Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: China

Internet Service Provider: China Tietong

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 222.55.14.118
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 1099
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;222.55.14.118.			IN	A

;; AUTHORITY SECTION:
.			599	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2023092700 1800 900 604800 86400

;; Query time: 68 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Sep 27 13:56:50 CST 2023
;; MSG SIZE  rcvd: 106
Host info
Host 118.14.55.222.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 118.14.55.222.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
140.143.196.66 attack
Nov 25 23:38:25 wbs sshd\[4820\]: Invalid user george from 140.143.196.66
Nov 25 23:38:25 wbs sshd\[4820\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=140.143.196.66
Nov 25 23:38:27 wbs sshd\[4820\]: Failed password for invalid user george from 140.143.196.66 port 45294 ssh2
Nov 25 23:45:27 wbs sshd\[5512\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=140.143.196.66  user=root
Nov 25 23:45:29 wbs sshd\[5512\]: Failed password for root from 140.143.196.66 port 49134 ssh2
2019-11-26 19:45:46
117.50.97.216 attackspambots
Nov 25 02:27:55 ns4 sshd[14174]: Invalid user passwd from 117.50.97.216
Nov 25 02:27:55 ns4 sshd[14174]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=117.50.97.216 
Nov 25 02:27:56 ns4 sshd[14174]: Failed password for invalid user passwd from 117.50.97.216 port 52490 ssh2
Nov 25 02:49:13 ns4 sshd[16963]: Invalid user lisa from 117.50.97.216
Nov 25 02:49:13 ns4 sshd[16963]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=117.50.97.216 
Nov 25 02:49:15 ns4 sshd[16963]: Failed password for invalid user lisa from 117.50.97.216 port 51084 ssh2
Nov 25 02:54:08 ns4 sshd[17590]: Invalid user guest from 117.50.97.216
Nov 25 02:54:08 ns4 sshd[17590]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=117.50.97.216 
Nov 25 02:54:10 ns4 sshd[17590]: Failed password for invalid user guest from 117.50.97.216 port 56006 ssh2


........
-----------------------------------------------
https://www.blocklist.d
2019-11-26 20:06:37
164.70.234.135 attack
php WP PHPmyadamin ABUSE blocked for 12h
2019-11-26 19:56:55
5.196.143.9 attackspambots
Nov 26 07:06:10 mxgate1 postfix/postscreen[19964]: CONNECT from [5.196.143.9]:34321 to [176.31.12.44]:25
Nov 26 07:06:10 mxgate1 postfix/dnsblog[19969]: addr 5.196.143.9 listed by domain zen.spamhaus.org as 127.0.0.4
Nov 26 07:06:10 mxgate1 postfix/dnsblog[19969]: addr 5.196.143.9 listed by domain zen.spamhaus.org as 127.0.0.3
Nov 26 07:06:10 mxgate1 postfix/dnsblog[19966]: addr 5.196.143.9 listed by domain cbl.abuseat.org as 127.0.0.2
Nov 26 07:06:10 mxgate1 postfix/dnsblog[19967]: addr 5.196.143.9 listed by domain b.barracudacentral.org as 127.0.0.2
Nov 26 07:06:16 mxgate1 postfix/postscreen[19964]: DNSBL rank 4 for [5.196.143.9]:34321
Nov 26 07:06:16 mxgate1 postfix/tlsproxy[20026]: CONNECT from [5.196.143.9]:34321
Nov 26 07:06:16 mxgate1 postfix/postscreen[19964]: DISCONNECT [5.196.143.9]:34321
Nov 26 07:06:16 mxgate1 postfix/tlsproxy[20026]: DISCONNECT [5.196.143.9]:34321
Nov 26 07:06:43 mxgate1 postfix/postscreen[19964]: CONNECT from [5.196.143.9]:51031 to [176.31........
-------------------------------
2019-11-26 19:33:55
146.0.209.72 attackspam
Brute-force attempt banned
2019-11-26 19:32:56
103.92.25.199 attackbots
Automatic report - Banned IP Access
2019-11-26 19:36:11
49.235.86.249 attackspambots
Port scan on 3 port(s): 2375 2377 4243
2019-11-26 20:15:06
148.72.232.96 attackspam
xmlrpc attack
2019-11-26 20:10:03
213.32.91.37 attackbots
Nov 26 04:59:19 linuxvps sshd\[48634\]: Invalid user poiuyt from 213.32.91.37
Nov 26 04:59:19 linuxvps sshd\[48634\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=213.32.91.37
Nov 26 04:59:22 linuxvps sshd\[48634\]: Failed password for invalid user poiuyt from 213.32.91.37 port 57364 ssh2
Nov 26 05:05:17 linuxvps sshd\[52259\]: Invalid user rom from 213.32.91.37
Nov 26 05:05:17 linuxvps sshd\[52259\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=213.32.91.37
2019-11-26 20:10:35
185.176.27.42 attackspam
11/26/2019-07:02:55.579921 185.176.27.42 Protocol: 6 ET DROP Dshield Block Listed Source group 1
2019-11-26 20:08:11
24.221.19.57 attackbots
SSH Bruteforce attempt
2019-11-26 19:43:17
123.195.99.9 attackspambots
Nov 25 20:59:28 php1 sshd\[23683\]: Invalid user pizzanelli from 123.195.99.9
Nov 25 20:59:28 php1 sshd\[23683\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=123.195.99.9
Nov 25 20:59:30 php1 sshd\[23683\]: Failed password for invalid user pizzanelli from 123.195.99.9 port 44744 ssh2
Nov 25 21:06:51 php1 sshd\[24250\]: Invalid user sam from 123.195.99.9
Nov 25 21:06:51 php1 sshd\[24250\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=123.195.99.9
2019-11-26 19:33:11
218.92.0.199 attackspam
Nov 26 12:33:25 vmanager6029 sshd\[19575\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.199  user=root
Nov 26 12:33:27 vmanager6029 sshd\[19575\]: Failed password for root from 218.92.0.199 port 51690 ssh2
Nov 26 12:33:29 vmanager6029 sshd\[19575\]: Failed password for root from 218.92.0.199 port 51690 ssh2
2019-11-26 19:52:03
89.248.174.215 attackspambots
11/26/2019-06:50:51.049004 89.248.174.215 Protocol: 6 ET DROP Dshield Block Listed Source group 1
2019-11-26 20:05:09
61.84.196.50 attack
Nov 25 22:32:10 hpm sshd\[14829\]: Invalid user theodorou from 61.84.196.50
Nov 25 22:32:10 hpm sshd\[14829\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.84.196.50
Nov 25 22:32:12 hpm sshd\[14829\]: Failed password for invalid user theodorou from 61.84.196.50 port 57482 ssh2
Nov 25 22:39:59 hpm sshd\[15604\]: Invalid user hok from 61.84.196.50
Nov 25 22:39:59 hpm sshd\[15604\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.84.196.50
2019-11-26 20:14:07

Recently Reported IPs

2.147.155.192 5.237.4.46 97.150.66.243 68.69.184.202
103.136.221.217 242.3.180.162 73.45.225.121 100.65.22.128
20.248.137.47 20.248.137.49 236.226.225.9 66.175.222.206
87.100.210.5 87.100.210.64 108.181.123.13 37.49.225.145
183.253.225.15 103.146.185.235 109.205.213.130 30.89.191.194