Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: China

Internet Service Provider: Zhengzhou Giant Computer Network Technology Co. Ltd

Hostname: unknown

Organization: unknown

Usage Type: Data Center/Web Hosting/Transit

Comments:
Type Details Datetime
attackspambots
SSH Invalid Login
2020-05-02 06:05:30
attack
Invalid user www from 122.114.13.116 port 38420
2020-05-01 07:49:23
Comments on same subnet:
IP Type Details Datetime
122.114.131.13 attack
2020-04-17T07:28:11.6419851495-001 sshd[35885]: Invalid user ftpadmin from 122.114.131.13 port 49417
2020-04-17T07:28:13.8507891495-001 sshd[35885]: Failed password for invalid user ftpadmin from 122.114.131.13 port 49417 ssh2
2020-04-17T07:38:04.4195811495-001 sshd[36151]: Invalid user admin from 122.114.131.13 port 49417
2020-04-17T07:38:04.4225801495-001 sshd[36151]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.114.131.13
2020-04-17T07:38:04.4195811495-001 sshd[36151]: Invalid user admin from 122.114.131.13 port 49417
2020-04-17T07:38:06.0352591495-001 sshd[36151]: Failed password for invalid user admin from 122.114.131.13 port 49417 ssh2
...
2020-04-17 20:03:11
122.114.13.64 attackbots
Host Scan
2019-12-16 14:44:21
122.114.130.82 attackbotsspam
Sep 22 06:57:36 tuotantolaitos sshd[7970]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.114.130.82
Sep 22 06:57:38 tuotantolaitos sshd[7970]: Failed password for invalid user fan from 122.114.130.82 port 34102 ssh2
...
2019-09-22 12:19:40
122.114.132.106 attackspam
Aug 26 04:27:46 hosname24 sshd[4056]: Invalid user ggutierrez from 122.114.132.106 port 51948
Aug 26 04:27:48 hosname24 sshd[4056]: Failed password for invalid user ggutierrez from 122.114.132.106 port 51948 ssh2
Aug 26 04:27:48 hosname24 sshd[4056]: Received disconnect from 122.114.132.106 port 51948:11: Bye Bye [preauth]
Aug 26 04:27:48 hosname24 sshd[4056]: Disconnected from 122.114.132.106 port 51948 [preauth]
Aug 26 04:51:49 hosname24 sshd[2087]: Invalid user rungshostname.ato from 122.114.132.106 port 45972
Aug 26 04:51:52 hosname24 sshd[2087]: Failed password for invalid user rungshostname.ato from 122.114.132.106 port 45972 ssh2
Aug 26 04:51:52 hosname24 sshd[2087]: Received disconnect from 122.114.132.106 port 45972:11: Bye Bye [preauth]
Aug 26 04:51:52 hosname24 sshd[2087]: Disconnected from 122.114.132.106 port 45972 [preauth]
Aug 26 04:54:07 hosname24 sshd[2137]: Invalid user user from 122.114.132.106 port 34438
Aug 26 04:54:09 hosname24 sshd[2137]: Failed p........
-------------------------------
2019-08-26 13:43:29
122.114.130.82 attackspam
Aug 18 20:32:19 vps200512 sshd\[13961\]: Invalid user vijay from 122.114.130.82
Aug 18 20:32:19 vps200512 sshd\[13961\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.114.130.82
Aug 18 20:32:21 vps200512 sshd\[13961\]: Failed password for invalid user vijay from 122.114.130.82 port 42083 ssh2
Aug 18 20:35:31 vps200512 sshd\[14060\]: Invalid user sparky from 122.114.130.82
Aug 18 20:35:31 vps200512 sshd\[14060\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.114.130.82
2019-08-19 08:43:56
122.114.130.82 attackspambots
$f2bV_matches
2019-08-11 05:08:10
122.114.130.82 attackspam
Jul 28 14:22:41 OPSO sshd\[16622\]: Invalid user xcar from 122.114.130.82 port 55914
Jul 28 14:22:41 OPSO sshd\[16622\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.114.130.82
Jul 28 14:22:42 OPSO sshd\[16622\]: Failed password for invalid user xcar from 122.114.130.82 port 55914 ssh2
Jul 28 14:24:26 OPSO sshd\[16705\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.114.130.82  user=root
Jul 28 14:24:28 OPSO sshd\[16705\]: Failed password for root from 122.114.130.82 port 34896 ssh2
2019-07-28 20:49:21
122.114.130.82 attack
Invalid user ama from 122.114.130.82 port 58918
pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.114.130.82
Failed password for invalid user ama from 122.114.130.82 port 58918 ssh2
Invalid user ubuntu from 122.114.130.82 port 55060
pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.114.130.82
2019-06-30 15:24:11
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 122.114.13.116
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 59577
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;122.114.13.116.			IN	A

