Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: None

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 114.103.89.157
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 61583
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;114.103.89.157.			IN	A

;; AUTHORITY SECTION:
.			599	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022031603 1800 900 604800 86400

;; Query time: 140 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Mar 17 06:31:04 CST 2022
;; MSG SIZE  rcvd: 107
Host info
Host 157.89.103.114.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 157.89.103.114.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
13.64.191.154 attackspam
Connection to SSH Honeypot - Detected by HoneypotDB
2020-07-15 12:56:10
81.68.118.156 attackspambots
Lines containing failures of 81.68.118.156
Jul 15 03:58:21 icinga sshd[16246]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=81.68.118.156  user=r.r
Jul 15 03:58:24 icinga sshd[16246]: Failed password for r.r from 81.68.118.156 port 46130 ssh2
Jul 15 03:58:24 icinga sshd[16246]: Connection closed by authenticating user r.r 81.68.118.156 port 46130 [preauth]
Jul 15 03:58:26 icinga sshd[16262]: Invalid user maxime from 81.68.118.156 port 46318
Jul 15 03:58:26 icinga sshd[16262]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=81.68.118.156
Jul 15 03:58:28 icinga sshd[16262]: Failed password for invalid user maxime from 81.68.118.156 port 46318 ssh2


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=81.68.118.156
2020-07-15 12:51:44
13.68.247.181 attack
SSH brute-force attempt
2020-07-15 12:30:08
186.84.91.80 attack
Jul 15 03:57:10 mxgate1 postfix/postscreen[19159]: CONNECT from [186.84.91.80]:20427 to [176.31.12.44]:25
Jul 15 03:57:10 mxgate1 postfix/dnsblog[19163]: addr 186.84.91.80 listed by domain zen.spamhaus.org as 127.0.0.4
Jul 15 03:57:10 mxgate1 postfix/dnsblog[19163]: addr 186.84.91.80 listed by domain zen.spamhaus.org as 127.0.0.11
Jul 15 03:57:10 mxgate1 postfix/dnsblog[19161]: addr 186.84.91.80 listed by domain bl.spamcop.net as 127.0.0.2
Jul 15 03:57:10 mxgate1 postfix/dnsblog[19160]: addr 186.84.91.80 listed by domain ix.dnsbl.xxxxxx.net as 127.0.0.2
Jul 15 03:57:10 mxgate1 postfix/dnsblog[19185]: addr 186.84.91.80 listed by domain cbl.abuseat.org as 127.0.0.2
Jul 15 03:57:10 mxgate1 postfix/dnsblog[19164]: addr 186.84.91.80 listed by domain b.barracudacentral.org as 127.0.0.2
Jul 15 03:57:16 mxgate1 postfix/postscreen[19159]: DNSBL rank 6 for [186.84.91.80]:20427
Jul x@x
Jul 15 03:57:21 mxgate1 postfix/postscreen[19159]: HANGUP after 5.3 from [186.84.91.80]:20427 in........
-------------------------------
2020-07-15 12:41:52
199.195.249.95 attackspambots
1594778611 - 07/15/2020 09:03:31 Host: ./199.195.249.95 Port: 8080 TCP Blocked
...
2020-07-15 12:39:08
40.115.237.117 attack
invalid user
2020-07-15 12:51:00
151.236.59.142 attack
SSH Login Bruteforce
2020-07-15 12:49:56
93.252.66.48 attackbotsspam
Jul 15 03:56:03 h1946882 sshd[30702]: Failed password for invalid user =
pi from 93.252.66.48 port 56568 ssh2
Jul 15 03:56:03 h1946882 sshd[30702]: Connection closed by 93.252.66.48=
 [preauth]
Jul 15 03:56:03 h1946882 sshd[30704]: Failed password for invalid user =
pi from 93.252.66.48 port 56572 ssh2
Jul 15 03:56:03 h1946882 sshd[30704]: Connection closed by 93.252.66.48=
 [preauth]


