Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: China

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 14.104.114.3
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 52636
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;14.104.114.3.			IN	A

;; AUTHORITY SECTION:
.			600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022021300 1800 900 604800 86400

;; Query time: 16 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Feb 13 14:37:50 CST 2022
;; MSG SIZE  rcvd: 105
Host info
Host 3.114.104.14.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 3.114.104.14.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
193.109.144.20 attackspambots
Jun 25 00:04:15 nextcloud sshd\[18040\]: Invalid user admin from 193.109.144.20
Jun 25 00:04:15 nextcloud sshd\[18040\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=193.109.144.20
Jun 25 00:04:17 nextcloud sshd\[18040\]: Failed password for invalid user admin from 193.109.144.20 port 49286 ssh2
...
2019-06-25 08:50:31
185.26.136.253 attackspambots
Autoban   185.26.136.253 AUTH/CONNECT
2019-06-25 08:57:00
186.122.169.86 attackspambots
Autoban   186.122.169.86 AUTH/CONNECT
2019-06-25 08:29:42
185.50.185.102 attack
Autoban   185.50.185.102 AUTH/CONNECT
2019-06-25 08:47:10
186.192.29.223 attackbots
Autoban   186.192.29.223 AUTH/CONNECT
2019-06-25 08:14:33
185.34.16.242 attackspam
Autoban   185.34.16.242 AUTH/CONNECT
2019-06-25 08:52:30
185.52.142.38 attackspambots
Autoban   185.52.142.38 AUTH/CONNECT
2019-06-25 08:44:38
177.170.110.116 attackspam
port scan and connect, tcp 8080 (http-proxy)
2019-06-25 09:01:05
186.103.195.62 attackbots
Autoban   186.103.195.62 AUTH/CONNECT
2019-06-25 08:31:20
186.19.74.83 attack
Autoban   186.19.74.83 AUTH/CONNECT
2019-06-25 08:15:03
78.111.243.210 attack
Joomla Brute Force
2019-06-25 08:49:26
186.0.138.30 attackbots
Autoban   186.0.138.30 AUTH/CONNECT
2019-06-25 08:34:10
186.134.208.219 attack
Autoban   186.134.208.219 AUTH/CONNECT
2019-06-25 08:27:13
186.103.167.182 attack
Autoban   186.103.167.182 AUTH/CONNECT
2019-06-25 08:32:10
218.92.0.207 attack
Jun 24 20:35:17 plusreed sshd[17099]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.207  user=root
Jun 24 20:35:18 plusreed sshd[17099]: Failed password for root from 218.92.0.207 port 64687 ssh2
...
2019-06-25 08:48:25

Recently Reported IPs

14.102.74.139 14.106.230.252 14.102.74.3 14.108.216.81
14.11.163.162 14.106.52.190 14.110.218.30 14.111.23.88
14.111.14.89 14.112.212.208 14.109.210.108 14.113.242.25
14.112.230.102 14.111.62.15 14.118.157.53 14.118.208.221
14.111.237.177 14.116.159.210 14.118.236.234 14.117.151.231