;; AUTHORITY SECTION:
.			552	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2020043001 1800 900 604800 86400

;; Query time: 81 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri May 01 07:49:20 CST 2020
;; MSG SIZE  rcvd: 118
Host info
Host 116.13.114.122.in-addr.arpa not found: 2(SERVFAIL)
Nslookup info:
;; Got SERVFAIL reply from 183.60.83.19, trying next server
Server:		183.60.82.98
Address:	183.60.82.98#53

** server can't find 116.13.114.122.in-addr.arpa: SERVFAIL
Related IP info:
Related comments:
IP Type Details Datetime
199.188.246.130 attackbotsspam
Unauthorized connection attempt detected from IP address 199.188.246.130 to port 2220 [J]
2020-01-22 23:16:53
154.79.250.108 attack
Unauthorized connection attempt detected from IP address 154.79.250.108 to port 8080 [J]
2020-01-22 23:24:16
93.138.29.85 attack
Unauthorized connection attempt detected from IP address 93.138.29.85 to port 80 [J]
2020-01-22 23:33:37
178.48.237.45 attackbots
Jan 21 18:42:36 server sshd[23320]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=catv-178-48-237-45.catv.broadband.hu  user=r.r
Jan 21 18:42:38 server sshd[23320]: Failed password for r.r from 178.48.237.45 port 44612 ssh2
Jan 21 18:42:38 server sshd[23320]: Received disconnect from 178.48.237.45: 11: Bye Bye [preauth]
Jan 21 18:49:47 server sshd[23384]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=catv-178-48-237-45.catv.broadband.hu
Jan 21 18:49:48 server sshd[23384]: Failed password for invalid user ebay from 178.48.237.45 port 56846 ssh2
Jan 21 18:49:48 server sshd[23384]: Received disconnect from 178.48.237.45: 11: Bye Bye [preauth]
Jan 21 18:55:04 server sshd[23439]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=catv-178-48-237-45.catv.broadband.hu
Jan 21 18:55:05 server sshd[23439]: Failed password for invalid user lc from 178.48.237.45 ........
-------------------------------
2020-01-22 23:22:01
142.93.211.52 attackspam
Unauthorized connection attempt detected from IP address 142.93.211.52 to port 2220 [J]
2020-01-22 23:24:29
60.250.147.218 attack
Unauthorized connection attempt detected from IP address 60.250.147.218 to port 2220 [J]
2020-01-22 23:38:09
85.204.116.209 attackbotsspam
Unauthorized connection attempt detected from IP address 85.204.116.209 to port 23 [J]
2020-01-22 23:35:11
121.123.37.72 attackspam
Unauthorized connection attempt detected from IP address 121.123.37.72 to port 4567 [J]
2020-01-22 23:03:43
35.153.206.224 attack
Unauthorized connection attempt detected from IP address 35.153.206.224 to port 5002 [J]
2020-01-22 23:39:43
104.248.187.179 attackspam
Unauthorized connection attempt detected from IP address 104.248.187.179 to port 2220 [J]
2020-01-22 23:31:45
103.143.46.105 attackbotsspam
Unauthorized connection attempt detected from IP address 103.143.46.105 to port 23 [J]
2020-01-22 23:32:12
79.107.225.27 attack
Unauthorized connection attempt detected from IP address 79.107.225.27 to port 80 [J]
2020-01-22 23:08:30
118.89.168.132 attack
Unauthorized connection attempt detected from IP address 118.89.168.132 to port 80 [J]
2020-01-22 23:27:50
178.205.104.80 attackspam
Unauthorized connection attempt detected from IP address 178.205.104.80 to port 8080 [J]
2020-01-22 23:21:34
106.13.219.148 attackbotsspam
Unauthorized connection attempt detected from IP address 106.13.219.148 to port 2220 [J]
2020-01-22 23:30:44

Recently Reported IPs

84.228.95.141 119.83.44.41 185.108.12.252 17.35.196.156
125.139.230.101 110.90.231.21 200.222.147.226 184.18.12.251
124.210.163.156 32.103.82.254 156.96.155.61 125.113.144.21
213.239.215.99 209.195.180.61 78.88.117.61 191.173.174.124
100.55.201.51 66.176.48.70 95.32.51.67 0.59.9.128