Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Los Angeles

Region: California

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
IP Type Details Datetime
128.14.226.107 attackspam
Sep 23 11:25:35 vm2 sshd[14376]: Failed password for root from 128.14.226.107 port 44164 ssh2
Sep 23 11:53:10 vm2 sshd[14510]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.14.226.107
...
2020-09-23 20:59:06
128.14.226.107 attackbotsspam
Sep 23 06:07:20 h2779839 sshd[22659]: Invalid user sam from 128.14.226.107 port 60674
Sep 23 06:07:20 h2779839 sshd[22659]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.14.226.107
Sep 23 06:07:20 h2779839 sshd[22659]: Invalid user sam from 128.14.226.107 port 60674
Sep 23 06:07:22 h2779839 sshd[22659]: Failed password for invalid user sam from 128.14.226.107 port 60674 ssh2
Sep 23 06:10:46 h2779839 sshd[22810]: Invalid user anna from 128.14.226.107 port 58078
Sep 23 06:10:46 h2779839 sshd[22810]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.14.226.107
Sep 23 06:10:46 h2779839 sshd[22810]: Invalid user anna from 128.14.226.107 port 58078
Sep 23 06:10:48 h2779839 sshd[22810]: Failed password for invalid user anna from 128.14.226.107 port 58078 ssh2
Sep 23 06:14:13 h2779839 sshd[22881]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.14.226.107  user=ro
...
2020-09-23 13:19:41
128.14.226.107 attack
Sep 23 01:29:06 dhoomketu sshd[3311826]: Invalid user ghost from 128.14.226.107 port 54598
Sep 23 01:29:06 dhoomketu sshd[3311826]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.14.226.107 
Sep 23 01:29:06 dhoomketu sshd[3311826]: Invalid user ghost from 128.14.226.107 port 54598
Sep 23 01:29:08 dhoomketu sshd[3311826]: Failed password for invalid user ghost from 128.14.226.107 port 54598 ssh2
Sep 23 01:30:40 dhoomketu sshd[3311854]: Invalid user alvaro from 128.14.226.107 port 49084
...
2020-09-23 05:06:54
128.14.226.199 attackspambots
Failed password for invalid user ldap from 128.14.226.199 port 45428 ssh2
2020-09-22 01:21:15
128.14.226.199 attack
Failed password for root from 128.14.226.199 port 43704 ssh2
Failed password for root from 128.14.226.199 port 45498 ssh2
2020-09-21 17:04:11
128.14.226.159 attack
web-1 [ssh] SSH Attack
2020-09-21 01:53:06
128.14.226.159 attackspam
web-1 [ssh] SSH Attack
2020-09-20 17:52:16
128.14.226.107 attackspam
...
2020-09-10 21:20:56
128.14.226.107 attackspam
Sep  9 17:55:36 onepixel sshd[2889395]: Failed password for invalid user zaq1xsw2 from 128.14.226.107 port 34006 ssh2
Sep  9 17:59:58 onepixel sshd[2890078]: Invalid user guest from 128.14.226.107 port 41036
Sep  9 17:59:58 onepixel sshd[2890078]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.14.226.107 
Sep  9 17:59:58 onepixel sshd[2890078]: Invalid user guest from 128.14.226.107 port 41036
Sep  9 18:00:00 onepixel sshd[2890078]: Failed password for invalid user guest from 128.14.226.107 port 41036 ssh2
2020-09-10 13:06:11
128.14.226.107 attackspambots
Sep  9 17:55:36 onepixel sshd[2889395]: Failed password for invalid user zaq1xsw2 from 128.14.226.107 port 34006 ssh2
Sep  9 17:59:58 onepixel sshd[2890078]: Invalid user guest from 128.14.226.107 port 41036
Sep  9 17:59:58 onepixel sshd[2890078]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.14.226.107 
Sep  9 17:59:58 onepixel sshd[2890078]: Invalid user guest from 128.14.226.107 port 41036
Sep  9 18:00:00 onepixel sshd[2890078]: Failed password for invalid user guest from 128.14.226.107 port 41036 ssh2
2020-09-10 03:51:33
128.14.226.159 attackbots
$f2bV_matches
2020-09-02 21:29:55
128.14.226.159 attackspambots
$f2bV_matches
2020-09-02 13:24:09
128.14.226.159 attackspam
Aug  3 06:52:44 server sshd[23021]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.14.226.159  user=root
Aug  3 06:52:46 server sshd[23021]: Failed password for invalid user root from 128.14.226.159 port 58538 ssh2
Aug  3 09:37:36 server sshd[32338]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.14.226.159  user=root
Aug  3 09:37:39 server sshd[32338]: Failed password for invalid user root from 128.14.226.159 port 39586 ssh2
2020-09-02 06:26:30
128.14.226.199 attackbotsspam
Time:     Mon Aug 24 03:57:29 2020 +0000
IP:       128.14.226.199 (-)
Failures: 5 (sshd)
Interval: 3600 seconds
Blocked:  Permanent Block [LF_SSHD]

