Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Sweden

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 194.14.114.147
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 51355
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;194.14.114.147.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025021300 1800 900 604800 86400

;; Query time: 13 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Feb 13 18:32:25 CST 2025
;; MSG SIZE  rcvd: 107
Host info
Host 147.114.14.194.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 147.114.14.194.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
222.186.175.182 attackspam
Apr 12 01:07:05 ns381471 sshd[29315]: Failed password for root from 222.186.175.182 port 27004 ssh2
Apr 12 01:07:16 ns381471 sshd[29315]: Failed password for root from 222.186.175.182 port 27004 ssh2
2020-04-12 07:14:48
93.174.95.106 attack
Automatic report - Banned IP Access
2020-04-12 06:42:38
200.17.114.215 attackbots
Apr 12 05:27:43 itv-usvr-01 sshd[5964]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=200.17.114.215  user=root
Apr 12 05:27:45 itv-usvr-01 sshd[5964]: Failed password for root from 200.17.114.215 port 34865 ssh2
Apr 12 05:36:03 itv-usvr-01 sshd[6314]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=200.17.114.215  user=root
Apr 12 05:36:05 itv-usvr-01 sshd[6314]: Failed password for root from 200.17.114.215 port 48154 ssh2
2020-04-12 07:05:30
86.201.39.212 attack
Apr 12 00:58:08 lukav-desktop sshd\[27931\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=86.201.39.212  user=root
Apr 12 00:58:10 lukav-desktop sshd\[27931\]: Failed password for root from 86.201.39.212 port 46004 ssh2
Apr 12 01:02:21 lukav-desktop sshd\[28084\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=86.201.39.212  user=root
Apr 12 01:02:23 lukav-desktop sshd\[28084\]: Failed password for root from 86.201.39.212 port 54322 ssh2
Apr 12 01:06:21 lukav-desktop sshd\[20236\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=86.201.39.212  user=root
2020-04-12 07:04:21
182.242.143.78 attackspambots
SASL PLAIN auth failed: ruser=...
2020-04-12 06:33:13
106.124.142.30 attackspam
2020-04-11T22:01:24.855464shield sshd\[12433\]: Invalid user temp from 106.124.142.30 port 38588
2020-04-11T22:01:24.858973shield sshd\[12433\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.124.142.30
2020-04-11T22:01:26.881947shield sshd\[12433\]: Failed password for invalid user temp from 106.124.142.30 port 38588 ssh2
2020-04-11T22:05:26.219676shield sshd\[12845\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.124.142.30  user=root
2020-04-11T22:05:28.132186shield sshd\[12845\]: Failed password for root from 106.124.142.30 port 40220 ssh2
2020-04-12 06:45:48
49.235.226.43 attack
Apr 11 22:55:28 nextcloud sshd\[19306\]: Invalid user web!@\#123 from 49.235.226.43
Apr 11 22:55:28 nextcloud sshd\[19306\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.235.226.43
Apr 11 22:55:30 nextcloud sshd\[19306\]: Failed password for invalid user web!@\#123 from 49.235.226.43 port 33278 ssh2
2020-04-12 06:32:41
61.140.238.169 attackspam
Apr 11 22:52:54 host01 sshd[20893]: Failed password for root from 61.140.238.169 port 48838 ssh2
Apr 11 22:55:24 host01 sshd[21342]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.140.238.169 
Apr 11 22:55:26 host01 sshd[21342]: Failed password for invalid user admin from 61.140.238.169 port 58242 ssh2
...
2020-04-12 06:39:02
141.98.81.37 attackspambots
Apr 11 17:44:43 NPSTNNYC01T sshd[16342]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=141.98.81.37
Apr 11 17:44:45 NPSTNNYC01T sshd[16342]: Failed password for invalid user admin from 141.98.81.37 port 41455 ssh2
Apr 11 17:44:46 NPSTNNYC01T sshd[16347]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=141.98.81.37
...
2020-04-12 07:10:27
162.244.144.72 attackbotsspam
(From elliott.jonsson@gmail.com) If you’ve been online any amount of time, you’re most likely still struggling to make the money you want online…

Am I right?

Well, we’re confident to say that you’ve come to the right place.

You might be thinking… Why are we different from the thousands of so-called “expert marketers” out there?

For one, I have the power to read your mind. I know exactly why you’re struggling right now...

OK - maybe reading your mind is a bit far fetched.

But what I can tell you is this…

We’ve worked with over 45,000+ customers.

And if they were struggling, we noticed it always came down to ONE important factor…

=>> http://bit.ly/UnlTraffic

You don't need to work for anyone else.

You don't need to take orders from your boss.

And you don't need to take permission to take vacation or spend a day with family.

And this is not just talk, let me show you real PROOF…

=>> http://bit.ly/UnlTraffic

Cheers
2020-04-12 07:12:29
106.12.5.96 attackbotsspam
Apr 12 00:21:03 silence02 sshd[8937]: Failed password for root from 106.12.5.96 port 33466 ssh2
Apr 12 00:25:04 silence02 sshd[9322]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.5.96
Apr 12 00:25:05 silence02 sshd[9322]: Failed password for invalid user adolf from 106.12.5.96 port 58952 ssh2
2020-04-12 06:34:12
185.176.27.162 attackspambots
firewall-block, port(s): 1806/tcp, 50010/tcp, 50628/tcp, 53391/tcp
2020-04-12 06:57:31
111.230.223.94 attackbotsspam
Apr 11 19:00:57 firewall sshd[2603]: Failed password for root from 111.230.223.94 port 48810 ssh2
Apr 11 19:04:47 firewall sshd[2797]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.230.223.94  user=root
Apr 11 19:04:50 firewall sshd[2797]: Failed password for root from 111.230.223.94 port 34398 ssh2
...
2020-04-12 07:13:46
186.84.172.25 attackbots
Apr 12 00:43:20 legacy sshd[2286]: Failed password for root from 186.84.172.25 port 58772 ssh2
Apr 12 00:46:59 legacy sshd[2443]: Failed password for root from 186.84.172.25 port 41410 ssh2
Apr 12 00:50:35 legacy sshd[2574]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=186.84.172.25
...
2020-04-12 06:55:05
200.89.178.12 attackspambots
Invalid user haygood from 200.89.178.12 port 42914
2020-04-12 06:36:20

Recently Reported IPs

155.84.51.6 201.252.157.87 135.147.161.199 42.209.9.2
207.53.29.117 8.186.194.245 205.248.27.215 42.82.128.18
113.75.193.206 185.131.85.30 42.125.188.106 228.78.30.159
167.201.70.91 109.60.232.191 242.10.15.195 140.157.255.193
21.150.14.232 161.7.21.32 63.193.21.149 159.238.227.126