Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: China

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 14.108.199.129
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 61937
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;14.108.199.129.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2024120700 1800 900 604800 86400

;; Query time: 14 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Dec 07 19:40:49 CST 2024
;; MSG SIZE  rcvd: 107
Host info
Host 129.199.108.14.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 129.199.108.14.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
78.128.113.178 attack
20 attempts against mh_ha-misbehave-ban on oak
2020-02-02 14:04:34
52.89.162.95 attackspam
02/02/2020-06:44:32.802593 52.89.162.95 Protocol: 6 SURICATA TLS invalid record/traffic
2020-02-02 13:59:53
201.7.210.50 attack
Automatic report - Banned IP Access
2020-02-02 14:13:23
107.180.123.21 attackbots
US - - [19 Nov 2018:03:13:06 +0300] "\n" 400 10118 "-" "-"
2020-02-02 14:26:12
107.183.162.2 attackspam
US - - [05 Jul 2019:04:20:29 +0300] "GET  phpmyadmin index.php HTTP 1.1" 404 10091 "-" "Mozilla 5.0 Windows NT 6.1; WOW64; rv:18.0 Gecko 20100101 Firefox 18.0"
2020-02-02 13:55:48
222.186.175.147 attackspam
Feb  2 11:36:55 areeb-Workstation sshd[17610]: Failed password for root from 222.186.175.147 port 3006 ssh2
Feb  2 11:37:01 areeb-Workstation sshd[17610]: Failed password for root from 222.186.175.147 port 3006 ssh2
...
2020-02-02 14:18:11
45.134.179.20 attack
Type	Date/Time	Event Description
info	    Feb 1       21:47:08	
IN=br1 MAC=94:c1:50:cd:6f:b4 SRC=45.134.179.20 DST=XXX.XXX.XXX.XXX LEN=52 TTL=108 PROTO=TCP DPT=5900 Accessing Pinhole
2020-02-02 14:51:15
112.85.42.178 attackbots
Feb  2 07:02:40 * sshd[1895]: Failed password for root from 112.85.42.178 port 63374 ssh2
Feb  2 07:02:53 * sshd[1895]: error: maximum authentication attempts exceeded for root from 112.85.42.178 port 63374 ssh2 [preauth]
2020-02-02 14:11:54
49.88.112.60 attackspambots
Feb  2 07:30:15 pkdns2 sshd\[38051\]: Failed password for root from 49.88.112.60 port 39645 ssh2Feb  2 07:31:00 pkdns2 sshd\[38057\]: Failed password for root from 49.88.112.60 port 44366 ssh2Feb  2 07:31:03 pkdns2 sshd\[38057\]: Failed password for root from 49.88.112.60 port 44366 ssh2Feb  2 07:31:04 pkdns2 sshd\[38057\]: Failed password for root from 49.88.112.60 port 44366 ssh2Feb  2 07:31:18 pkdns2 sshd\[38084\]: Failed password for root from 49.88.112.60 port 54499 ssh2Feb  2 07:32:04 pkdns2 sshd\[38088\]: Failed password for root from 49.88.112.60 port 38598 ssh2
...
2020-02-02 13:45:38
92.118.37.67 attackspambots
Feb  2 06:47:44 mail kernel: [31925.824054] [UFW BLOCK] IN=eth0 OUT= MAC=00:16:3c:05:0d:89:f8:66:f2:68:66:ff:08:00 SRC=92.118.37.67 DST=77.73.69.240 LEN=40 TOS=0x00 PREC=0x00 TTL=250 ID=12967 PROTO=TCP SPT=50731 DPT=21633 WINDOW=1024 RES=0x00 SYN URGP=0 
...
2020-02-02 13:49:40
218.92.0.178 attackbots
pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.178  user=root
Failed password for root from 218.92.0.178 port 25800 ssh2
Failed password for root from 218.92.0.178 port 25800 ssh2
Failed password for root from 218.92.0.178 port 25800 ssh2
Failed password for root from 218.92.0.178 port 25800 ssh2
2020-02-02 14:09:08
188.118.18.16 attackspambots
Feb  2 06:47:39 vps647732 sshd[16394]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.118.18.16
Feb  2 06:47:41 vps647732 sshd[16394]: Failed password for invalid user jenkins from 188.118.18.16 port 43474 ssh2
...
2020-02-02 14:04:16
155.93.247.26 attackspambots
$f2bV_matches
2020-02-02 14:07:34
183.102.85.214 attackbots
Honeypot attack, port: 81, PTR: PTR record not found
2020-02-02 14:27:38
82.117.190.170 attackbots
Invalid user udadhisuta from 82.117.190.170 port 43402
2020-02-02 14:27:14

Recently Reported IPs

93.26.50.124 157.11.245.126 155.227.238.86 146.155.18.153
192.168.2.229 209.170.27.226 109.172.32.23 76.97.24.188
140.110.239.176 199.136.13.118 237.5.6.62 38.193.144.176
72.26.37.4 38.4.145.174 52.218.126.176 165.235.202.15
139.41.45.37 20.26.64.108 200.12.47.153 41.119.136.221