Log entries:

Aug 24 03:42:59 ca-16-ede1 sshd[19006]: Invalid user joana from 128.14.226.199 port 39606
Aug 24 03:43:01 ca-16-ede1 sshd[19006]: Failed password for invalid user joana from 128.14.226.199 port 39606 ssh2
Aug 24 03:53:20 ca-16-ede1 sshd[20304]: Invalid user vsftp from 128.14.226.199 port 44222
Aug 24 03:53:22 ca-16-ede1 sshd[20304]: Failed password for invalid user vsftp from 128.14.226.199 port 44222 ssh2
Aug 24 03:57:28 ca-16-ede1 sshd[20849]: Invalid user telekom from 128.14.226.199 port 49302
2020-08-24 12:35:43
128.14.226.199 attackspam
SSH Brute-Forcing (server1)
2020-08-23 03:38:55
Whois info:
#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2025, American Registry for Internet Numbers, Ltd.
#



# start

NetRange:       128.14.0.0 - 128.14.255.255
CIDR:           128.14.0.0/16
NetName:        ZL-LAX3-004
NetHandle:      NET-128-14-0-0-1
Parent:         NET128 (NET-128-0-0-0-0)
NetType:        Direct Allocation
OriginAS:       
Organization:   Zenlayer Inc (ZENLA-7)
RegDate:        2016-09-07
Updated:        2018-01-12
Ref:            https://rdap.arin.net/registry/ip/128.14.0.0


OrgName:        Zenlayer Inc
OrgId:          ZENLA-7
Address:        21680 Gateway Center Dr. Suite 350
City:           Diamond Bar
StateProv:      CA
PostalCode:     91765
Country:        US
RegDate:        2017-12-27
Updated:        2025-09-04
Ref:            https://rdap.arin.net/registry/entity/ZENLA-7


OrgAbuseHandle: SOCOP-ARIN
OrgAbuseName:   SOC Ops
OrgAbusePhone:  +1-909-718-3558 
OrgAbuseEmail:  abuse@zenlayer.com
OrgAbuseRef:    https://rdap.arin.net/registry/entity/SOCOP-ARIN

OrgNOCHandle: IPNOC27-ARIN
OrgNOCName:   IPNOC
OrgNOCPhone:  +1-800-858-7986 
OrgNOCEmail:  ipnoc-t3@zenlayer.com
OrgNOCRef:    https://rdap.arin.net/registry/entity/IPNOC27-ARIN

OrgNOCHandle: IPADM641-ARIN
OrgNOCName:   IP ADMIN
OrgNOCPhone:  +1-909-718-3558 
OrgNOCEmail:  ipadmin@zenlayer.com
OrgNOCRef:    https://rdap.arin.net/registry/entity/IPADM641-ARIN

OrgTechHandle: IPADM641-ARIN
OrgTechName:   IP ADMIN
OrgTechPhone:  +1-909-718-3558 
OrgTechEmail:  ipadmin@zenlayer.com
OrgTechRef:    https://rdap.arin.net/registry/entity/IPADM641-ARIN

OrgTechHandle: IPNOC27-ARIN
OrgTechName:   IPNOC
OrgTechPhone:  +1-800-858-7986 
OrgTechEmail:  ipnoc-t3@zenlayer.com
OrgTechRef:    https://rdap.arin.net/registry/entity/IPNOC27-ARIN

OrgTechHandle: TANGR16-ARIN
OrgTechName:   Tang, Ruifan 
OrgTechPhone:  +1-800-858-7986 
OrgTechEmail:  ruifan.tang@zenlayer.com
OrgTechRef:    https://rdap.arin.net/registry/entity/TANGR16-ARIN

# end


# start

NetRange:       128.14.226.0 - 128.14.226.255
CIDR:           128.14.226.0/24
NetName:        ZL-LAX-UCLOUD-0003
NetHandle:      NET-128-14-226-0-1
Parent:         ZL-LAX3-004 (NET-128-14-0-0-1)
NetType:        Reassigned
OriginAS:       
Organization:   UCLOUD (UCLOU-1)
RegDate:        2019-02-28
Updated:        2019-02-28
Comment:        Abuse please contact:unoc@ucloud.cn ,unom@ucloud.cn,hegui@ucloud.cn
Ref:            https://rdap.arin.net/registry/ip/128.14.226.0


OrgName:        UCLOUD
OrgId:          UCLOU-1
Address:        FLAT/RM 603 6/   FLAWS COMMERCIAL PLAZA 788 CHEUNG SHA WAN ROAD  KL
City:           Hong Kong
StateProv:      
PostalCode:     
Country:        HK
RegDate:        2019-02-28
Updated:        2019-02-28
Ref:            https://rdap.arin.net/registry/entity/UCLOU-1


