Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: Chongqing

Country: China

Internet Service Provider: unknown

Hostname: unknown

Organization: No.31,Jin-rong Street

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 14.109.117.134
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 28110
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;14.109.117.134.			IN	A

;; AUTHORITY SECTION:
.			1084	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019071200 1800 900 604800 86400

;; Query time: 1 msec
;; SERVER: 67.207.67.2#53(67.207.67.2)
;; WHEN: Sat Jul 13 01:42:50 CST 2019
;; MSG SIZE  rcvd: 118
Host info
Host 134.117.109.14.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		67.207.67.2
Address:	67.207.67.2#53

** server can't find 134.117.109.14.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
129.211.45.88 attackspam
Sep  3 06:39:30 ny01 sshd[10756]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.211.45.88
Sep  3 06:39:32 ny01 sshd[10756]: Failed password for invalid user ec2-user from 129.211.45.88 port 44062 ssh2
Sep  3 06:41:24 ny01 sshd[10967]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.211.45.88
2020-09-03 19:04:16
218.92.0.199 attackspambots
Sep  3 12:24:28 vpn01 sshd[1514]: Failed password for root from 218.92.0.199 port 62861 ssh2
...
2020-09-03 19:06:05
165.22.122.246 attackbots
Sep  3 06:47:20 vps46666688 sshd[26933]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.22.122.246
Sep  3 06:47:22 vps46666688 sshd[26933]: Failed password for invalid user bruna from 165.22.122.246 port 50620 ssh2
...
2020-09-03 19:32:21
173.254.225.99 attack
SP-Scan 48277:445 detected 2020.09.02 02:08:07
blocked until 2020.10.21 19:10:54
2020-09-03 19:39:39
80.82.77.212 attack
UDP ports : 17 / 1433 / 1604 / 1701 / 1723 / 1900 / 3283 / 3702 / 5353 / 8888 / 17185 / 32769 / 49152 / 49154
2020-09-03 19:26:12
119.147.139.244 attackspam
Fail2Ban Ban Triggered
2020-09-03 19:18:28
161.35.100.118 attack
TCP ports : 902 / 28264
2020-09-03 19:15:33
208.68.4.129 attackbots
Brute force SMTP login attempted.
...
2020-09-03 19:31:47
217.115.213.186 attack
Dovecot Invalid User Login Attempt.
2020-09-03 19:30:16
14.169.17.135 attack
1599064801 - 09/02/2020 18:40:01 Host: 14.169.17.135/14.169.17.135 Port: 445 TCP Blocked
2020-09-03 19:32:48
122.51.37.133 attackbotsspam
Sep  3 06:15:14 gospond sshd[13031]: Invalid user admin1 from 122.51.37.133 port 41152
...
2020-09-03 19:23:46
106.13.50.219 attackspam
(sshd) Failed SSH login from 106.13.50.219 (CN/China/-): 5 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: Sep  3 01:43:25 server sshd[13990]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.50.219  user=root
Sep  3 01:43:27 server sshd[13990]: Failed password for root from 106.13.50.219 port 49370 ssh2
Sep  3 02:00:52 server sshd[18563]: Invalid user guest from 106.13.50.219 port 50700
Sep  3 02:00:54 server sshd[18563]: Failed password for invalid user guest from 106.13.50.219 port 50700 ssh2
Sep  3 02:03:49 server sshd[19321]: Invalid user postgres from 106.13.50.219 port 56616
2020-09-03 19:25:41
77.247.181.165 attackspambots
Sep  3 12:32:15 [Censored Hostname] sshd[4263]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=77.247.181.165 
Sep  3 12:32:17 [Censored Hostname] sshd[4263]: Failed password for invalid user admin from 77.247.181.165 port 8858 ssh2[...]
2020-09-03 19:19:34
193.176.86.166 attack
RDPBruteCAu
2020-09-03 19:29:07
36.111.182.49 attackbotsspam
25383/tcp 30244/tcp 20711/tcp...
[2020-07-03/09-03]34pkt,29pt.(tcp)
2020-09-03 19:42:27

Recently Reported IPs

2003:d7:9f01:dd00:943f:c55e:9a5f:605d 112.133.38.120 79.232.142.210 76.45.99.36
183.165.224.157 190.131.212.122 88.33.110.49 57.122.88.205
85.127.117.58 188.167.131.68 34.233.9.175 27.57.61.16
1.12.166.34 119.106.93.250 60.213.127.88 222.180.159.216
1.47.130.246 5.9.132.163 216.231.129.35 32.164.243.240