Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: Beijing

Country: China

Internet Service Provider: unknown

Hostname: unknown

Organization: GOIP-AULA-LIMITED

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:

; <<>> DiG 9.10.3-P4-Ubuntu <<>> 122.14.141.18
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 47858
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;122.14.141.18.			IN	A

;; AUTHORITY SECTION:
.			3600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019052400 1800 900 604800 86400

;; Query time: 11 msec
;; SERVER: 67.207.67.2#53(67.207.67.2)
;; WHEN: Fri May 24 23:33:51 CST 2019
;; MSG SIZE  rcvd: 117

Host info
Host 18.141.14.122.in-addr.arpa not found: 2(SERVFAIL)
Nslookup info:
;; Got SERVFAIL reply from 67.207.67.2, trying next server
Server:		67.207.67.3
Address:	67.207.67.3#53

** server can't find 18.141.14.122.in-addr.arpa: SERVFAIL

Related IP info:
Related comments:
IP Type Details Datetime
176.212.108.99 attackspambots
Icarus honeypot on github
2020-10-03 05:46:15
152.136.173.58 attack
Coordinated SSH brute-force attack from different IPs. pam_unix(sshd:auth): user=root
2020-10-03 05:44:09
177.53.245.11 attackbots
Repeated RDP login failures. Last user: admin
2020-10-03 05:27:19
88.209.116.204 attackspambots
Repeated RDP login failures. Last user: Sales
2020-10-03 05:36:33
85.209.0.253 attackbotsspam
SSH brute-force attempt
2020-10-03 05:51:40
212.64.17.251 attack
Repeated RDP login failures. Last user: Admin02
2020-10-03 05:31:34
24.92.187.245 attackbots
repeated SSH login attempts
2020-10-03 05:41:58
152.136.116.24 attackspam
Repeated RDP login failures. Last user: Reunion
2020-10-03 05:33:43
161.35.6.188 attackbotsspam
DATE:2020-10-02 23:48:00,IP:161.35.6.188,MATCHES:10,PORT:ssh
2020-10-03 05:55:52
103.154.234.247 attackbotsspam
SCAN: Host Sweep CloudCIX Reconnaissance Scan Detected, PTR: PTR record not found
2020-10-03 05:44:44
91.204.248.42 attackspam
SSH Invalid Login
2020-10-03 05:50:16
115.48.129.216 attackspam
Listed on    zen-spamhaus also abuseat.org   / proto=6  .  srcport=20807  .  dstport=23 Telnet  .     (3833)
2020-10-03 05:50:54
143.0.124.67 attack
Repeated RDP login failures. Last user: Adriana
2020-10-03 05:27:44
34.95.145.18 attack
Repeated RDP login failures. Last user: Scanner
2020-10-03 05:39:14
80.249.3.58 attackspam
Credential Stuffing Botnet
2020-10-03 05:50:30

Recently Reported IPs

41.226.0.50 184.39.194.234 83.56.253.3 201.42.134.140
141.203.59.208 163.53.83.220 194.63.116.133 216.244.66.202
106.223.187.213 118.200.185.49 217.207.109.107 73.168.120.150
91.188.112.178 162.250.169.33 164.65.212.230 211.45.179.210
119.65.107.152 95.102.65.97 40.107.72.127 187.119.13.63