Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Chushui

Region: Changhua

Country: Taiwan, China

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 120.114.241.232
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 33499
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;120.114.241.232.		IN	A

;; AUTHORITY SECTION:
.			129	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2023050500 1800 900 604800 86400

;; Query time: 71 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri May 05 16:14:22 CST 2023
;; MSG SIZE  rcvd: 108
Host info
232.241.114.120.in-addr.arpa domain name pointer n-232.med.ncku.edu.tw.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
232.241.114.120.in-addr.arpa	name = n-232.med.ncku.edu.tw.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
222.186.42.137 attackbots
Fail2Ban Ban Triggered
2020-10-04 14:23:56
184.105.139.67 attack
 UDP 184.105.139.67:36749 -> port 161, len 113
2020-10-04 14:14:54
218.92.0.176 attack
Failed password for root from 218.92.0.176 port 36420 ssh2
Failed password for root from 218.92.0.176 port 36420 ssh2
Failed password for root from 218.92.0.176 port 36420 ssh2
Failed password for root from 218.92.0.176 port 36420 ssh2
2020-10-04 14:37:12
109.123.117.247 attackspambots
firewall-block, port(s): 8088/tcp
2020-10-04 14:30:04
124.128.248.18 attackspam
2020-10-04 00:46:20.366592-0500  localhost screensharingd[27788]: Authentication: FAILED :: User Name: N/A :: Viewer Address: 124.128.248.18 :: Type: VNC DES
2020-10-04 14:36:36
94.180.25.213 attackbotsspam
firewall-block, port(s): 23/tcp
2020-10-04 14:15:43
200.236.208.143 attack
445/tcp 445/tcp 445/tcp
[2020-08-16/10-03]3pkt
2020-10-04 14:57:50
113.124.92.189 attack
spam (f2b h2)
2020-10-04 14:39:59
112.85.42.196 attackbotsspam
Oct  4 08:14:27 santamaria sshd\[32529\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.85.42.196  user=root
Oct  4 08:14:29 santamaria sshd\[32529\]: Failed password for root from 112.85.42.196 port 9498 ssh2
Oct  4 08:14:32 santamaria sshd\[32529\]: Failed password for root from 112.85.42.196 port 9498 ssh2
...
2020-10-04 14:29:36
147.0.22.179 attackbotsspam
" "
2020-10-04 14:45:36
106.12.195.70 attack
SSH login attempts.
2020-10-04 14:46:41
170.130.187.38 attackspam
5060/tcp 161/udp 21/tcp...
[2020-08-04/10-03]28pkt,7pt.(tcp),1pt.(udp)
2020-10-04 14:51:41
20.194.27.95 attack
MAIL: User Login Brute Force Attempt
2020-10-04 14:42:28
192.241.239.135 attackspambots
27017/tcp 5432/tcp 9200/tcp...
[2020-08-21/10-03]17pkt,15pt.(tcp),1pt.(udp)
2020-10-04 14:14:15
121.201.95.58 attackbotsspam
(sshd) Failed SSH login from 121.201.95.58 (CN/China/-): 5 in the last 3600 secs
2020-10-04 14:31:01

Recently Reported IPs

10.3.207.171 14.139.243.18 134.114.223.240 130.75.6.113
120.114.52.222 140.116.8.129 140.116.188.45 145.90.227.7
140.115.21.25 2.187.70.114 202.67.40.17 140.116.249.224
193.137.65.66 140.116.125.106 160.5.67.140 171.101.52.47
76.32.248.71 140.116.71.232 140.116.161.53 140.116.35.2