Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States of America (the)

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 129.14.214.111
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 50034
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;129.14.214.111.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025012700 1800 900 604800 86400

;; Query time: 16 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Jan 27 18:42:53 CST 2025
;; MSG SIZE  rcvd: 107
Host info
Host 111.214.14.129.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 111.214.14.129.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
165.22.61.82 attack
Jul 31 04:12:10 Tower sshd[25409]: Connection from 165.22.61.82 port 60062 on 192.168.10.220 port 22 rdomain ""
Jul 31 04:12:12 Tower sshd[25409]: Failed password for root from 165.22.61.82 port 60062 ssh2
Jul 31 04:12:12 Tower sshd[25409]: Received disconnect from 165.22.61.82 port 60062:11: Bye Bye [preauth]
Jul 31 04:12:12 Tower sshd[25409]: Disconnected from authenticating user root 165.22.61.82 port 60062 [preauth]
2020-07-31 16:34:26
103.151.125.190 attackspambots
(smtpauth) Failed SMTP AUTH login from 103.151.125.190 (-): 1 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_TRIGGER; Logs: 2020-07-31 08:21:10 login authenticator failed for (6bfI8Q) [103.151.125.190]: 535 Incorrect authentication data (set_id=info@yas-co.com)
2020-07-31 16:28:56
222.186.30.35 attackbots
2020-07-31T08:52:32.103996dmca.cloudsearch.cf sshd[19746]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.30.35  user=root
2020-07-31T08:52:34.488056dmca.cloudsearch.cf sshd[19746]: Failed password for root from 222.186.30.35 port 23255 ssh2
2020-07-31T08:52:37.037597dmca.cloudsearch.cf sshd[19746]: Failed password for root from 222.186.30.35 port 23255 ssh2
2020-07-31T08:52:32.103996dmca.cloudsearch.cf sshd[19746]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.30.35  user=root
2020-07-31T08:52:34.488056dmca.cloudsearch.cf sshd[19746]: Failed password for root from 222.186.30.35 port 23255 ssh2
2020-07-31T08:52:37.037597dmca.cloudsearch.cf sshd[19746]: Failed password for root from 222.186.30.35 port 23255 ssh2
2020-07-31T08:52:32.103996dmca.cloudsearch.cf sshd[19746]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.30.35  user=root
2020-07-
...
2020-07-31 16:54:11
81.68.74.171 attackbots
fail2ban/Jul 31 08:10:43 h1962932 sshd[16829]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=81.68.74.171  user=root
Jul 31 08:10:46 h1962932 sshd[16829]: Failed password for root from 81.68.74.171 port 38324 ssh2
Jul 31 08:14:33 h1962932 sshd[16941]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=81.68.74.171  user=root
Jul 31 08:14:35 h1962932 sshd[16941]: Failed password for root from 81.68.74.171 port 54646 ssh2
Jul 31 08:18:20 h1962932 sshd[17065]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=81.68.74.171  user=root
Jul 31 08:18:22 h1962932 sshd[17065]: Failed password for root from 81.68.74.171 port 42734 ssh2
2020-07-31 16:23:56
62.31.58.23 attackbots
Automatic report - Windows Brute-Force Attack
2020-07-31 16:38:25
78.232.192.171 attack
2020-07-31T03:51:05.212396server.espacesoutien.com sshd[27273]: Failed password for invalid user pi from 78.232.192.171 port 52568 ssh2
2020-07-31T03:51:03.238412server.espacesoutien.com sshd[27274]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=78.232.192.171
2020-07-31T03:51:03.072121server.espacesoutien.com sshd[27274]: Invalid user pi from 78.232.192.171 port 52574
2020-07-31T03:51:05.318587server.espacesoutien.com sshd[27274]: Failed password for invalid user pi from 78.232.192.171 port 52574 ssh2
...
2020-07-31 16:39:40
193.77.242.110 attackspambots
Dovecot Invalid User Login Attempt.
2020-07-31 16:41:38
193.32.161.143 attackspambots
07/31/2020-04:21:25.296981 193.32.161.143 Protocol: 6 ET DROP Dshield Block Listed Source group 1
2020-07-31 16:30:52
139.59.33.232 attackspam
139.59.33.232 - - [31/Jul/2020:08:19:13 +0100] "POST /wp-login.php HTTP/1.1" 200 1969 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
139.59.33.232 - - [31/Jul/2020:08:19:19 +0100] "POST /wp-login.php HTTP/1.1" 200 1954 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
139.59.33.232 - - [31/Jul/2020:08:19:20 +0100] "POST /xmlrpc.php HTTP/1.1" 403 219 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
...
2020-07-31 16:23:38
187.176.185.65 attackspam
SSH Brute Force
2020-07-31 16:41:56
187.95.188.136 attackbots
Distributed brute force attack
2020-07-31 16:49:05
164.77.114.165 attackspam
Jul 31 09:14:56 Ubuntu-1404-trusty-64-minimal sshd\[1480\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=164.77.114.165  user=root
Jul 31 09:14:58 Ubuntu-1404-trusty-64-minimal sshd\[1480\]: Failed password for root from 164.77.114.165 port 56002 ssh2
Jul 31 09:23:37 Ubuntu-1404-trusty-64-minimal sshd\[8166\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=164.77.114.165  user=root
Jul 31 09:23:40 Ubuntu-1404-trusty-64-minimal sshd\[8166\]: Failed password for root from 164.77.114.165 port 52340 ssh2
Jul 31 09:28:07 Ubuntu-1404-trusty-64-minimal sshd\[11545\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=164.77.114.165  user=root
2020-07-31 16:32:25
49.233.130.95 attack
detected by Fail2Ban
2020-07-31 16:42:40
111.229.63.223 attack
Invalid user xiangzhaokun from 111.229.63.223 port 49864
2020-07-31 16:37:21
217.182.73.36 attackbots
217.182.73.36 - - [31/Jul/2020:07:58:59 +0100] "POST /wp-login.php HTTP/1.1" 200 2083 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
217.182.73.36 - - [31/Jul/2020:07:59:00 +0100] "POST /wp-login.php HTTP/1.1" 200 2060 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
217.182.73.36 - - [31/Jul/2020:07:59:01 +0100] "POST /wp-login.php HTTP/1.1" 200 2063 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
...
2020-07-31 16:27:31

Recently Reported IPs

141.248.96.66 120.11.255.191 93.130.20.240 16.174.219.92
51.133.139.197 135.213.46.223 247.181.192.21 73.108.237.32
147.40.15.144 170.48.159.29 142.136.74.43 218.48.68.25
251.114.250.132 137.242.86.189 76.148.119.26 247.47.55.109
149.53.193.252 153.112.35.251 91.246.182.115 210.133.68.192