OrgAbuseHandle: IAU2-ARIN
OrgAbuseName:   IP ABUSE Ucloud
OrgAbusePhone:  +86 17721465033 
OrgAbuseEmail:  hegui@ucloud.cn
OrgAbuseRef:    https://rdap.arin.net/registry/entity/IAU2-ARIN

OrgTechHandle: IAU2-ARIN
OrgTechName:   IP ABUSE Ucloud
OrgTechPhone:  +86 17721465033 
OrgTechEmail:  hegui@ucloud.cn
OrgTechRef:    https://rdap.arin.net/registry/entity/IAU2-ARIN

# end



#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2025, American Registry for Internet Numbers, Ltd.
#
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 128.14.226.191
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 24432
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;128.14.226.191.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025120201 1800 900 604800 86400

;; Query time: 37 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Dec 03 06:30:06 CST 2025
;; MSG SIZE  rcvd: 107
Host info
Host 191.226.14.128.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 191.226.14.128.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
222.186.30.35 attackbots
Apr  4 00:30:13 vpn01 sshd[25345]: Failed password for root from 222.186.30.35 port 18109 ssh2
Apr  4 00:30:15 vpn01 sshd[25345]: Failed password for root from 222.186.30.35 port 18109 ssh2
...
2020-04-04 06:39:45
88.88.40.133 attackbots
Apr  3 22:19:21 IngegnereFirenze sshd[16130]: Failed password for invalid user qm from 88.88.40.133 port 54670 ssh2
...
2020-04-04 06:26:14
111.229.149.86 attackbots
2020-04-03T23:35:56.721815librenms sshd[15770]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.229.149.86  user=root
2020-04-03T23:35:58.588603librenms sshd[15770]: Failed password for root from 111.229.149.86 port 55258 ssh2
2020-04-03T23:41:19.145393librenms sshd[16487]: Invalid user user from 111.229.149.86 port 34120
...
2020-04-04 06:32:36
151.75.86.142 attackbots
Apr  3 23:41:02 debian-2gb-nbg1-2 kernel: \[8209100.456572\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=151.75.86.142 DST=195.201.40.59 LEN=48 TOS=0x00 PREC=0x00 TTL=114 ID=14966 DF PROTO=TCP SPT=51380 DPT=40 WINDOW=8192 RES=0x00 SYN URGP=0
2020-04-04 06:49:13
134.196.136.98 attack
1585950082 - 04/03/2020 23:41:22 Host: 134.196.136.98/134.196.136.98 Port: 445 TCP Blocked
2020-04-04 06:27:36
45.6.72.17 attackspam
Invalid user ysg from 45.6.72.17 port 56056
2020-04-04 06:34:14
51.83.45.93 attackspam
Invalid user kyana from 51.83.45.93 port 33850
2020-04-04 06:36:56
106.13.93.91 attackbots
$f2bV_matches
2020-04-04 06:29:22
190.12.1.242 attackbotsspam
SSH Authentication Attempts Exceeded
2020-04-04 06:38:36
5.135.94.191 attackspambots
[ssh] SSH attack
2020-04-04 06:39:20
51.38.37.254 attackbots
Invalid user choopa from 51.38.37.254 port 60396
2020-04-04 06:31:06
113.87.131.244 attack
Apr  4 08:28:47 our-server-hostname sshd[27392]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=113.87.131.244  user=r.r
Apr  4 08:28:49 our-server-hostname sshd[27392]: Failed password for r.r from 113.87.131.244 port 53350 ssh2
Apr  4 08:32:31 our-server-hostname sshd[28259]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=113.87.131.244  user=r.r
Apr  4 08:32:33 our-server-hostname sshd[28259]: Failed password for r.r from 113.87.131.244 port 56076 ssh2
Apr  4 08:35:33 our-server-hostname sshd[29000]: Invalid user lijin from 113.87.131.244
Apr  4 08:35:33 our-server-hostname sshd[29000]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=113.87.131.244 
Apr  4 08:35:35 our-server-hostname sshd[29000]: Failed password for invalid user lijin from 113.87.131.244 port 56420 ssh2


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=113.87.131.244
2020-04-04 06:48:28
89.134.119.205 attackbotsspam
Automatic report - Port Scan Attack
2020-04-04 06:25:58
52.130.76.130 attack
Invalid user gdjenkins from 52.130.76.130 port 46006
2020-04-04 07:02:25
138.197.113.240 attack
Invalid user emery from 138.197.113.240 port 48625
2020-04-04 06:35:36

Recently Reported IPs

10.3.3.87 180.153.236.27 180.153.236.171 10.40.202.209
38.157.254.107 192.168.7.162 103.30.92.188 195.24.236.148
180.163.64.52 120.231.182.119 38.60.89.45 67.205.179.196
34.122.105.182 10.95.224.139 113.215.188.173 115.45.40.214
38.71.24.72 143.110.165.7 107.170.190.202 3.253.195.116