Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Changsha

Region: Hunan

Country: China

Internet Service Provider: China Mobile

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 120.228.142.114
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 44766
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;120.228.142.114.		IN	A

;; AUTHORITY SECTION:
.			467	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2024051600 1800 900 604800 86400

;; Query time: 15 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri May 17 01:16:05 CST 2024
;; MSG SIZE  rcvd: 108
Host info
Host 114.142.228.120.in-addr.arpa not found: 2(SERVFAIL)
Nslookup info:
;; Got SERVFAIL reply from 183.60.83.19, trying next server
Server:		183.60.82.98
Address:	183.60.82.98#53

** server can't find 114.142.228.120.in-addr.arpa: SERVFAIL
Related IP info:
Related comments:
IP Type Details Datetime
175.41.46.105 attackbots
unauthorized connection attempt
2020-02-04 13:16:25
110.164.73.18 attack
port scan and connect, tcp 1433 (ms-sql-s)
2020-02-04 10:04:03
197.86.211.248 attack
unauthorized connection attempt
2020-02-04 13:01:45
178.205.252.94 attack
unauthorized connection attempt
2020-02-04 13:09:01
203.156.19.135 attackbots
unauthorized connection attempt
2020-02-04 13:01:26
89.163.225.107 attackbotsspam
89.163.225.107 was recorded 15 times by 12 hosts attempting to connect to the following ports: 3283,17185. Incident counter (4h, 24h, all-time): 15, 32, 105
2020-02-04 10:11:52
37.187.3.53 attackbotsspam
Feb  3 23:07:28 XXX sshd[41512]: Invalid user ldapsun from 37.187.3.53 port 60621
2020-02-04 10:12:12
81.163.1.58 attack
unauthorized connection attempt
2020-02-04 13:12:49
222.124.16.227 attackbotsspam
Feb  4 04:52:23 game-panel sshd[22316]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.124.16.227
Feb  4 04:52:24 game-panel sshd[22316]: Failed password for invalid user bran from 222.124.16.227 port 52946 ssh2
Feb  4 04:55:44 game-panel sshd[22484]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.124.16.227
2020-02-04 13:15:09
221.214.60.17 attackbots
unauthorized connection attempt
2020-02-04 13:21:09
79.106.48.105 attackspambots
IMAP brute force
...
2020-02-04 10:04:46
58.87.75.178 attackspambots
Unauthorized connection attempt detected from IP address 58.87.75.178 to port 2220 [J]
2020-02-04 10:00:09
164.52.24.166 attack
Unauthorized connection attempt detected from IP address 164.52.24.166 to port 7547 [J]
2020-02-04 13:26:37
103.248.87.45 attack
Feb  4 02:11:21 grey postfix/smtpd\[2285\]: NOQUEUE: reject: RCPT from unknown\[103.248.87.45\]: 554 5.7.1 Service unavailable\; Client host \[103.248.87.45\] blocked using cbl.abuseat.org\; Blocked - see http://www.abuseat.org/lookup.cgi\?ip=103.248.87.45\; from=\ to=\ proto=ESMTP helo=\
...
2020-02-04 10:08:06
223.16.105.72 attackspam
1580792196 - 02/04/2020 05:56:36 Host: 223.16.105.72/223.16.105.72 Port: 445 TCP Blocked
2020-02-04 13:07:17

Recently Reported IPs

50.63.163.219 82.105.127.23 214.36.153.210 239.233.217.113
23.225.121.244 76.133.105.180 179.6.48.190 188.126.94.204
78.157.42.15 222.31.137.217 154.36.250.1 115.227.25.27
160.251.151.230 198.235.24.219 94.137.2.23 123.160.174.197
220.250.10.56 171.116.45.204 23.225.121.243 139.59.41.222