Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: China

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 114.234.139.226
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 10677
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;114.234.139.226.		IN	A

;; AUTHORITY SECTION:
.			582	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022030400 1800 900 604800 86400

;; Query time: 60 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Mar 04 15:23:18 CST 2022
;; MSG SIZE  rcvd: 108
Host info
Host 226.139.234.114.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 226.139.234.114.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
185.105.121.55 attackspambots
5x Failed Password
2019-10-27 04:09:48
35.201.171.166 attackspam
2019-10-26T19:55:11.715114abusebot-5.cloudsearch.cf sshd\[22246\]: Invalid user postgres from 35.201.171.166 port 37016
2019-10-27 03:59:08
49.88.112.111 attack
Oct 27 01:29:09 gw1 sshd[22668]: Failed password for root from 49.88.112.111 port 53771 ssh2
...
2019-10-27 04:30:54
94.50.26.18 attack
Invalid user admin from 94.50.26.18 port 34023
2019-10-27 04:25:52
128.199.224.73 attackspam
Invalid user admin from 128.199.224.73 port 49387
2019-10-27 04:19:34
218.149.228.171 attackbotsspam
Invalid user admin from 218.149.228.171 port 50136
2019-10-27 04:03:58
192.228.100.222 attackbots
Invalid user DUP from 192.228.100.222 port 49486
2019-10-27 04:08:03
61.41.159.29 attackbotsspam
Invalid user applmgr from 61.41.159.29 port 50304
2019-10-27 04:28:28
162.248.54.39 attackspambots
Invalid user local from 162.248.54.39 port 46880
2019-10-27 04:15:23
182.61.18.254 attackspambots
Automatic report - Banned IP Access
2019-10-27 04:10:44
179.52.61.30 attackspambots
Invalid user pi from 179.52.61.30 port 60542
2019-10-27 04:12:52
14.161.71.103 attack
Invalid user admin from 14.161.71.103 port 54912
2019-10-27 04:00:53
45.55.157.147 attackspam
SSH bruteforce (Triggered fail2ban)
2019-10-27 03:57:25
35.221.170.155 attack
Oct 26 22:24:00 tux-35-217 sshd\[22093\]: Invalid user p12345 from 35.221.170.155 port 35966
Oct 26 22:24:00 tux-35-217 sshd\[22093\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=35.221.170.155
Oct 26 22:24:02 tux-35-217 sshd\[22093\]: Failed password for invalid user p12345 from 35.221.170.155 port 35966 ssh2
Oct 26 22:29:43 tux-35-217 sshd\[22120\]: Invalid user t0ttenham from 35.221.170.155 port 46914
Oct 26 22:29:43 tux-35-217 sshd\[22120\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=35.221.170.155
...
2019-10-27 04:31:25
159.89.169.109 attack
Oct 26 18:12:17 server sshd\[22867\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.89.169.109  user=root
Oct 26 18:12:19 server sshd\[22867\]: Failed password for root from 159.89.169.109 port 43988 ssh2
Oct 26 18:24:00 server sshd\[26676\]: Invalid user 10isp from 159.89.169.109
Oct 26 18:24:00 server sshd\[26676\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.89.169.109 
Oct 26 18:24:02 server sshd\[26676\]: Failed password for invalid user 10isp from 159.89.169.109 port 60598 ssh2
...
2019-10-27 04:16:02

Recently Reported IPs

113.53.193.68 114.234.139.246 114.234.139.251 114.234.139.38
114.234.139.68 114.234.139.245 114.234.139.46 114.234.139.89
114.234.139.93 114.234.139.43 114.234.139.235 113.53.194.101
114.234.139.96 114.234.139.94 114.234.14.225 114.234.144.93
114.234.145.79 114.234.150.0 114.234.150.59 114.234.151.15