Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: China

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 220.232.120.114
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 11371
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;220.232.120.114.		IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025021900 1800 900 604800 86400

;; Query time: 45 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Feb 19 23:00:04 CST 2025
;; MSG SIZE  rcvd: 108
Host info
b'Host 114.120.232.220.in-addr.arpa not found: 2(SERVFAIL)
'
Nslookup info:
;; Got SERVFAIL reply from 183.60.83.19, trying next server
Server:		183.60.82.98
Address:	183.60.82.98#53

** server can't find 114.120.232.220.in-addr.arpa: SERVFAIL

Related IP info:
Related comments:
IP Type Details Datetime
194.31.40.6 attackspambots
Jun 22 17:20:08 pornomens sshd\[8898\]: Invalid user minecraft from 194.31.40.6 port 54347
Jun 22 17:20:08 pornomens sshd\[8898\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=194.31.40.6
Jun 22 17:20:10 pornomens sshd\[8898\]: Failed password for invalid user minecraft from 194.31.40.6 port 54347 ssh2
...
2019-06-23 00:47:03
117.215.240.213 attackbots
445/tcp
[2019-06-22]1pkt
2019-06-23 01:22:00
143.208.249.252 attackspam
SMTP-sasl brute force
...
2019-06-23 01:31:59
139.167.169.163 attackspambots
445/tcp
[2019-06-22]1pkt
2019-06-23 01:37:59
45.43.42.6 attackbots
19299/tcp
[2019-06-22]1pkt
2019-06-23 01:03:43
191.53.104.164 attackbotsspam
$f2bV_matches
2019-06-23 00:57:20
1.174.91.165 attackspam
37215/tcp
[2019-06-22]1pkt
2019-06-23 01:12:06
191.53.194.240 attackspambots
$f2bV_matches
2019-06-23 01:05:10
123.135.238.55 attackspam
23/tcp
[2019-06-22]1pkt
2019-06-23 01:32:32
114.244.228.191 attackspambots
Reported by AbuseIPDB proxy server.
2019-06-23 01:26:57
186.251.210.202 attackspambots
$f2bV_matches
2019-06-23 01:13:21
200.148.103.142 attackspam
8080/tcp
[2019-06-22]1pkt
2019-06-23 01:06:43
106.12.202.180 attack
2019-06-22T16:48:51.0284921240 sshd\[25146\]: Invalid user kafka from 106.12.202.180 port 29032
2019-06-22T16:48:51.0342921240 sshd\[25146\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.202.180
2019-06-22T16:48:52.8923411240 sshd\[25146\]: Failed password for invalid user kafka from 106.12.202.180 port 29032 ssh2
...
2019-06-23 01:05:33
201.131.184.86 attackspambots
IP: 201.131.184.86
ASN: AS52912 VIEIRA E RETECHESKI LTDA
Port: World Wide Web HTTP 80
Found in one or more Blacklists
Date: 22/06/2019 2:44:14 PM UTC
2019-06-23 01:02:24
190.13.106.123 attackbotsspam
IP: 190.13.106.123
ASN: AS3816 COLOMBIA TELECOMUNICACIONES S.A. ESP
Port: IMAP over TLS protocol 993
Found in one or more Blacklists
Date: 22/06/2019 2:42:55 PM UTC
2019-06-23 01:41:44

Recently Reported IPs

169.84.57.245 23.1.143.209 21.32.148.49 146.214.76.228
240.165.28.29 255.121.223.73 88.7.218.214 207.147.242.168
219.251.138.143 167.4.97.110 213.27.131.83 94.213.162.202
136.20.0.211 120.54.114.49 184.42.159.100 44.219.132.118
126.113.163.58 123.208.171.227 119.192.53.143 225.118.7.217