Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: None

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 114.239.148.216
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 9642
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;114.239.148.216.		IN	A

;; AUTHORITY SECTION:
.			247	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022030400 1800 900 604800 86400

;; Query time: 63 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Mar 05 00:32:36 CST 2022
;; MSG SIZE  rcvd: 108
Host info
Host 216.148.239.114.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 216.148.239.114.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
191.53.194.58 attackbotsspam
Unauthorized connection attempt from IP address 191.53.194.58 on Port 587(SMTP-MSA)
2019-07-11 10:28:59
103.129.221.62 attackbotsspam
Jul 10 20:31:26 localhost sshd[27631]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.129.221.62
Jul 10 20:31:28 localhost sshd[27631]: Failed password for invalid user ubuntu from 103.129.221.62 port 48568 ssh2
Jul 10 20:34:11 localhost sshd[27636]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.129.221.62
Jul 10 20:34:13 localhost sshd[27636]: Failed password for invalid user tim from 103.129.221.62 port 46496 ssh2
...
2019-07-11 10:00:07
89.175.229.8 attackbots
DLink DSL Remote OS Command Injection Vulnerability
2019-07-11 10:24:22
148.72.201.173 attack
SQL Injection Attempts
2019-07-11 10:37:08
132.255.89.119 attackspambots
Automatic report - SSH Brute-Force Attack
2019-07-11 10:11:35
77.247.181.162 attackspam
Jul 11 03:53:52 MainVPS sshd[21485]: Invalid user admin from 77.247.181.162 port 56162
Jul 11 03:53:52 MainVPS sshd[21485]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=77.247.181.162
Jul 11 03:53:52 MainVPS sshd[21485]: Invalid user admin from 77.247.181.162 port 56162
Jul 11 03:53:54 MainVPS sshd[21485]: Failed password for invalid user admin from 77.247.181.162 port 56162 ssh2
Jul 11 03:53:52 MainVPS sshd[21485]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=77.247.181.162
Jul 11 03:53:52 MainVPS sshd[21485]: Invalid user admin from 77.247.181.162 port 56162
Jul 11 03:53:54 MainVPS sshd[21485]: Failed password for invalid user admin from 77.247.181.162 port 56162 ssh2
Jul 11 03:53:55 MainVPS sshd[21485]: Disconnecting invalid user admin 77.247.181.162 port 56162: Change of username or service not allowed: (admin,ssh-connection) -> (admin1,ssh-connection) [preauth]
...
2019-07-11 10:01:16
8.31.198.201 attackspambots
Jul 11 01:10:49 vserver sshd\[13250\]: Invalid user test from 8.31.198.201Jul 11 01:10:50 vserver sshd\[13250\]: Failed password for invalid user test from 8.31.198.201 port 54130 ssh2Jul 11 01:13:07 vserver sshd\[13267\]: Invalid user oracle from 8.31.198.201Jul 11 01:13:09 vserver sshd\[13267\]: Failed password for invalid user oracle from 8.31.198.201 port 44214 ssh2
...
2019-07-11 10:17:35
5.40.131.80 attackbotsspam
Unauthorized connection attempt from IP address 5.40.131.80 on Port 445(SMB)
2019-07-11 10:21:57
103.207.38.152 attackspam
2019-07-10 13:59:46 H=(fsf.org) [103.207.38.152]:22301 I=[192.147.25.65]:25 F= rejected RCPT : RBL: found in thrukfz5b56tq6xao6odgdyjrq.zen.dq.spamhaus.net (127.0.0.11, 127.0.0.4, 127.0.0.2) (https://www.spamhaus.org/sbl/query/SBL417626)
2019-07-10 14:01:14 H=(fsf.org) [103.207.38.152]:4291 I=[192.147.25.65]:25 F= rejected RCPT : RBL: found in thrukfz5b56tq6xao6odgdyjrq.zen.dq.spamhaus.net (127.0.0.2, 127.0.0.11, 127.0.0.4) (https://www.spamhaus.org/sbl/query/SBL378171)
2019-07-10 14:01:14 H=(fsf.org) [103.207.38.152]:4283 I=[192.147.25.65]:25 F= rejected RCPT : RBL: found in thrukfz5b56tq6xao6odgdyjrq.zen.dq.spamhaus.net (127.0.0.4, 127.0.0.2, 127.0.0.11) (https://www.spamhaus.org/query/ip/103.207.38.152)
2019-07-10 14:01:14 H=(fsf.org) [103.207.38.152]:4253 I=[192.147.25.65]:25 F= rejected RCPT : RBL: found in thrukfz5b56tq6xao6odgdyjrq.zen.dq.spamhaus.net (127
...
2019-07-11 09:59:52
190.200.55.25 attackspambots
Unauthorized connection attempt from IP address 190.200.55.25 on Port 445(SMB)
2019-07-11 10:18:09
186.185.73.250 attack
Unauthorized connection attempt from IP address 186.185.73.250 on Port 445(SMB)
2019-07-11 10:27:52
220.132.7.187 attackbotsspam
Multiple failed RDP login attempts
2019-07-11 10:25:50
36.74.75.31 attackbots
$f2bV_matches
2019-07-11 10:13:10
68.48.172.86 attackbotsspam
Brute force attempt
2019-07-11 10:14:57
185.244.234.45 attackbotsspam
Excessive Port-Scanning
2019-07-11 10:30:01

Recently Reported IPs

114.239.148.212 114.239.148.220 114.239.148.223 114.239.148.224
114.239.148.231 114.239.148.233 114.239.148.235 114.239.148.237
114.239.148.238 114.239.148.24 114.239.148.243 114.239.148.244
114.239.148.248 114.239.148.253 114.239.148.254 114.239.148.27
114.239.148.28 114.239.148.33 114.239.148.35 114.239.148.36