Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: China

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 218.14.145.131
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 18356
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;218.14.145.131.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025020401 1800 900 604800 86400

;; Query time: 41 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Feb 05 04:06:55 CST 2025
;; MSG SIZE  rcvd: 107
Host info
131.145.14.218.in-addr.arpa domain name pointer 131.145.14.218.broad.jm.gd.dynamic.163data.com.cn.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
131.145.14.218.in-addr.arpa	name = 131.145.14.218.broad.jm.gd.dynamic.163data.com.cn.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
110.137.184.25 attack
@LucianNitescu Personal Honeypot Network <<<>>> Donate at paypal.me/LNitescu <<<>>> 2019-08-04 00:29:05,840 INFO [amun_request_handler] PortScan Detected on Port: 445 (110.137.184.25)
2019-08-04 10:40:46
186.73.69.238 attackspam
Unauthorised access (Aug  4) SRC=186.73.69.238 LEN=52 TTL=109 ID=20220 DF TCP DPT=3389 WINDOW=8192 SYN
2019-08-04 10:50:33
138.68.106.62 attack
Aug  4 02:51:30 [munged] sshd[11648]: Invalid user toby from 138.68.106.62 port 45368
Aug  4 02:51:30 [munged] sshd[11648]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.68.106.62
2019-08-04 10:27:38
193.188.22.127 attackspambots
RDP Bruteforce
2019-08-04 11:05:25
74.82.47.36 attack
scan z
2019-08-04 10:22:23
178.90.87.189 attackspam
firewall-block, port(s): 80/tcp
2019-08-04 11:05:56
190.145.177.2 attackspam
@LucianNitescu Personal Honeypot Network <<<>>> Donate at paypal.me/LNitescu <<<>>> 2019-08-04 00:28:08,719 INFO [amun_request_handler] PortScan Detected on Port: 445 (190.145.177.2)
2019-08-04 10:53:11
185.234.219.111 attack
Aug  4 02:25:17  postfix/smtpd: warning: unknown[185.234.219.111]: SASL LOGIN authentication failed
2019-08-04 10:57:53
185.211.245.170 attack
Aug  4 04:37:35 relay postfix/smtpd\[1333\]: warning: unknown\[185.211.245.170\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Aug  4 04:37:42 relay postfix/smtpd\[5451\]: warning: unknown\[185.211.245.170\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Aug  4 04:40:00 relay postfix/smtpd\[5455\]: warning: unknown\[185.211.245.170\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Aug  4 04:40:00 relay postfix/smtpd\[30366\]: warning: unknown\[185.211.245.170\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Aug  4 04:40:09 relay postfix/smtpd\[1333\]: warning: unknown\[185.211.245.170\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Aug  4 04:40:09 relay postfix/smtpd\[5451\]: warning: unknown\[185.211.245.170\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
...
2019-08-04 10:48:39
92.118.38.34 attack
2019-08-04 10:37:30 login authenticator failed for (User) [92.118.38.34]: 535 Incorrect authentication data
2019-08-04 10:38:23
218.92.0.204 attackbotsspam
Aug  4 04:30:25 mail sshd\[27864\]: Failed password for root from 218.92.0.204 port 28512 ssh2
Aug  4 04:30:27 mail sshd\[27864\]: Failed password for root from 218.92.0.204 port 28512 ssh2
Aug  4 04:30:29 mail sshd\[27864\]: Failed password for root from 218.92.0.204 port 28512 ssh2
Aug  4 04:34:06 mail sshd\[28118\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.204  user=root
Aug  4 04:34:08 mail sshd\[28118\]: Failed password for root from 218.92.0.204 port 18314 ssh2
2019-08-04 10:46:21
114.107.24.203 attack
Aug  4 04:46:19 vpn01 sshd\[10623\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=114.107.24.203  user=root
Aug  4 04:46:22 vpn01 sshd\[10623\]: Failed password for root from 114.107.24.203 port 40694 ssh2
Aug  4 04:46:24 vpn01 sshd\[10623\]: Failed password for root from 114.107.24.203 port 40694 ssh2
2019-08-04 11:08:13
12.176.40.155 attackspambots
@LucianNitescu Personal Honeypot Network <<<>>> Donate at paypal.me/LNitescu <<<>>> 2019-08-04 00:25:50,075 INFO [amun_request_handler] PortScan Detected on Port: 445 (12.176.40.155)
2019-08-04 11:03:15
92.118.38.50 attackbots
Aug  4 03:26:53 mail postfix/smtpd\[12948\]: warning: unknown\[92.118.38.50\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6\
Aug  4 03:27:32 mail postfix/smtpd\[13350\]: warning: unknown\[92.118.38.50\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6\
Aug  4 03:28:19 mail postfix/smtpd\[12712\]: warning: unknown\[92.118.38.50\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6\
Aug  4 03:58:30 mail postfix/smtpd\[13784\]: warning: unknown\[92.118.38.50\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6\
2019-08-04 10:34:44
1.71.129.120 attackspam
Aug  2 08:35:56 cumulus sshd[7890]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=1.71.129.120  user=r.r
Aug  2 08:35:59 cumulus sshd[7890]: Failed password for r.r from 1.71.129.120 port 58047 ssh2
Aug  2 08:35:59 cumulus sshd[7890]: Received disconnect from 1.71.129.120 port 58047:11: Bye Bye [preauth]
Aug  2 08:35:59 cumulus sshd[7890]: Disconnected from 1.71.129.120 port 58047 [preauth]
Aug  2 08:58:29 cumulus sshd[8568]: Connection closed by 1.71.129.120 port 50615 [preauth]
Aug  2 08:59:41 cumulus sshd[8623]: Invalid user rdavidson from 1.71.129.120 port 34376
Aug  2 08:59:41 cumulus sshd[8623]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=1.71.129.120
Aug  2 08:59:43 cumulus sshd[8623]: Failed password for invalid user rdavidson from 1.71.129.120 port 34376 ssh2
Aug  2 08:59:43 cumulus sshd[8623]: Received disconnect from 1.71.129.120 port 34376:11: Bye Bye [preauth]
Aug  2 08:59........
-------------------------------
2019-08-04 10:25:42

Recently Reported IPs

142.235.165.33 188.194.41.169 212.84.195.139 4.158.118.57
85.252.59.113 109.169.171.8 219.116.66.119 148.178.114.78
219.54.157.143 124.205.241.157 82.146.169.32 77.65.170.130
73.102.170.209 180.199.186.137 23.39.3.123 51.198.103.29
14.197.224.9 48.225.74.71 86.106.234.11 184.169.140.235