Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Shenzhen

Region: Guangdong

Country: China

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 14.117.126.114
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 48888
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;14.117.126.114.			IN	A

;; AUTHORITY SECTION:
.			533	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019101200 1800 900 604800 86400

;; Query time: 249 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Oct 13 02:10:15 CST 2019
;; MSG SIZE  rcvd: 118
Host info
Host 114.126.117.14.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 114.126.117.14.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
112.53.97.139 attack
scan z
2019-11-29 14:41:30
132.248.52.241 attack
Nov 29 05:58:20 web8 sshd\[20020\]: Invalid user tomotaka from 132.248.52.241
Nov 29 05:58:20 web8 sshd\[20020\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=132.248.52.241
Nov 29 05:58:23 web8 sshd\[20020\]: Failed password for invalid user tomotaka from 132.248.52.241 port 46346 ssh2
Nov 29 06:06:04 web8 sshd\[23604\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=132.248.52.241  user=bin
Nov 29 06:06:05 web8 sshd\[23604\]: Failed password for bin from 132.248.52.241 port 36867 ssh2
2019-11-29 14:08:37
14.228.103.201 attackspambots
19/11/28@23:56:56: FAIL: Alarm-Intrusion address from=14.228.103.201
...
2019-11-29 14:12:04
171.252.251.130 attackbots
Automatic report - Port Scan Attack
2019-11-29 14:11:18
61.164.101.21 attackbotsspam
localhost 61.164.101.21 - - [29/Nov/2019:12:56:51 +0800] "GET /robots.txt HTTP/1.1" 404 261 "-" "Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 5.2; Trident/4.0)" VLOG=-
localhost 61.164.101.21 - - [29/Nov/2019:12:56:51 +0800] "POST /Adminf3d185dc/Login.php HTTP/1.1" 404 261 "-" "Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 5.2; Trident/4.0)" VLOG=-
localhost 61.164.101.21 - - [29/Nov/2019:12:56:52 +0800] "GET /l.php HTTP/1.1" 404 16 "-" "Mozilla/5.0 (Windows NT 6.1) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/66.0.3359.139 Safari/537.36" VLOG=-
localhost 61.164.101.21 - - [29/Nov/2019:12:56:52 +0800] "GET /phpinfo.php HTTP/1.1" 404 16 "-" "Mozilla/5.0 (Windows NT 6.1) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/66.0.3359.139 Safari/537.36" VLOG=-
localhost 61.164.101.21 - - [29/Nov/2019:12:56:52 +0800] "GET /test.php HTTP/1.1" 404 16 "-" "Mozilla/5.0 (Windows NT 6.1) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/66.0.3359.139 Safari/537.36" VLOG=-
localhost 61.164.101.21 - - [29/N
...
2019-11-29 14:16:25
94.21.243.204 attackspambots
Nov 29 07:44:55 MK-Soft-VM5 sshd[1502]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=94.21.243.204 
Nov 29 07:44:57 MK-Soft-VM5 sshd[1502]: Failed password for invalid user web from 94.21.243.204 port 52093 ssh2
...
2019-11-29 14:46:26
149.56.131.73 attack
Nov 29 05:55:34 hcbbdb sshd\[18658\]: Invalid user ddddddd from 149.56.131.73
Nov 29 05:55:34 hcbbdb sshd\[18658\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=73.ip-149-56-131.net
Nov 29 05:55:36 hcbbdb sshd\[18658\]: Failed password for invalid user ddddddd from 149.56.131.73 port 44748 ssh2
Nov 29 05:58:47 hcbbdb sshd\[19002\]: Invalid user kylee from 149.56.131.73
Nov 29 05:58:47 hcbbdb sshd\[19002\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=73.ip-149-56-131.net
2019-11-29 14:25:54
106.51.33.29 attackbotsspam
Nov 28 19:47:46 auw2 sshd\[20232\]: Invalid user ultras95 from 106.51.33.29
Nov 28 19:47:46 auw2 sshd\[20232\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.51.33.29
Nov 28 19:47:48 auw2 sshd\[20232\]: Failed password for invalid user ultras95 from 106.51.33.29 port 41278 ssh2
Nov 28 19:51:09 auw2 sshd\[20499\]: Invalid user qweewq1 from 106.51.33.29
Nov 28 19:51:09 auw2 sshd\[20499\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.51.33.29
2019-11-29 14:19:44
154.8.209.64 attackspambots
Nov 29 07:03:34 herz-der-gamer sshd[27532]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=154.8.209.64  user=root
Nov 29 07:03:35 herz-der-gamer sshd[27532]: Failed password for root from 154.8.209.64 port 47698 ssh2
Nov 29 07:30:44 herz-der-gamer sshd[27745]: Invalid user w from 154.8.209.64 port 55684
...
2019-11-29 14:40:56
217.182.74.253 attackbots
SpamReport
2019-11-29 14:49:55
185.175.93.14 attackspambots
11/29/2019-06:58:08.340590 185.175.93.14 Protocol: 6 ET DROP Dshield Block Listed Source group 1
2019-11-29 14:11:01
177.20.172.25 attack
Unauthorised access (Nov 29) SRC=177.20.172.25 LEN=40 TTL=239 ID=39812 DF TCP DPT=8080 WINDOW=14600 SYN
2019-11-29 14:20:03
37.59.119.181 attack
Nov 28 20:12:43 sachi sshd\[9138\]: Invalid user ryanryan from 37.59.119.181
Nov 28 20:12:43 sachi sshd\[9138\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=181.ip-37-59-119.eu
Nov 28 20:12:45 sachi sshd\[9138\]: Failed password for invalid user ryanryan from 37.59.119.181 port 37972 ssh2
Nov 28 20:15:47 sachi sshd\[9432\]: Invalid user P@ssw0rd from 37.59.119.181
Nov 28 20:15:47 sachi sshd\[9432\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=181.ip-37-59-119.eu
2019-11-29 14:25:29
46.101.187.76 attackspam
Nov 29 07:04:07 localhost sshd\[23296\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=46.101.187.76  user=root
Nov 29 07:04:09 localhost sshd\[23296\]: Failed password for root from 46.101.187.76 port 51820 ssh2
Nov 29 07:07:10 localhost sshd\[23597\]: Invalid user ermisch from 46.101.187.76 port 41137
2019-11-29 14:23:43
142.93.218.11 attackspam
Unauthorized SSH login attempts
2019-11-29 14:06:27

Recently Reported IPs

180.76.53.114 195.54.8.206 83.242.81.250 107.196.20.202
97.192.62.147 85.211.45.219 93.11.161.1 187.3.64.211
121.6.214.250 72.140.0.182 131.111.104.76 64.170.144.155
123.68.79.110 201.127.194.1 180.125.214.46 52.178.142.12
109.133.104.45 68.116.152.242 75.87.183.88 222.210.117.240