Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: China

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 114.239.148.193
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 18080
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;114.239.148.193.		IN	A

;; AUTHORITY SECTION:
.			188	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022040702 1800 900 604800 86400

;; Query time: 63 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Apr 08 03:26:54 CST 2022
;; MSG SIZE  rcvd: 108
Host info
Host 193.148.239.114.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 193.148.239.114.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
139.59.114.133 attackbots
2019-08-01T03:45:48.414792wiz-ks3 sshd[22998]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.114.133  user=root
2019-08-01T03:45:50.270438wiz-ks3 sshd[22998]: Failed password for root from 139.59.114.133 port 43570 ssh2
2019-08-01T03:45:52.365544wiz-ks3 sshd[23016]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.114.133  user=root
2019-08-01T03:45:54.101620wiz-ks3 sshd[23016]: Failed password for root from 139.59.114.133 port 44464 ssh2
2019-08-01T03:45:56.263134wiz-ks3 sshd[23032]: Invalid user HDk1g2i3@#! from 139.59.114.133 port 45292
2019-08-01T03:45:56.265134wiz-ks3 sshd[23032]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.114.133
2019-08-01T03:45:56.263134wiz-ks3 sshd[23032]: Invalid user HDk1g2i3@#! from 139.59.114.133 port 45292
2019-08-01T03:45:57.884129wiz-ks3 sshd[23032]: Failed password for invalid user HDk1g2i3@#! from 139.59.114.133 port 45292 ssh2
20
2019-08-06 11:50:55
114.108.181.139 attack
2019-07-28T12:58:13.377024wiz-ks3 sshd[4169]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=114.108.181.139  user=root
2019-07-28T12:58:15.933842wiz-ks3 sshd[4169]: Failed password for root from 114.108.181.139 port 49755 ssh2
2019-07-28T13:02:44.796048wiz-ks3 sshd[4225]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=114.108.181.139  user=root
2019-07-28T13:02:47.226820wiz-ks3 sshd[4225]: Failed password for root from 114.108.181.139 port 38879 ssh2
2019-07-28T13:05:10.879670wiz-ks3 sshd[4231]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=114.108.181.139  user=root
2019-07-28T13:05:13.019545wiz-ks3 sshd[4231]: Failed password for root from 114.108.181.139 port 47392 ssh2
2019-07-28T13:07:28.125231wiz-ks3 sshd[4235]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=114.108.181.139  user=root
2019-07-28T13:07:29.874012wiz-ks3 sshd[4235]: Failed pas
2019-08-06 12:21:23
123.56.232.35 attack
2019-07-08T12:37:04.397026wiz-ks3 sshd[17465]: Invalid user user1 from 123.56.232.35 port 48431
2019-07-08T12:37:04.399192wiz-ks3 sshd[17465]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=123.56.232.35
2019-07-08T12:37:04.397026wiz-ks3 sshd[17465]: Invalid user user1 from 123.56.232.35 port 48431
2019-07-08T12:37:06.440303wiz-ks3 sshd[17465]: Failed password for invalid user user1 from 123.56.232.35 port 48431 ssh2
2019-07-08T12:37:09.929676wiz-ks3 sshd[17467]: Invalid user user2 from 123.56.232.35 port 59828
2019-07-08T12:37:09.931797wiz-ks3 sshd[17467]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=123.56.232.35
2019-07-08T12:37:09.929676wiz-ks3 sshd[17467]: Invalid user user2 from 123.56.232.35 port 59828
2019-07-08T12:37:11.992953wiz-ks3 sshd[17467]: Failed password for invalid user user2 from 123.56.232.35 port 59828 ssh2
2019-07-08T12:37:23.537989wiz-ks3 sshd[17471]: pam_unix(sshd:auth): authentication failure; logname=
2019-08-06 11:55:20
124.226.109.243 attackbotsspam
account brute force by foreign IP
2019-08-06 11:11:12
137.117.103.192 attackspambots
2019-07-31T20:31:50.739545wiz-ks3 sshd[20155]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=137.117.103.192  user=root
2019-07-31T20:31:53.361678wiz-ks3 sshd[20155]: Failed password for root from 137.117.103.192 port 34286 ssh2
2019-07-31T20:32:01.622484wiz-ks3 sshd[20157]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=137.117.103.192  user=root
2019-07-31T20:32:04.088920wiz-ks3 sshd[20157]: Failed password for root from 137.117.103.192 port 51068 ssh2
