Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: China

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 106.14.123.139
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 191
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;106.14.123.139.			IN	A

;; AUTHORITY SECTION:
.			65	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022022701 1800 900 604800 86400

;; Query time: 20 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Feb 28 14:30:08 CST 2022
;; MSG SIZE  rcvd: 107
Host info
Host 139.123.14.106.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 139.123.14.106.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
94.1.14.2 attackspam
Automatic report - Port Scan Attack
2020-08-14 15:23:00
185.97.116.222 attackbots
Fail2Ban
2020-08-14 15:46:17
222.240.1.20 attackspambots
Aug 14 05:19:10 ns382633 sshd\[17563\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.240.1.20  user=root
Aug 14 05:19:12 ns382633 sshd\[17563\]: Failed password for root from 222.240.1.20 port 3620 ssh2
Aug 14 05:33:16 ns382633 sshd\[19981\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.240.1.20  user=root
Aug 14 05:33:18 ns382633 sshd\[19981\]: Failed password for root from 222.240.1.20 port 3621 ssh2
Aug 14 05:38:31 ns382633 sshd\[20819\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.240.1.20  user=root
2020-08-14 15:20:39
106.12.12.127 attack
Aug 14 00:37:50 firewall sshd[18948]: Failed password for root from 106.12.12.127 port 54440 ssh2
Aug 14 00:38:13 firewall sshd[18957]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.12.127  user=root
Aug 14 00:38:15 firewall sshd[18957]: Failed password for root from 106.12.12.127 port 57770 ssh2
...
2020-08-14 15:34:46
114.33.161.238 attackbotsspam
port 23
2020-08-14 15:28:22
139.59.46.243 attackbots
Aug 14 08:22:21 inter-technics sshd[14823]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.46.243  user=root
Aug 14 08:22:23 inter-technics sshd[14823]: Failed password for root from 139.59.46.243 port 53004 ssh2
Aug 14 08:26:52 inter-technics sshd[14999]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.46.243  user=root
Aug 14 08:26:54 inter-technics sshd[14999]: Failed password for root from 139.59.46.243 port 35840 ssh2
Aug 14 08:31:24 inter-technics sshd[15252]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.46.243  user=root
Aug 14 08:31:26 inter-technics sshd[15252]: Failed password for root from 139.59.46.243 port 46914 ssh2
...
2020-08-14 15:58:30
180.76.114.141 attackbots
Aug 14 05:55:02 piServer sshd[24025]: Failed password for root from 180.76.114.141 port 47926 ssh2
Aug 14 05:57:49 piServer sshd[24658]: Failed password for root from 180.76.114.141 port 54568 ssh2
...
2020-08-14 15:47:23
187.111.8.82 attackbotsspam
bruteforce detected
2020-08-14 15:33:39
139.155.11.173 attack
Aug 14 09:21:12 eventyay sshd[26754]: Failed password for root from 139.155.11.173 port 35286 ssh2
Aug 14 09:27:00 eventyay sshd[26831]: Failed password for root from 139.155.11.173 port 33954 ssh2
...
2020-08-14 15:40:45
94.31.85.173 attack
Aug 14 09:43:11 relay dovecot: imap-login: Disconnected: Inactivity \(auth failed, 1 attempts in 180 secs\): user=\, method=PLAIN, rip=94.31.85.173, lip=5.9.254.190, session=\
Aug 14 09:43:13 relay dovecot: imap-login: Disconnected: Inactivity \(auth failed, 1 attempts in 180 secs\): user=\, method=PLAIN, rip=94.31.85.173, lip=5.9.254.190, session=\<3OAFiNGsXK5eH1Wt\>
Aug 14 09:43:35 relay dovecot: imap-login: Disconnected: Inactivity \(auth failed, 1 attempts in 180 secs\): user=\, method=PLAIN, rip=94.31.85.173, lip=5.9.254.190, session=\
Aug 14 09:48:45 relay dovecot: imap-login: Disconnected: Inactivity \(auth failed, 1 attempts in 180 secs\): user=\, method=PLAIN, rip=94.31.85.173, lip=5.9.254.190, session=\<1kTQm9GsvLJeH1Wt\>
Aug 14 09:48:47 relay dovecot: imap-login: Disconnected: Inactivity \(auth failed, 1 attempts in 180 secs\): user=\<
...
2020-08-14 15:56:34
106.12.42.251 attackbots
srv02 Mass scanning activity detected Target: 24005  ..
2020-08-14 15:35:23
223.31.104.250 attackspambots
Unauthorized connection attempt from IP address 223.31.104.250 on Port 445(SMB)
2020-08-14 16:02:57
120.239.196.105 attack
Aug 14 05:52:46 abendstille sshd\[26378\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=120.239.196.105  user=root
Aug 14 05:52:48 abendstille sshd\[26378\]: Failed password for root from 120.239.196.105 port 46612 ssh2
Aug 14 05:57:41 abendstille sshd\[31365\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=120.239.196.105  user=root
Aug 14 05:57:43 abendstille sshd\[31365\]: Failed password for root from 120.239.196.105 port 6640 ssh2
Aug 14 06:02:31 abendstille sshd\[4145\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=120.239.196.105  user=root
...
2020-08-14 15:43:40
49.233.58.73 attackspambots
Aug 14 08:14:55 Ubuntu-1404-trusty-64-minimal sshd\[27792\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.233.58.73  user=root
Aug 14 08:14:57 Ubuntu-1404-trusty-64-minimal sshd\[27792\]: Failed password for root from 49.233.58.73 port 60538 ssh2
Aug 14 08:25:26 Ubuntu-1404-trusty-64-minimal sshd\[723\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.233.58.73  user=root
Aug 14 08:25:28 Ubuntu-1404-trusty-64-minimal sshd\[723\]: Failed password for root from 49.233.58.73 port 44580 ssh2
Aug 14 08:32:06 Ubuntu-1404-trusty-64-minimal sshd\[8754\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.233.58.73  user=root
2020-08-14 15:39:25
5.188.86.167 attackspambots
SSH Bruteforce Attempt on Honeypot
2020-08-14 15:44:24

Recently Reported IPs

106.14.123.116 106.14.2.60 106.14.123.158 106.14.123.16
106.14.123.137 106.14.123.156 106.14.2.75 106.14.2.86
106.14.13.28 106.14.13.44 106.14.13.41 106.14.13.76
106.14.13.82 106.14.13.32 106.14.13.46 106.14.13.249
106.14.13.95 106.14.132.11 106.14.13.99 106.14.20.131