Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Chushui

Region: Changhua

Country: Taiwan, China

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 120.114.234.130
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 42149
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;120.114.234.130.		IN	A

;; AUTHORITY SECTION:
.			461	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2023050501 1800 900 604800 86400

;; Query time: 19 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat May 06 09:14:12 CST 2023
;; MSG SIZE  rcvd: 108
Host info
Host 130.234.114.120.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 130.234.114.120.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
49.234.3.197 attack
Jul 30 04:19:45 amit sshd\[28554\]: Invalid user ellen from 49.234.3.197
Jul 30 04:19:45 amit sshd\[28554\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.234.3.197
Jul 30 04:19:47 amit sshd\[28554\]: Failed password for invalid user ellen from 49.234.3.197 port 56460 ssh2
...
2019-07-30 17:25:19
77.240.88.254 attack
445/tcp 445/tcp 445/tcp
[2019-06-11/07-29]3pkt
2019-07-30 16:55:08
188.134.16.191 attackspambots
Jul 29 20:20:41 mail postfix/postscreen[26949]: PREGREET 53 after 0.3 from [188.134.16.191]:59907: EHLO 188x134x16x191.static-business.iz.ertelecom.ru

...
2019-07-30 16:39:33
80.39.113.94 attackbots
DATE:2019-07-30 10:22:22, IP:80.39.113.94, PORT:ssh brute force auth on SSH service (patata)
2019-07-30 16:49:31
121.128.1.179 attackspambots
3399/tcp 3389/tcp...
[2019-05-31/07-29]7pkt,2pt.(tcp)
2019-07-30 17:27:18
31.29.99.230 attackspambots
SpamReport
2019-07-30 17:14:52
218.92.0.191 attackspam
2019-07-30T03:54:22.245081abusebot-8.cloudsearch.cf sshd\[6759\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.191  user=root
2019-07-30 17:11:54
129.150.71.191 attack
Jul 30 05:28:23 herz-der-gamer sshd[2302]: Failed password for invalid user cesar from 129.150.71.191 port 27815 ssh2
...
2019-07-30 16:57:23
101.255.122.10 attackbots
445/tcp 445/tcp 445/tcp...
[2019-06-03/07-29]11pkt,1pt.(tcp)
2019-07-30 16:46:50
148.70.249.72 attack
Jul 30 09:37:56 microserver sshd[63366]: Invalid user www from 148.70.249.72 port 33476
Jul 30 09:37:56 microserver sshd[63366]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=148.70.249.72
Jul 30 09:37:57 microserver sshd[63366]: Failed password for invalid user www from 148.70.249.72 port 33476 ssh2
Jul 30 09:43:52 microserver sshd[64427]: Invalid user l4d2 from 148.70.249.72 port 57528
Jul 30 09:43:52 microserver sshd[64427]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=148.70.249.72
Jul 30 09:56:35 microserver sshd[2184]: Invalid user er from 148.70.249.72 port 48772
Jul 30 09:56:35 microserver sshd[2184]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=148.70.249.72
Jul 30 09:56:38 microserver sshd[2184]: Failed password for invalid user er from 148.70.249.72 port 48772 ssh2
Jul 30 10:03:21 microserver sshd[3282]: Invalid user j from 148.70.249.72 port 44026
Jul 30 10:03:21 microser
2019-07-30 16:42:03
221.156.116.51 attack
Jul 30 10:46:12 mout sshd[16802]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=221.156.116.51
Jul 30 10:46:12 mout sshd[16802]: Invalid user vi from 221.156.116.51 port 48310
Jul 30 10:46:14 mout sshd[16802]: Failed password for invalid user vi from 221.156.116.51 port 48310 ssh2
2019-07-30 16:56:08
201.238.198.108 attack
445/tcp 445/tcp 445/tcp...
[2019-05-30/07-29]13pkt,1pt.(tcp)
2019-07-30 16:56:57
168.63.67.52 attackspam
(sshd) Failed SSH login from 168.63.67.52 (-): 5 in the last 3600 secs
2019-07-30 16:47:43
113.161.179.119 attackbotsspam
445/tcp 445/tcp
[2019-06-14/07-29]2pkt
2019-07-30 16:53:42
104.236.56.205 attack
Sent mail to target address hacked/leaked from abandonia in 2016
2019-07-30 16:51:55

Recently Reported IPs

140.116.221.109 128.186.6.103 140.116.153.134 195.199.245.169
140.116.164.179 140.116.246.215 120.114.52.219 129.2.181.236
140.116.77.75 140.117.189.188 155.95.205.98 164.8.215.113
140.116.67.104 140.116.60.74 64.112.230.62 223.202.213.63
115.178.218.247 140.116.135.30 159.226.35.187 140.116.57.120