2019-07-31T20:32:12.592425wiz-ks3 sshd[20159]: Invalid user csserver from 137.117.103.192 port 39626
2019-07-31T20:32:12.594427wiz-ks3 sshd[20159]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=137.117.103.192
2019-07-31T20:32:12.592425wiz-ks3 sshd[20159]: Invalid user csserver from 137.117.103.192 port 39626
2019-07-31T20:32:14.569300wiz-ks3 sshd[20159]: Failed password for invalid user csserver from 137.117.103.192 port 39626 ssh2
201
2019-08-06 11:54:17
217.182.252.63 attackbots
Aug  6 06:19:16 MK-Soft-Root1 sshd\[32246\]: Invalid user xbox from 217.182.252.63 port 33260
Aug  6 06:19:16 MK-Soft-Root1 sshd\[32246\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=217.182.252.63
Aug  6 06:19:18 MK-Soft-Root1 sshd\[32246\]: Failed password for invalid user xbox from 217.182.252.63 port 33260 ssh2
...
2019-08-06 12:21:40
42.51.195.205 attackbots
account brute force by foreign IP
2019-08-06 11:18:44
91.134.140.32 attackspam
Aug  6 06:06:25 yabzik sshd[6333]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=91.134.140.32
Aug  6 06:06:27 yabzik sshd[6333]: Failed password for invalid user admin from 91.134.140.32 port 46046 ssh2
Aug  6 06:11:49 yabzik sshd[8149]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=91.134.140.32
2019-08-06 11:13:47
124.113.217.197 attackspambots
account brute force by foreign IP
2019-08-06 11:10:04
140.246.207.140 attackbotsspam
2019-08-05T20:22:56.193926wiz-ks3 sshd[20022]: Invalid user starcraft from 140.246.207.140 port 39908
2019-08-05T20:22:56.196036wiz-ks3 sshd[20022]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=140.246.207.140
2019-08-05T20:22:56.193926wiz-ks3 sshd[20022]: Invalid user starcraft from 140.246.207.140 port 39908
2019-08-05T20:22:57.921739wiz-ks3 sshd[20022]: Failed password for invalid user starcraft from 140.246.207.140 port 39908 ssh2
2019-08-05T20:37:23.298500wiz-ks3 sshd[20038]: Invalid user pos from 140.246.207.140 port 55198
2019-08-05T20:37:23.300504wiz-ks3 sshd[20038]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=140.246.207.140
2019-08-05T20:37:23.298500wiz-ks3 sshd[20038]: Invalid user pos from 140.246.207.140 port 55198
2019-08-05T20:37:25.046705wiz-ks3 sshd[20038]: Failed password for invalid user pos from 140.246.207.140 port 55198 ssh2
2019-08-05T20:40:42.405559wiz-ks3 sshd[20049]: Invalid user guest from 140.246
2019-08-06 11:39:43
182.87.113.133 attack
account brute force by foreign IP
2019-08-06 11:26:39
198.71.246.93 attackbots
MagicSpam Rule: block_rbl_lists (dnsrbl.org); Spammer IP: 198.71.246.93
2019-08-06 11:42:49
153.36.232.49 attack
2019-07-14T22:04:23.537891wiz-ks3 sshd[12894]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=153.36.232.49  user=root
2019-07-14T22:04:25.165092wiz-ks3 sshd[12894]: Failed password for root from 153.36.232.49 port 14934 ssh2
2019-07-14T22:04:27.750850wiz-ks3 sshd[12894]: Failed password for root from 153.36.232.49 port 14934 ssh2
2019-07-14T22:04:23.537891wiz-ks3 sshd[12894]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=153.36.232.49  user=root
2019-07-14T22:04:25.165092wiz-ks3 sshd[12894]: Failed password for root from 153.36.232.49 port 14934 ssh2
2019-07-14T22:04:27.750850wiz-ks3 sshd[12894]: Failed password for root from 153.36.232.49 port 14934 ssh2
2019-07-14T22:04:23.537891wiz-ks3 sshd[12894]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=153.36.232.49  user=root
2019-07-14T22:04:25.165092wiz-ks3 sshd[12894]: Failed password for root from 153.36.232.49 port 14934 ssh2
2019-07-1
2019-08-06 11:25:16
82.211.8.74 attack
MagicSpam Rule: block_rbl_lists (spam.spamrats.com); Spammer IP: 82.211.8.74
2019-08-06 11:45:55
181.171.193.51 attack
MagicSpam Rule: block_rbl_lists (dyna.spamrats.com); Spammer IP: 181.171.193.51
2019-08-06 11:44:08

Recently Reported IPs

114.239.148.105 114.239.148.205 114.239.148.49 114.239.149.66
114.239.151.110 114.239.151.221 114.239.91.42 114.246.34.206
114.27.35.199 114.30.203.153 114.32.145.54 114.32.230.138
114.33.156.30 114.33.83.233 114.34.141.97 119.73.155.57
114.34.19.28 114.35.242.181 114.35.66.179 114.35.74.152