Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: China

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 113.139.141.14
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 62248
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;113.139.141.14.			IN	A

;; AUTHORITY SECTION:
.			199	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2020081202 1800 900 604800 86400

;; Query time: 86 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Aug 13 03:45:19 CST 2020
;; MSG SIZE  rcvd: 118
Host info
Host 14.141.139.113.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 14.141.139.113.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
192.144.182.13 attackbots
20 attempts against mh-misbehave-ban on pluto
2020-06-06 10:05:37
14.145.145.141 attack
Jun  6 00:23:31 ns381471 sshd[15531]: Failed password for root from 14.145.145.141 port 53590 ssh2
2020-06-06 09:40:53
121.58.211.162 attackbots
Jun  4 08:08:44 host sshd[23591]: User r.r from 121.58.211.162 not allowed because none of user's groups are listed in AllowGroups
Jun  4 08:08:44 host sshd[23591]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.58.211.162  user=r.r
Jun  4 08:08:46 host sshd[23591]: Failed password for invalid user r.r from 121.58.211.162 port 56134 ssh2
Jun  4 08:08:47 host sshd[23591]: Received disconnect from 121.58.211.162 port 56134:11: Bye Bye [preauth]
Jun  4 08:08:47 host sshd[23591]: Disconnected from invalid user r.r 121.58.211.162 port 56134 [preauth]
Jun  4 08:17:58 host sshd[23797]: User r.r from 121.58.211.162 not allowed because none of user's groups are listed in AllowGroups
Jun  4 08:17:58 host sshd[23797]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.58.211.162  user=r.r
Jun  4 08:18:00 host sshd[23797]: Failed password for invalid user r.r from 121.58.211.162 port 61182 ssh2
Ju........
-------------------------------
2020-06-06 09:58:22
122.51.18.119 attackspam
Jun  5 22:04:28 *** sshd[21431]: User root from 122.51.18.119 not allowed because not listed in AllowUsers
2020-06-06 09:55:19
212.237.1.50 attackbotsspam
Jun  5 23:04:25 amit sshd\[1671\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=212.237.1.50  user=root
Jun  5 23:04:27 amit sshd\[1671\]: Failed password for root from 212.237.1.50 port 56430 ssh2
Jun  5 23:13:40 amit sshd\[1810\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=212.237.1.50  user=root
...
2020-06-06 10:10:06
162.62.29.207 attack
SSH / Telnet Brute Force Attempts on Honeypot
2020-06-06 09:53:10
79.10.74.233 attack
Honeypot attack, port: 81, PTR: host233-74-static.10-79-b.business.telecomitalia.it.
2020-06-06 09:46:16
220.134.32.95 attack
Honeypot attack, port: 81, PTR: 220-134-32-95.HINET-IP.hinet.net.
2020-06-06 10:09:49
54.38.185.131 attackbots
Jun  6 03:25:20 ns382633 sshd\[16452\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=54.38.185.131  user=root
Jun  6 03:25:23 ns382633 sshd\[16452\]: Failed password for root from 54.38.185.131 port 33624 ssh2
Jun  6 03:33:31 ns382633 sshd\[17561\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=54.38.185.131  user=root
Jun  6 03:33:33 ns382633 sshd\[17561\]: Failed password for root from 54.38.185.131 port 48566 ssh2
Jun  6 03:35:40 ns382633 sshd\[18164\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=54.38.185.131  user=root
2020-06-06 09:44:04
189.16.0.42 attack
Honeypot attack, port: 445, PTR: bkbrasil-G1-0-5-1729-iacc02.cta.embratel.net.br.
2020-06-06 10:04:26
176.114.199.56 attackspam
Jun  6 01:09:02 abendstille sshd\[3475\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=176.114.199.56  user=root
Jun  6 01:09:04 abendstille sshd\[3475\]: Failed password for root from 176.114.199.56 port 37564 ssh2
Jun  6 01:12:35 abendstille sshd\[6953\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=176.114.199.56  user=root
Jun  6 01:12:37 abendstille sshd\[6953\]: Failed password for root from 176.114.199.56 port 38286 ssh2
Jun  6 01:15:58 abendstille sshd\[10161\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=176.114.199.56  user=root
...
2020-06-06 09:47:08
119.45.0.9 attackspambots
2020-06-06T01:13:38.601529abusebot.cloudsearch.cf sshd[27282]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=119.45.0.9  user=root
2020-06-06T01:13:40.211310abusebot.cloudsearch.cf sshd[27282]: Failed password for root from 119.45.0.9 port 33180 ssh2
2020-06-06T01:16:07.183696abusebot.cloudsearch.cf sshd[27442]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=119.45.0.9  user=root
2020-06-06T01:16:09.250012abusebot.cloudsearch.cf sshd[27442]: Failed password for root from 119.45.0.9 port 53350 ssh2
2020-06-06T01:16:57.712784abusebot.cloudsearch.cf sshd[27502]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=119.45.0.9  user=root
2020-06-06T01:16:59.643587abusebot.cloudsearch.cf sshd[27502]: Failed password for root from 119.45.0.9 port 33600 ssh2
2020-06-06T01:17:50.976800abusebot.cloudsearch.cf sshd[27565]: pam_unix(sshd:auth): authentication failure; logname= uid=
...
2020-06-06 09:50:54
46.103.180.19 attack
IP 46.103.180.19 attacked honeypot on port: 8080 at 6/5/2020 9:24:36 PM
2020-06-06 10:07:49
197.219.83.75 attack
Honeypot attack, port: 5555, PTR: PTR record not found
2020-06-06 09:54:43
194.26.25.113 attackspam
Jun  6 03:35:33 debian-2gb-nbg1-2 kernel: \[13666084.266596\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=194.26.25.113 DST=195.201.40.59 LEN=40 TOS=0x00 PREC=0x00 TTL=240 ID=2230 PROTO=TCP SPT=44473 DPT=8769 WINDOW=1024 RES=0x00 SYN URGP=0
2020-06-06 09:43:46

Recently Reported IPs

189.29.215.150 249.240.166.160 39.65.1.24 5.12.213.230
216.46.42.42 213.170.247.157 201.117.138.69 194.15.36.157
185.244.172.168 180.252.50.136 140.215.5.248 179.108.138.49
178.219.187.6 178.47.216.186 172.58.191.115 169.28.164.16
171.235.44.243 90.95.201.48 167.114.113.245 56.49.202.238