Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: China

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 114.220.81.139
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 27336
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;114.220.81.139.			IN	A

;; AUTHORITY SECTION:
.			411	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022030400 1800 900 604800 86400

;; Query time: 17 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Mar 04 14:59:00 CST 2022
;; MSG SIZE  rcvd: 107
Host info
Host 139.81.220.114.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 139.81.220.114.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
54.38.47.28 attackbots
2019-07-17T00:12:58.676809abusebot-5.cloudsearch.cf sshd\[32610\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=ns3115987.ip-54-38-47.eu  user=root
2019-07-17 08:13:02
107.180.108.30 attack
xmlrpc attack
2019-07-17 08:06:17
112.85.42.237 attackbots
Jul 17 05:11:17 areeb-Workstation sshd\[12937\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.85.42.237  user=root
Jul 17 05:11:19 areeb-Workstation sshd\[12937\]: Failed password for root from 112.85.42.237 port 10418 ssh2
Jul 17 05:11:55 areeb-Workstation sshd\[13019\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.85.42.237  user=root
...
2019-07-17 07:54:02
71.6.232.4 attackspam
firewall-block, port(s): 587/tcp
2019-07-17 07:29:15
114.242.245.251 attackspambots
Jul 16 22:35:48 mail sshd\[5973\]: Invalid user hadoop from 114.242.245.251 port 35780
Jul 16 22:35:48 mail sshd\[5973\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=114.242.245.251
Jul 16 22:35:49 mail sshd\[5973\]: Failed password for invalid user hadoop from 114.242.245.251 port 35780 ssh2
Jul 16 22:40:09 mail sshd\[6030\]: Invalid user ssh from 114.242.245.251 port 53688
Jul 16 22:40:09 mail sshd\[6030\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=114.242.245.251
...
2019-07-17 07:33:29
220.130.178.36 attack
Jul 16 23:21:39 ip-172-31-1-72 sshd\[31911\]: Invalid user selma from 220.130.178.36
Jul 16 23:21:39 ip-172-31-1-72 sshd\[31911\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=220.130.178.36
Jul 16 23:21:41 ip-172-31-1-72 sshd\[31911\]: Failed password for invalid user selma from 220.130.178.36 port 58058 ssh2
Jul 16 23:26:56 ip-172-31-1-72 sshd\[32061\]: Invalid user system from 220.130.178.36
Jul 16 23:26:56 ip-172-31-1-72 sshd\[32061\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=220.130.178.36
2019-07-17 07:31:11
120.92.104.116 attackspambots
Jul  1 13:46:14 server sshd\[69914\]: Invalid user miu from 120.92.104.116
Jul  1 13:46:15 server sshd\[69914\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=120.92.104.116
Jul  1 13:46:16 server sshd\[69914\]: Failed password for invalid user miu from 120.92.104.116 port 8148 ssh2
...
2019-07-17 07:35:09
12.133.183.250 attackbotsspam
Apr 30 03:17:13 server sshd\[134446\]: Invalid user deploy from 12.133.183.250
Apr 30 03:17:13 server sshd\[134446\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=12.133.183.250
Apr 30 03:17:15 server sshd\[134446\]: Failed password for invalid user deploy from 12.133.183.250 port 6605 ssh2
...
2019-07-17 07:57:49
197.57.170.28 attackspam
Caught in portsentry honeypot
2019-07-17 08:01:48
178.128.76.6 attackspam
Jul 17 01:07:23 localhost sshd\[21071\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.128.76.6  user=root
Jul 17 01:07:25 localhost sshd\[21071\]: Failed password for root from 178.128.76.6 port 53452 ssh2
Jul 17 01:12:02 localhost sshd\[21617\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.128.76.6  user=irc
2019-07-17 07:27:51
103.52.52.23 attackbots
Invalid user tw from 103.52.52.23 port 42576
2019-07-17 08:10:27
198.176.48.192 attackbotsspam
SSH Brute Force, server-1 sshd[17633]: Failed password for root from 198.176.48.192 port 56414 ssh2
2019-07-17 07:54:32
120.132.31.120 attack
2019-07-16T23:21:34.687487abusebot-7.cloudsearch.cf sshd\[12953\]: Invalid user postgres from 120.132.31.120 port 50698
2019-07-17 07:50:22
120.132.53.137 attackbots
May 29 15:13:11 server sshd\[133704\]: Invalid user jenkins from 120.132.53.137
May 29 15:13:11 server sshd\[133704\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=120.132.53.137
May 29 15:13:13 server sshd\[133704\]: Failed password for invalid user jenkins from 120.132.53.137 port 47309 ssh2
...
2019-07-17 07:49:29
120.31.140.51 attackspambots
Apr 30 03:41:12 server sshd\[135087\]: Invalid user ting from 120.31.140.51
Apr 30 03:41:12 server sshd\[135087\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=120.31.140.51
Apr 30 03:41:14 server sshd\[135087\]: Failed password for invalid user ting from 120.31.140.51 port 33402 ssh2
...
2019-07-17 07:41:04

Recently Reported IPs

114.220.66.240 113.53.136.224 114.220.81.123 114.220.81.238
114.220.81.246 114.220.81.69 114.220.81.61 114.220.81.62
114.220.74.168 114.220.81.86 114.220.82.147 114.220.86.144
114.220.85.11 114.220.86.30 113.53.136.39 114.220.86.243
114.220.86.154 114.220.95.99 114.221.100.24 114.220.95.69