Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: China

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 123.114.48.81
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 45975
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;123.114.48.81.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025020300 1800 900 604800 86400

;; Query time: 32 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Feb 03 17:47:36 CST 2025
;; MSG SIZE  rcvd: 106
Host info
Host 81.48.114.123.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 81.48.114.123.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
35.223.149.81 attackbots
Unauthorized connection attempt detected from IP address 35.223.149.81 to port 8545
2020-03-31 15:07:39
194.26.29.113 attackspambots
Mar 31 09:10:20 debian-2gb-nbg1-2 kernel: \[7897673.849230\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=194.26.29.113 DST=195.201.40.59 LEN=40 TOS=0x00 PREC=0x00 TTL=241 ID=13854 PROTO=TCP SPT=55919 DPT=2653 WINDOW=1024 RES=0x00 SYN URGP=0
2020-03-31 15:17:06
185.175.93.11 attack
ET DROP Dshield Block Listed Source group 1 - port: 29012 proto: TCP cat: Misc Attack
2020-03-31 14:45:20
198.108.66.230 attackspam
Mar 31 08:35:50 debian-2gb-nbg1-2 kernel: \[7895604.355021\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=198.108.66.230 DST=195.201.40.59 LEN=40 TOS=0x00 PREC=0x00 TTL=32 ID=18887 PROTO=TCP SPT=30153 DPT=8036 WINDOW=1024 RES=0x00 SYN URGP=0
2020-03-31 15:13:24
58.218.150.170 attackspambots
2020-03-31T05:46:44.118108  sshd[12240]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=58.218.150.170  user=root
2020-03-31T05:46:46.055021  sshd[12240]: Failed password for root from 58.218.150.170 port 40652 ssh2
2020-03-31T05:53:03.889669  sshd[12279]: Invalid user www from 58.218.150.170 port 50228
...
2020-03-31 14:22:57
94.33.52.178 attack
$f2bV_matches
2020-03-31 14:28:41
194.26.69.106 attackbots
[MK-VM5] Blocked by UFW
2020-03-31 15:16:44
185.44.66.99 attackbots
Invalid user moj from 185.44.66.99 port 44642
2020-03-31 14:25:44
45.143.221.50 attack
scan z
2020-03-31 14:24:36
45.227.255.119 attackspam
Mar 31 09:10:33 server2 sshd\[13310\]: Invalid user ftpuser from 45.227.255.119
Mar 31 09:10:34 server2 sshd\[13312\]: Invalid user admin from 45.227.255.119
Mar 31 09:10:35 server2 sshd\[13316\]: User ftp from 45.227.255.119 not allowed because not listed in AllowUsers
Mar 31 09:10:37 server2 sshd\[13318\]: Invalid user service from 45.227.255.119
Mar 31 09:10:38 server2 sshd\[13320\]: Invalid user RPM from 45.227.255.119
Mar 31 09:10:39 server2 sshd\[13322\]: Invalid user ftpuser from 45.227.255.119
2020-03-31 14:24:13
146.88.232.96 attackbotsspam
Automated report (2020-03-31T04:24:08+00:00). Caught masquerading as Bingbot.
2020-03-31 14:28:23
49.234.94.189 attackspambots
2020-03-31T05:58:17.367292randservbullet-proofcloud-66.localdomain sshd[19155]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.234.94.189  user=root
2020-03-31T05:58:19.875145randservbullet-proofcloud-66.localdomain sshd[19155]: Failed password for root from 49.234.94.189 port 40298 ssh2
2020-03-31T06:02:37.527013randservbullet-proofcloud-66.localdomain sshd[19232]: Invalid user hc from 49.234.94.189 port 49928
...
2020-03-31 14:35:25
129.146.160.230 attackbotsspam
Automatic report - Port Scan
2020-03-31 14:52:45
45.151.254.234 attackbots
ET SCAN Sipvicious Scan - port: 5060 proto: UDP cat: Attempted Information Leak
2020-03-31 15:05:39
77.247.109.241 attackspambots
SIPVicious Scanner Detection
2020-03-31 15:01:42

Recently Reported IPs

251.115.50.142 239.247.238.85 185.32.92.239 212.243.225.225
28.12.249.15 84.101.229.194 130.29.87.43 234.34.42.120
57.231.40.185 147.240.79.217 108.252.5.244 19.248.151.48
215.123.183.109 231.8.242.236 60.112.134.79 2.19.224.224
52.228.155.111 149.234.127.242 101.171.147.18 53.91.142.125