Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: South Korea

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 211.116.138.14
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 7653
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;211.116.138.14.			IN	A

;; AUTHORITY SECTION:
.			130	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2024052803 1800 900 604800 86400

;; Query time: 26 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed May 29 11:04:51 CST 2024
;; MSG SIZE  rcvd: 107
Host info
Host 14.138.116.211.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 14.138.116.211.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
222.186.175.220 attackspambots
Jan  2 00:42:09 vps691689 sshd[20727]: Failed password for root from 222.186.175.220 port 26464 ssh2
Jan  2 00:42:18 vps691689 sshd[20727]: Failed password for root from 222.186.175.220 port 26464 ssh2
Jan  2 00:42:22 vps691689 sshd[20727]: Failed password for root from 222.186.175.220 port 26464 ssh2
Jan  2 00:42:22 vps691689 sshd[20727]: error: maximum authentication attempts exceeded for root from 222.186.175.220 port 26464 ssh2 [preauth]
...
2020-01-02 07:43:59
92.190.153.246 attackspambots
2020-01-01T23:53:59.711843shield sshd\[32341\]: Invalid user corp from 92.190.153.246 port 58570
2020-01-01T23:53:59.717088shield sshd\[32341\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=92.190.153.246
2020-01-01T23:54:01.348517shield sshd\[32341\]: Failed password for invalid user corp from 92.190.153.246 port 58570 ssh2
2020-01-01T23:57:16.701673shield sshd\[1328\]: Invalid user guest from 92.190.153.246 port 60636
2020-01-01T23:57:16.706100shield sshd\[1328\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=92.190.153.246
2020-01-02 08:07:35
181.123.9.3 attackbotsspam
$f2bV_matches
2020-01-02 08:19:07
222.186.31.83 attackspam
Jan  2 01:11:12 debian64 sshd\[19623\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.31.83  user=root
Jan  2 01:11:14 debian64 sshd\[19623\]: Failed password for root from 222.186.31.83 port 60719 ssh2
Jan  2 01:11:17 debian64 sshd\[19623\]: Failed password for root from 222.186.31.83 port 60719 ssh2
...
2020-01-02 08:11:38
218.92.0.158 attack
2020-01-02T00:16:53.290987abusebot-4.cloudsearch.cf sshd[1014]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.158  user=root
2020-01-02T00:16:55.549579abusebot-4.cloudsearch.cf sshd[1014]: Failed password for root from 218.92.0.158 port 41432 ssh2
2020-01-02T00:16:59.477886abusebot-4.cloudsearch.cf sshd[1014]: Failed password for root from 218.92.0.158 port 41432 ssh2
2020-01-02T00:16:53.290987abusebot-4.cloudsearch.cf sshd[1014]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.158  user=root
2020-01-02T00:16:55.549579abusebot-4.cloudsearch.cf sshd[1014]: Failed password for root from 218.92.0.158 port 41432 ssh2
2020-01-02T00:16:59.477886abusebot-4.cloudsearch.cf sshd[1014]: Failed password for root from 218.92.0.158 port 41432 ssh2
2020-01-02T00:16:53.290987abusebot-4.cloudsearch.cf sshd[1014]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.
...
2020-01-02 08:17:50
185.147.212.13 attackspambots
\[2020-01-01 18:35:44\] NOTICE\[2839\] chan_sip.c: Registration from '\' failed for '185.147.212.13:59740' - Wrong password
\[2020-01-01 18:35:44\] SECURITY\[2857\] res_security_log.c: SecurityEvent="InvalidPassword",EventTV="2020-01-01T18:35:44.734-0500",Severity="Error",Service="SIP",EventVersion="2",AccountID="6810",SessionID="0x7f0fb4adaef8",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/185.147.212.13/59740",Challenge="53b8b44e",ReceivedChallenge="53b8b44e",ReceivedHash="ffdb766573de2427cbcde18d3acc3a1a"
\[2020-01-01 18:36:05\] NOTICE\[2839\] chan_sip.c: Registration from '\' failed for '185.147.212.13:51952' - Wrong password
\[2020-01-01 18:36:05\] SECURITY\[2857\] res_security_log.c: SecurityEvent="InvalidPassword",EventTV="2020-01-01T18:36:05.643-0500",Severity="Error",Service="SIP",EventVersion="2",AccountID="3753",SessionID="0x7f0fb462f398",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/185.14
2020-01-02 07:43:12
207.154.239.128 attackspam
Invalid user dspace from 207.154.239.128 port 48574
2020-01-02 08:12:10
178.208.254.32 attackspam
Brute-force attempt banned
2020-01-02 07:52:45
49.88.112.67 attackbotsspam
Jan  1 18:32:57 linuxvps sshd\[34403\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.88.112.67  user=root
Jan  1 18:32:59 linuxvps sshd\[34403\]: Failed password for root from 49.88.112.67 port 52690 ssh2
Jan  1 18:35:09 linuxvps sshd\[35879\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.88.112.67  user=root
Jan  1 18:35:11 linuxvps sshd\[35879\]: Failed password for root from 49.88.112.67 port 14956 ssh2
Jan  1 18:41:44 linuxvps sshd\[40189\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.88.112.67  user=root
2020-01-02 07:53:39
45.136.109.122 attack
Jan  2 01:00:03 debian-2gb-nbg1-2 kernel: \[182534.593914\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=45.136.109.122 DST=195.201.40.59 LEN=40 TOS=0x00 PREC=0x00 TTL=243 ID=5215 PROTO=TCP SPT=48355 DPT=3382 WINDOW=1024 RES=0x00 SYN URGP=0
2020-01-02 08:08:11
191.34.104.45 attackspambots
Jan  1 23:53:24 debian-2gb-nbg1-2 kernel: \[178535.426272\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=191.34.104.45 DST=195.201.40.59 LEN=44 TOS=0x00 PREC=0x00 TTL=38 ID=14455 PROTO=TCP SPT=13033 DPT=23 WINDOW=35966 RES=0x00 SYN URGP=0
2020-01-02 07:52:00
128.199.103.239 attackspambots
Jan  1 17:52:57 mail sshd\[27791\]: Invalid user sherian from 128.199.103.239
Jan  1 17:52:57 mail sshd\[27791\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.199.103.239
...
2020-01-02 08:08:54
222.186.42.155 attack
Jan  2 00:34:51 root sshd[16911]: Failed password for root from 222.186.42.155 port 23384 ssh2
Jan  2 00:34:53 root sshd[16911]: Failed password for root from 222.186.42.155 port 23384 ssh2
Jan  2 00:34:56 root sshd[16911]: Failed password for root from 222.186.42.155 port 23384 ssh2
...
2020-01-02 07:46:14
190.191.194.9 attackbotsspam
Jan  2 00:54:28 vpn01 sshd[2056]: Failed password for root from 190.191.194.9 port 58361 ssh2
Jan  2 00:56:42 vpn01 sshd[2064]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=190.191.194.9
...
2020-01-02 08:19:38
45.168.58.52 attackspam
DATE:2020-01-01 23:53:08, IP:45.168.58.52, PORT:telnet Telnet brute force auth on honeypot server (honey-neo-dc)
2020-01-02 08:02:55

Recently Reported IPs

228.253.113.251 195.129.251.32 78.166.7.74 7.42.100.151
184.23.207.183 28.168.194.34 21.153.199.16 165.215.162.162
201.128.210.152 167.9.89.198 187.245.182.185 126.241.205.129
241.96.20.236 107.156.84.153 25.236.72.107 235.43.158.187
43.135.203.140 205.240.122.250 24.185.227.88 113.142.169.182