132.232.45.138
Jul  2 21:33:43 fr01 sshd[7097]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=132.232.45.138
Jul  2 21:33:43 fr01 sshd[7097]: Invalid user prestashop from 132.232.45.138
Jul  2 21:33:46 fr01 sshd[7097]: Failed password for invalid user prestashop from 132.232.45.138 port 51108 ssh2
...
2019-07-03 04:52:37
112.140.122.64 attack
firewall-block, port(s): 23/tcp
2019-07-03 05:10:23
121.168.248.218 attack
Reported by AbuseIPDB proxy server.
2019-07-03 04:56:31
42.230.7.138 attackspam
Jul  2 15:39:57 tuxlinux sshd[25648]: Invalid user admin from 42.230.7.138 port 41181
Jul  2 15:39:57 tuxlinux sshd[25648]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=42.230.7.138 
Jul  2 15:39:57 tuxlinux sshd[25648]: Invalid user admin from 42.230.7.138 port 41181
Jul  2 15:39:57 tuxlinux sshd[25648]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=42.230.7.138 
Jul  2 15:39:57 tuxlinux sshd[25648]: Invalid user admin from 42.230.7.138 port 41181
Jul  2 15:39:57 tuxlinux sshd[25648]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=42.230.7.138 
Jul  2 15:39:59 tuxlinux sshd[25648]: Failed password for invalid user admin from 42.230.7.138 port 41181 ssh2
...
2019-07-03 05:16:55
178.62.54.120 attackspambots
fail2ban honeypot
2019-07-03 04:55:40
37.49.230.192 attackbots
Brute force attempt
2019-07-03 05:21:16
51.38.33.178 attackspam
Jan 12 02:57:51 motanud sshd\[23806\]: Invalid user nextcloud from 51.38.33.178 port 44589
Jan 12 02:57:51 motanud sshd\[23806\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.38.33.178
Jan 12 02:57:53 motanud sshd\[23806\]: Failed password for invalid user nextcloud from 51.38.33.178 port 44589 ssh2
2019-07-03 05:11:55
71.6.232.6 attack
Port scan: Attack repeated for 24 hours
2019-07-03 05:14:18
128.199.144.99 attackbotsspam
128.199.144.99 - - [02/Jul/2019:15:40:02 +0200] "GET /wp-login.php HTTP/1.1" 200 4405 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
128.199.144.99 - - [02/Jul/2019:15:40:03 +0200] "POST /wp-login.php HTTP/1.1" 200 4405 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
128.199.144.99 - - [02/Jul/2019:15:40:04 +0200] "GET /wp-login.php HTTP/1.1" 200 4405 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
128.199.144.99 - - [02/Jul/2019:15:40:04 +0200] "POST /wp-login.php HTTP/1.1" 200 4405 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
128.199.144.99 - - [02/Jul/2019:15:40:05 +0200] "GET /wp-login.php HTTP/1.1" 200 4405 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
128.199.144.99 - - [02/Jul/2019:15:40:06 +0200] "POST /wp-login.php HTTP/1.1" 200 4405 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
...
2019-07-03 05:10:03
198.108.66.72 attackspam
firewall-block, port(s): 80/tcp
2019-07-03 05:03:56
180.254.120.148 attackspam
23/tcp
[2019-07-02]1pkt
2019-07-03 04:52:00
110.44.123.47 attackspambots
SSH invalid-user multiple login try
2019-07-03 05:15:56
183.129.160.229 attackspam
Scanning (more than 2 packets) random ports - tries to find possible vulnerable services
2019-07-03 05:12:44

Recently Reported IPs

131.215.220.161 140.127.41.200 10.7.182.182 140.116.243.94
140.116.249.11 140.110.141.19 140.116.25.216 139.78.71.215
140.116.247.168 159.115.10.235 140.116.159.41 194.27.127.39
140.116.132.21 120.113.97.235 128.232.1.2 140.116.122.31
131.91.100.194 140.116.31.213 141.117.144.120 140.116.213.34