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=93.252.66.48
2020-07-15 12:35:08
81.95.42.61 attackspambots
2020-07-15T04:01:49.563863mail.broermann.family sshd[17954]: Invalid user sinusbot from 81.95.42.61 port 48964
2020-07-15T04:01:49.569869mail.broermann.family sshd[17954]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=81.95.42.61
2020-07-15T04:01:49.563863mail.broermann.family sshd[17954]: Invalid user sinusbot from 81.95.42.61 port 48964
2020-07-15T04:01:51.790159mail.broermann.family sshd[17954]: Failed password for invalid user sinusbot from 81.95.42.61 port 48964 ssh2
2020-07-15T04:03:11.272582mail.broermann.family sshd[18016]: Invalid user vagner from 81.95.42.61 port 39042
...
2020-07-15 13:06:42
20.43.35.99 attack
Jul 15 06:44:37 haigwepa sshd[1837]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=20.43.35.99 
Jul 15 06:44:39 haigwepa sshd[1837]: Failed password for invalid user admin from 20.43.35.99 port 34382 ssh2
...
2020-07-15 12:52:32
134.73.89.172 attack
Ray-Ban Counterfeit Spam

Return-Path: 
Received: from source:[134.73.89.172] helo:a.caomeivr.com
Message-ID: <3_____D@aapmhm>
From: "Ray Ban" 
Subject: Discount Ray Ban Sunglasses Online, Up To 85% OFF!
Date: Wed, 15 Jul 2020 03:54:32 +0800
X-Mailer: Microsoft Outlook Express 6.00.2900.5512
X-MimeOLE: Produced By Microsoft MimeOLE V6.00.2900.5512

https://www.lberb.com/
172.67.185.61
104.31.76.162
104.31.77.162
2606:4700:3034::ac43:b93d
2606:4700:3034::681f:4da2
2606:4700:3032::681f:4ca2
2020-07-15 12:45:10
104.40.250.111 attack
2020-07-15T06:46:57.0843191240 sshd\[4331\]: Invalid user admin from 104.40.250.111 port 21960
2020-07-15T06:46:57.0892241240 sshd\[4331\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.40.250.111
2020-07-15T06:46:59.1728901240 sshd\[4331\]: Failed password for invalid user admin from 104.40.250.111 port 21960 ssh2
...
2020-07-15 12:48:27
106.52.56.102 attack
Jul 15 02:18:33 plex-server sshd[1204211]: Invalid user www from 106.52.56.102 port 53772
Jul 15 02:18:33 plex-server sshd[1204211]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.52.56.102 
Jul 15 02:18:33 plex-server sshd[1204211]: Invalid user www from 106.52.56.102 port 53772
Jul 15 02:18:35 plex-server sshd[1204211]: Failed password for invalid user www from 106.52.56.102 port 53772 ssh2
Jul 15 02:22:20 plex-server sshd[1205365]: Invalid user vicky from 106.52.56.102 port 39634
...
2020-07-15 12:58:38
186.84.21.48 attackspam
abasicmove.de 186.84.21.48 [15/Jul/2020:04:03:34 +0200] "POST /xmlrpc.php HTTP/1.1" 200 4319 "-" "Mozilla/5.0 (Windows NT 6.1; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/59.0.3071.109 Safari/537.36"
abasicmove.de 186.84.21.48 [15/Jul/2020:04:03:38 +0200] "POST /xmlrpc.php HTTP/1.1" 200 4321 "-" "Mozilla/5.0 (Windows NT 6.1; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/59.0.3071.109 Safari/537.36"
2020-07-15 12:31:16
139.199.12.83 attack
2020-07-15T05:10:13.291994vps751288.ovh.net sshd\[4438\]: Invalid user mongod from 139.199.12.83 port 45400
2020-07-15T05:10:13.299324vps751288.ovh.net sshd\[4438\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.199.12.83
2020-07-15T05:10:14.926965vps751288.ovh.net sshd\[4438\]: Failed password for invalid user mongod from 139.199.12.83 port 45400 ssh2
2020-07-15T05:14:16.397162vps751288.ovh.net sshd\[4498\]: Invalid user bae from 139.199.12.83 port 59158
2020-07-15T05:14:16.405231vps751288.ovh.net sshd\[4498\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.199.12.83
2020-07-15 12:53:17

Recently Reported IPs

114.103.89.121 114.103.99.1 114.104.128.46 114.104.129.149
114.104.131.183 114.104.131.227 114.104.134.152 114.104.134.217
114.104.135.173 114.104.135.205 114.108.139.38 114.110.21.14
114.130.119.56 114.130.54.205 114.130.54.76 114.141.204.79
114.141.206.58 114.142.162.25 114.179.216.175 114.179.4.251