Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Denmark

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 195.54.70.114
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 44632
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;195.54.70.114.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025022500 1800 900 604800 86400

;; Query time: 56 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Feb 25 21:49:25 CST 2025
;; MSG SIZE  rcvd: 106
Host info
Host 114.70.54.195.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 114.70.54.195.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
112.85.42.104 attackspambots
Aug  9 13:46:19 piServer sshd[11579]: Failed password for root from 112.85.42.104 port 39938 ssh2
Aug  9 13:46:23 piServer sshd[11579]: Failed password for root from 112.85.42.104 port 39938 ssh2
Aug  9 13:46:27 piServer sshd[11579]: Failed password for root from 112.85.42.104 port 39938 ssh2
...
2020-08-09 19:55:07
115.133.250.86 attackspam
fail2ban detected bruce force on ssh iptables
2020-08-09 19:52:33
222.240.104.27 attackspambots
W 31101,/var/log/nginx/access.log,-,-
2020-08-09 20:10:55
39.46.117.118 attackbots
Wordpress attack
2020-08-09 20:19:00
113.186.157.29 attack
Unauthorized connection attempt from IP address 113.186.157.29 on Port 445(SMB)
2020-08-09 20:17:35
5.101.51.97 attackspam
WordPress wp-login brute force :: 5.101.51.97 0.108 - [09/Aug/2020:12:15:30  0000] [censored_1] "POST /wp-login.php HTTP/1.1" 200 1837 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0" "HTTP/1.1"
2020-08-09 20:28:50
213.33.157.204 attack
Dovecot Invalid User Login Attempt.
2020-08-09 19:49:56
45.70.215.126 attackspambots
Sent packet to closed port: 8291
2020-08-09 20:07:56
115.118.131.121 attackspam
Unauthorized connection attempt from IP address 115.118.131.121 on Port 445(SMB)
2020-08-09 20:23:39
78.247.170.48 attackbots
SSH invalid-user multiple login try
2020-08-09 19:50:12
190.187.91.114 attack
Port scan: Attack repeated for 24 hours
2020-08-09 20:18:19
188.152.189.220 attackbots
2020-08-09T12:13:35.436651+02:00  sshd[517]: Failed password for root from 188.152.189.220 port 41589 ssh2
2020-08-09 20:15:00
103.217.219.1 attackspambots
Attempted connection to port 445.
2020-08-09 19:48:11
91.225.141.15 attackspambots
Automatic report - Port Scan Attack
2020-08-09 20:14:22
157.41.76.186 attackbots
1596975340 - 08/09/2020 14:15:40 Host: 157.41.76.186/157.41.76.186 Port: 445 TCP Blocked
...
2020-08-09 20:20:19

Recently Reported IPs

205.191.61.220 192.191.65.14 43.82.226.52 237.144.105.74
68.136.140.139 107.172.150.53 69.18.112.108 25.82.207.49
148.183.207.26 22.54.250.250 65.195.171.214 66.211.14.154
132.13.246.41 167.9.80.85 20.1.168.201 131.85.181.43
157.202.243.25 245.205.202.130 242.170.116.146 51.197.118.192