Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: China

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 114.234.139.89
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 12208
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;114.234.139.89.			IN	A

;; AUTHORITY SECTION:
.			462	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022030400 1800 900 604800 86400

;; Query time: 102 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Mar 04 15:23:20 CST 2022
;; MSG SIZE  rcvd: 107
Host info
Host 89.139.234.114.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 89.139.234.114.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
177.34.148.63 attackbots
[portscan] tcp/23 [TELNET]
in spfbl.net:'listed'
*(RWIN=44649)(10221000)
2019-10-22 17:39:04
192.182.124.9 attackspambots
$f2bV_matches
2019-10-22 17:51:33
128.199.52.45 attackspambots
Oct 22 05:47:09 lnxded64 sshd[18315]: Failed password for root from 128.199.52.45 port 33970 ssh2
Oct 22 05:47:09 lnxded64 sshd[18315]: Failed password for root from 128.199.52.45 port 33970 ssh2
Oct 22 05:51:10 lnxded64 sshd[19217]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.199.52.45
2019-10-22 17:26:50
118.25.103.132 attackspam
Oct 22 06:57:07 OPSO sshd\[12059\]: Invalid user boc from 118.25.103.132 port 56774
Oct 22 06:57:07 OPSO sshd\[12059\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.25.103.132
Oct 22 06:57:09 OPSO sshd\[12059\]: Failed password for invalid user boc from 118.25.103.132 port 56774 ssh2
Oct 22 07:01:30 OPSO sshd\[13008\]: Invalid user legal2 from 118.25.103.132 port 34946
Oct 22 07:01:30 OPSO sshd\[13008\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.25.103.132
2019-10-22 17:46:23
36.224.40.56 attackbots
UTC: 2019-10-21 port: 23/tcp
2019-10-22 17:36:26
193.151.13.22 attackbotsspam
UTC: 2019-10-21 port: 80/tcp
2019-10-22 17:33:37
96.19.3.46 attackspam
Oct 22 07:24:11 odroid64 sshd\[31518\]: User root from 96.19.3.46 not allowed because not listed in AllowUsers
Oct 22 07:24:11 odroid64 sshd\[31518\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=96.19.3.46  user=root
...
2019-10-22 17:32:38
218.75.216.20 attackbotsspam
Oct 22 06:46:55 www5 sshd\[3043\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.75.216.20  user=root
Oct 22 06:46:57 www5 sshd\[3043\]: Failed password for root from 218.75.216.20 port 37894 ssh2
Oct 22 06:50:47 www5 sshd\[3719\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.75.216.20  user=root
...
2019-10-22 17:41:44
106.14.149.75 attackbotsspam
port scan and connect, tcp 5432 (postgresql)
2019-10-22 17:28:56
216.243.31.2 attackbots
UTC: 2019-10-21 pkts: 2
ports(tcp): 80, 443
2019-10-22 17:51:10
42.114.40.148 attackbots
UTC: 2019-10-21 port: 23/tcp
2019-10-22 17:42:53
97.79.238.200 attackspambots
Automatic report - XMLRPC Attack
2019-10-22 17:43:58
13.57.47.181 attack
Oct 22 10:38:04 v22019058497090703 sshd[8656]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=13.57.47.181
Oct 22 10:38:06 v22019058497090703 sshd[8656]: Failed password for invalid user rsync from 13.57.47.181 port 60350 ssh2
Oct 22 10:47:23 v22019058497090703 sshd[9460]: Failed password for root from 13.57.47.181 port 41362 ssh2
...
2019-10-22 17:35:37
74.82.47.17 attack
UTC: 2019-10-21 port: 21/tcp
2019-10-22 17:49:33
37.139.13.105 attackspam
Oct 21 20:02:51 server sshd\[17823\]: Failed password for invalid user jboss from 37.139.13.105 port 52550 ssh2
Oct 22 12:03:47 server sshd\[5007\]: Invalid user ubuntu from 37.139.13.105
Oct 22 12:03:47 server sshd\[5007\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=37.139.13.105 
Oct 22 12:03:49 server sshd\[5007\]: Failed password for invalid user ubuntu from 37.139.13.105 port 41420 ssh2
Oct 22 12:08:08 server sshd\[6101\]: Invalid user support from 37.139.13.105
Oct 22 12:08:08 server sshd\[6101\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=37.139.13.105 
...
2019-10-22 17:30:01

Recently Reported IPs

114.234.139.46 114.234.139.93 114.234.139.43 114.234.139.235
113.53.194.101 114.234.139.96 114.234.139.94 114.234.14.225
114.234.144.93 114.234.145.79 114.234.150.0 114.234.150.59
114.234.151.15 114.234.151.92 114.234.149.230 114.234.161.38
113.53.194.109 114.234.161.153 114.234.163.239 114.234.163.35