Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Korea Republic of

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 14.129.117.220
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 57591
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;14.129.117.220.			IN	A

;; AUTHORITY SECTION:
.			327	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022022601 1800 900 604800 86400

;; Query time: 29 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Feb 27 12:58:30 CST 2022
;; MSG SIZE  rcvd: 107
Host info
220.117.129.14.in-addr.arpa domain name pointer gasan-servers-117.makeshop.co.kr.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
220.117.129.14.in-addr.arpa	name = gasan-servers-117.makeshop.co.kr.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
184.105.247.196 attack
 TCP (SYN) 184.105.247.196:46723 -> port 11211, len 44
2020-09-20 20:04:10
181.46.68.97 attack
2020-09-19 11:55:29.685189-0500  localhost smtpd[24990]: NOQUEUE: reject: RCPT from unknown[181.46.68.97]: 554 5.7.1 Service unavailable; Client host [181.46.68.97] blocked using zen.spamhaus.org; https://www.spamhaus.org/query/ip/181.46.68.97; from= to= proto=ESMTP helo=
2020-09-20 20:39:03
103.48.69.226 attackbots
2020-09-19 11:56:50.662297-0500  localhost smtpd[24990]: NOQUEUE: reject: RCPT from unknown[103.48.69.226]: 554 5.7.1 Service unavailable; Client host [103.48.69.226] blocked using zen.spamhaus.org; https://www.spamhaus.org/query/ip/103.48.69.226; from= to= proto=ESMTP helo=<[103.48.69.226]>
2020-09-20 20:36:08
49.88.112.69 attackspam
Sep 20 11:29:55 ssh2 sshd[50050]: Disconnected from 49.88.112.69 port 36535 [preauth]
Sep 20 11:31:31 ssh2 sshd[50054]: Disconnected from 49.88.112.69 port 44826 [preauth]
Sep 20 11:33:10 ssh2 sshd[50061]: Disconnected from 49.88.112.69 port 43411 [preauth]
...
2020-09-20 20:18:47
185.220.102.244 attackbots
Sep 20 08:10:55 scw-tender-jepsen sshd[22585]: Failed password for root from 185.220.102.244 port 17600 ssh2
Sep 20 08:10:57 scw-tender-jepsen sshd[22585]: Failed password for root from 185.220.102.244 port 17600 ssh2
Sep 20 08:10:57 scw-tender-jepsen sshd[22585]: Failed password for root from 185.220.102.244 port 17600 ssh2
2020-09-20 20:28:03
177.100.244.79 attackspam
2020-09-19 11:57:35.885403-0500  localhost smtpd[24990]: NOQUEUE: reject: RCPT from unknown[177.100.244.79]: 554 5.7.1 Service unavailable; Client host [177.100.244.79] blocked using zen.spamhaus.org; https://www.spamhaus.org/sbl/query/SBLCSS / https://www.spamhaus.org/query/ip/177.100.244.79; from= to= proto=ESMTP helo=
2020-09-20 20:35:24
111.67.56.6 attackbotsspam
 TCP (SYN) 111.67.56.6:40883 -> port 23, len 44
2020-09-20 20:29:03
161.35.88.163 attackspam
2020-09-20T06:35:22.355074server.mjenks.net sshd[2174906]: Failed password for invalid user ts3server from 161.35.88.163 port 42196 ssh2
2020-09-20T06:39:07.642809server.mjenks.net sshd[2175302]: Invalid user admin from 161.35.88.163 port 54750
2020-09-20T06:39:07.649897server.mjenks.net sshd[2175302]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=161.35.88.163
2020-09-20T06:39:07.642809server.mjenks.net sshd[2175302]: Invalid user admin from 161.35.88.163 port 54750
2020-09-20T06:39:09.482535server.mjenks.net sshd[2175302]: Failed password for invalid user admin from 161.35.88.163 port 54750 ssh2
...
2020-09-20 20:05:12
144.217.75.30 attackspam
Cowrie Honeypot: 10 unauthorised SSH/Telnet login attempts between 2020-09-20T11:04:07Z and 2020-09-20T12:24:27Z
2020-09-20 20:34:18
103.91.210.208 attackbots
Unwanted checking 80 or 443 port
...
2020-09-20 20:32:03
173.226.200.79 attackbotsspam
2020-09-20 06:45:24.962606-0500  localhost smtpd[24808]: NOQUEUE: reject: RCPT from unknown[173.226.200.79]: 450 4.7.25 Client host rejected: cannot find your hostname, [173.226.200.79]; from= to= proto=ESMTP helo=
2020-09-20 20:39:52
192.42.116.20 attackbotsspam
(sshd) Failed SSH login from 192.42.116.20 (NL/Netherlands/this-is-a-tor-exit-node-hviv120.hviv.nl): 5 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: Sep 20 05:19:23 optimus sshd[24250]: Failed password for root from 192.42.116.20 port 37152 ssh2
Sep 20 05:19:25 optimus sshd[24250]: Failed password for root from 192.42.116.20 port 37152 ssh2
Sep 20 05:19:27 optimus sshd[24250]: Failed password for root from 192.42.116.20 port 37152 ssh2
Sep 20 05:19:30 optimus sshd[24250]: Failed password for root from 192.42.116.20 port 37152 ssh2
Sep 20 05:19:32 optimus sshd[24250]: Failed password for root from 192.42.116.20 port 37152 ssh2
2020-09-20 20:01:56
104.41.33.227 attackbots
(sshd) Failed SSH login from 104.41.33.227 (BR/Brazil/-): 5 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: Sep 20 03:24:42 optimus sshd[10669]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.41.33.227  user=mysql
Sep 20 03:24:44 optimus sshd[10669]: Failed password for mysql from 104.41.33.227 port 48402 ssh2
Sep 20 03:29:44 optimus sshd[13028]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.41.33.227  user=root
Sep 20 03:29:46 optimus sshd[13028]: Failed password for root from 104.41.33.227 port 59158 ssh2
Sep 20 03:34:42 optimus sshd[14955]: Invalid user vps from 104.41.33.227
2020-09-20 20:22:58
38.21.240.216 attackbots
Sep 20 11:09:42 rancher-0 sshd[164896]: Invalid user mats from 38.21.240.216 port 55290
Sep 20 11:09:45 rancher-0 sshd[164896]: Failed password for invalid user mats from 38.21.240.216 port 55290 ssh2
...
2020-09-20 20:01:22
51.89.136.104 attackbotsspam
Sep 20 13:23:12 mail sshd\[5429\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.89.136.104  user=root
Sep 20 13:23:14 mail sshd\[5429\]: Failed password for root from 51.89.136.104 port 34762 ssh2
Sep 20 13:30:19 mail sshd\[5963\]: Invalid user ubuntu from 51.89.136.104
Sep 20 13:30:19 mail sshd\[5963\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.89.136.104
Sep 20 13:30:21 mail sshd\[5963\]: Failed password for invalid user ubuntu from 51.89.136.104 port 45652 ssh2
...
2020-09-20 20:21:59

Recently Reported IPs

14.129.18.245 14.129.18.178 14.130.80.26 14.130.31.157
14.13.42.65 14.132.100.220 14.132.125.134 14.132.108.101
14.132.128.212 22.78.127.50 14.132.128.138 14.132.135.93
14.133.154.179 14.133.156.218 14.132.97.25 14.134.146.85
14.134.169.0 14.134.168.31 14.134.184.101 14.134.184.109