Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Taiwan (Province of China)

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 163.22.213.114
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 5838
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;163.22.213.114.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025012301 1800 900 604800 86400

;; Query time: 11 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Jan 24 05:48:06 CST 2025
;; MSG SIZE  rcvd: 107
Host info
Host 114.213.22.163.in-addr.arpa not found: 2(SERVFAIL)
Nslookup info:
;; Got SERVFAIL reply from 183.60.83.19, trying next server
Server:		183.60.82.98
Address:	183.60.82.98#53

** server can't find 114.213.22.163.in-addr.arpa: SERVFAIL
Related IP info:
Related comments:
IP Type Details Datetime
14.63.212.215 attack
Nov  9 09:23:41 lnxweb61 sshd[6410]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=14.63.212.215
2019-11-09 21:26:27
103.45.109.240 attack
2019-11-09T10:40:45.324623abusebot-5.cloudsearch.cf sshd\[11715\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.45.109.240  user=root
2019-11-09 21:18:19
45.143.220.60 attackspam
\[2019-11-09 06:01:13\] SECURITY\[2634\] res_security_log.c: SecurityEvent="FailedACL",EventTV="2019-11-09T06:01:13.564-0500",Severity="Error",Service="SIP",EventVersion="1",AccountID="901146243343011",SessionID="0x7fdf2c3f5928",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/45.143.220.60/5076",ACLName="no_extension_match"
\[2019-11-09 06:05:18\] SECURITY\[2634\] res_security_log.c: SecurityEvent="FailedACL",EventTV="2019-11-09T06:05:18.352-0500",Severity="Error",Service="SIP",EventVersion="1",AccountID="801146243343011",SessionID="0x7fdf2c003608",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/45.143.220.60/5100",ACLName="no_extension_match"
\[2019-11-09 06:09:21\] SECURITY\[2634\] res_security_log.c: SecurityEvent="FailedACL",EventTV="2019-11-09T06:09:21.432-0500",Severity="Error",Service="SIP",EventVersion="1",AccountID="01146243343011",SessionID="0x7fdf2c8a8ab8",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/45.143.220.60/5116",ACLName="no_extensi
2019-11-09 21:54:28
184.95.49.154 attackbots
Automatic report - XMLRPC Attack
2019-11-09 21:39:22
69.94.157.82 attack
Nov  9 07:18:31  exim[24176]: 2019-11-09 07:18:31 1iTK4s-0006Hw-KO H=mint.culturemaroc.com (mint.andrefcarvalho.com) [69.94.157.82] F= rejected after DATA: This message scored 103.5 spam points.
2019-11-09 21:48:52
167.71.210.149 attackbots
Nov  9 14:19:12 bouncer sshd\[12962\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.71.210.149  user=root
Nov  9 14:19:14 bouncer sshd\[12962\]: Failed password for root from 167.71.210.149 port 52884 ssh2
Nov  9 14:23:13 bouncer sshd\[12968\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.71.210.149  user=root
...
2019-11-09 21:36:24
106.12.42.95 attackbotsspam
(sshd) Failed SSH login from 106.12.42.95 (CN/China/-): 3 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: Nov  9 12:39:39 andromeda sshd[7795]: Invalid user user from 106.12.42.95 port 43180
Nov  9 12:39:41 andromeda sshd[7795]: Failed password for invalid user user from 106.12.42.95 port 43180 ssh2
Nov  9 12:54:47 andromeda sshd[9522]: Invalid user rpm from 106.12.42.95 port 51534
2019-11-09 21:31:09
138.68.50.18 attack
Nov  9 13:48:23 nextcloud sshd\[19215\]: Invalid user csx from 138.68.50.18
Nov  9 13:48:23 nextcloud sshd\[19215\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.68.50.18
Nov  9 13:48:25 nextcloud sshd\[19215\]: Failed password for invalid user csx from 138.68.50.18 port 41384 ssh2
...
2019-11-09 21:19:47
160.153.154.137 attack
xmlrpc attack
2019-11-09 21:24:52
160.153.156.138 attackspambots
Automatic report - XMLRPC Attack
2019-11-09 21:26:51
51.255.173.245 attack
Nov  9 08:19:48 bouncer sshd\[11311\]: Invalid user bm from 51.255.173.245 port 55420
Nov  9 08:19:48 bouncer sshd\[11311\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.255.173.245 
Nov  9 08:19:50 bouncer sshd\[11311\]: Failed password for invalid user bm from 51.255.173.245 port 55420 ssh2
...
2019-11-09 21:44:26
62.234.133.230 attackbotsspam
Automatic report - Banned IP Access
2019-11-09 21:44:01
178.137.38.108 attackbots
Hits on port : 445
2019-11-09 21:45:31
23.238.16.91 attackspambots
Automatic report - XMLRPC Attack
2019-11-09 21:35:17
82.200.163.214 attack
Unauthorised access (Nov  9) SRC=82.200.163.214 LEN=52 TTL=112 ID=22205 DF TCP DPT=445 WINDOW=8192 SYN
2019-11-09 21:51:17

Recently Reported IPs

216.162.192.45 91.170.72.106 75.249.251.99 145.251.249.15
132.117.118.183 243.54.49.32 7.92.78.209 220.243.101.170
203.191.43.47 20.185.176.53 91.27.233.192 227.133.156.169
116.175.168.142 161.73.250.164 235.191.144.123 129.15.48.112
205.104.225.6 108.177.37.87 99.207.124.118 161.51.217.140