Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: China

Internet Service Provider: LiuPanShui County

Hostname: unknown

Organization: unknown

Usage Type: Fixed Line ISP

Comments:
Type Details Datetime
attackspam
scan z
2019-09-21 04:40:05
Comments on same subnet:
IP Type Details Datetime
114.139.245.220 attackspambots
2019-09-12T05:29:18.122369abusebot-7.cloudsearch.cf sshd\[21030\]: Invalid user mother from 114.139.245.220 port 46423
2019-09-12 15:40:49
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 114.139.245.66
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 39111
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;114.139.245.66.			IN	A

;; AUTHORITY SECTION:
.			511	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019092001 1800 900 604800 86400

;; Query time: 99 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Sep 21 04:40:02 CST 2019
;; MSG SIZE  rcvd: 118
Host info
Host 66.245.139.114.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 66.245.139.114.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
52.164.211.22 attackspambots
2019-09-01T07:43:02.990431abusebot-3.cloudsearch.cf sshd\[21347\]: Invalid user areknet from 52.164.211.22 port 33732
2019-09-01 20:12:20
196.45.48.59 attackspambots
Aug 31 21:42:36 web9 sshd\[6738\]: Invalid user malcom from 196.45.48.59
Aug 31 21:42:36 web9 sshd\[6738\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=196.45.48.59
Aug 31 21:42:38 web9 sshd\[6738\]: Failed password for invalid user malcom from 196.45.48.59 port 37732 ssh2
Aug 31 21:47:24 web9 sshd\[7724\]: Invalid user class2004 from 196.45.48.59
Aug 31 21:47:24 web9 sshd\[7724\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=196.45.48.59
2019-09-01 20:34:21
110.42.6.31 attack
Sep  1 09:10:21 vps01 sshd[3369]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=110.42.6.31
Sep  1 09:10:23 vps01 sshd[3369]: Failed password for invalid user hirano from 110.42.6.31 port 36292 ssh2
2019-09-01 19:51:57
103.41.38.19 attack
LGS,WP GET /wp-login.php
2019-09-01 20:08:21
158.69.110.31 attackbots
2019-09-01T12:35:58.023999abusebot-8.cloudsearch.cf sshd\[30632\]: Invalid user megashop from 158.69.110.31 port 53652
2019-09-01 20:37:28
171.64.56.173 attackspambots
2019-09-01T11:58:41.260683abusebot-2.cloudsearch.cf sshd\[20524\]: Invalid user jobsubmit from 171.64.56.173 port 50238
2019-09-01 20:06:34
151.31.28.40 attack
Sep  1 13:20:57 ArkNodeAT sshd\[1891\]: Invalid user elia from 151.31.28.40
Sep  1 13:20:57 ArkNodeAT sshd\[1891\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=151.31.28.40
Sep  1 13:20:59 ArkNodeAT sshd\[1891\]: Failed password for invalid user elia from 151.31.28.40 port 33678 ssh2
2019-09-01 20:06:57
68.183.136.244 attackbots
$f2bV_matches_ltvn
2019-09-01 19:53:59
122.70.153.228 attackbots
Automatic report - Banned IP Access
2019-09-01 20:31:22
27.71.225.122 attackspambots
3389BruteforceIDS
2019-09-01 20:40:19
123.188.151.3 attackbots
Unauthorised access (Sep  1) SRC=123.188.151.3 LEN=40 TTL=49 ID=15179 TCP DPT=8080 WINDOW=36477 SYN 
Unauthorised access (Sep  1) SRC=123.188.151.3 LEN=40 TTL=49 ID=40083 TCP DPT=8080 WINDOW=28940 SYN 
Unauthorised access (Aug 31) SRC=123.188.151.3 LEN=40 TTL=49 ID=45566 TCP DPT=8080 WINDOW=33653 SYN 
Unauthorised access (Aug 31) SRC=123.188.151.3 LEN=40 PREC=0x20 TTL=49 ID=17262 TCP DPT=8080 WINDOW=30862 SYN 
Unauthorised access (Aug 29) SRC=123.188.151.3 LEN=40 TTL=49 ID=61339 TCP DPT=8080 WINDOW=15186 SYN
2019-09-01 20:35:47
178.128.156.144 attack
makerspace.nqdclub.com fail2ban triggered
2019-09-01 20:06:09
78.106.14.226 attack
SMB Server BruteForce Attack
2019-09-01 20:27:17
1.186.86.205 attackbotsspam
Autoban   1.186.86.205 VIRUS
2019-09-01 20:25:39
165.227.60.103 attackbots
2019-09-01T07:42:07.123488abusebot-6.cloudsearch.cf sshd\[24818\]: Invalid user localadmin from 165.227.60.103 port 43508
2019-09-01 20:37:05

Recently Reported IPs

2001:16a2:12ad:ac00:2c07:572a:a749:4f72 182.61.50.189 45.82.35.225 84.201.255.221
227.160.191.101 37.16.21.134 51.38.232.93 23.35.94.29
167.71.40.75 77.228.7.63 35.244.17.209 20.223.126.42
3.244.154.76 153.229.115.31 4.168.95.83 88.58.8.136
140.205.162.219 29.253.126.161 14.100.181.0 217.19.221.187