Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: China

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 114.239.44.139
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 12185
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;114.239.44.139.			IN	A

;; AUTHORITY SECTION:
.			381	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022030501 1800 900 604800 86400

;; Query time: 17 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Mar 06 11:03:06 CST 2022
;; MSG SIZE  rcvd: 107
Host info
Host 139.44.239.114.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 139.44.239.114.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
201.249.161.98 attack
20/8/3@09:21:23: FAIL: Alarm-Network address from=201.249.161.98
20/8/3@09:21:23: FAIL: Alarm-Network address from=201.249.161.98
...
2020-08-03 21:58:36
154.227.206.79 attack
SMB Server BruteForce Attack
2020-08-03 22:11:31
183.89.212.248 attackspam
(imapd) Failed IMAP login from 183.89.212.248 (TH/Thailand/mx-ll-183.89.212-248.dynamic.3bb.in.th): 1 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_TRIGGER; Logs: Aug  3 16:56:47 ir1 dovecot[3110802]: imap-login: Disconnected (auth failed, 1 attempts in 13 secs): user=, method=PLAIN, rip=183.89.212.248, lip=5.63.12.44, TLS, session=
2020-08-03 22:04:34
109.195.46.211 attackspam
Lines containing failures of 109.195.46.211
Aug  3 04:58:38 shared01 sshd[28652]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=109.195.46.211  user=r.r
Aug  3 04:58:40 shared01 sshd[28652]: Failed password for r.r from 109.195.46.211 port 38712 ssh2
Aug  3 04:58:40 shared01 sshd[28652]: Received disconnect from 109.195.46.211 port 38712:11: Bye Bye [preauth]
Aug  3 04:58:40 shared01 sshd[28652]: Disconnected from authenticating user r.r 109.195.46.211 port 38712 [preauth]
Aug  3 05:07:19 shared01 sshd[31382]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=109.195.46.211  user=r.r
Aug  3 05:07:20 shared01 sshd[31382]: Failed password for r.r from 109.195.46.211 port 49232 ssh2
Aug  3 05:07:20 shared01 sshd[31382]: Received disconnect from 109.195.46.211 port 49232:11: Bye Bye [preauth]
Aug  3 05:07:20 shared01 sshd[31382]: Disconnected from authenticating user r.r 109.195.46.211 port 49232........
------------------------------
2020-08-03 21:54:25
193.56.28.133 attackbotsspam
Aug  3 13:37:47 mail postfix/smtpd[84765]: warning: unknown[193.56.28.133]: SASL LOGIN authentication failed: generic failure
Aug  3 13:44:09 mail postfix/smtpd[84901]: warning: unknown[193.56.28.133]: SASL LOGIN authentication failed: generic failure
Aug  3 13:46:45 mail postfix/smtpd[84912]: warning: unknown[193.56.28.133]: SASL LOGIN authentication failed: generic failure
...
2020-08-03 21:52:46
2001:b07:6468:f3f6:a4af:356a:c9cc:22a8 attack
Wordpress attack
2020-08-03 22:07:29
61.228.6.210 attackspam
SMB Server BruteForce Attack
2020-08-03 22:00:45
31.28.8.163 attackbotsspam
Aug  3 15:45:02 abendstille sshd\[23573\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=31.28.8.163  user=root
Aug  3 15:45:04 abendstille sshd\[23573\]: Failed password for root from 31.28.8.163 port 55856 ssh2
Aug  3 15:49:29 abendstille sshd\[28035\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=31.28.8.163  user=root
Aug  3 15:49:30 abendstille sshd\[28035\]: Failed password for root from 31.28.8.163 port 38402 ssh2
Aug  3 15:53:56 abendstille sshd\[32217\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=31.28.8.163  user=root
...
2020-08-03 22:04:14
27.199.32.118 attackbots
Bruteforce detected by fail2ban
2020-08-03 21:57:58
52.254.87.8 attackspambots
52.254.87.8 - - [03/Aug/2020:14:28:25 +0100] "POST //wp-login.php HTTP/1.1" 200 3626 "https://wpeagledemoblog.com//wp-login.php" "Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.108 Safari/537.36"
52.254.87.8 - - [03/Aug/2020:14:28:25 +0100] "POST //wp-login.php HTTP/1.1" 200 3626 "https://wpeagledemoblog.com//wp-login.php" "Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.108 Safari/537.36"
52.254.87.8 - - [03/Aug/2020:14:28:26 +0100] "POST //wp-login.php HTTP/1.1" 200 3614 "https://wpeagledemoblog.com//wp-login.php" "Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.108 Safari/537.36"
...
2020-08-03 21:30:45
185.46.17.114 attack
Port Scan
...
2020-08-03 21:33:12
208.113.164.202 attackbots
Aug  3 08:21:49 host sshd\[16414\]: Failed password for root from 208.113.164.202 port 57376 ssh2
Aug  3 08:35:38 host sshd\[19377\]: Failed password for root from 208.113.164.202 port 46670 ssh2
Aug  3 08:40:03 host sshd\[19513\]: Failed password for root from 208.113.164.202 port 59550 ssh2
...
2020-08-03 21:29:51
142.93.173.214 attackbotsspam
Aug  3 14:22:52 marvibiene sshd[8394]: Failed password for root from 142.93.173.214 port 49054 ssh2
2020-08-03 21:48:17
189.90.14.101 attackbotsspam
Aug  3 12:41:29 game-panel sshd[30739]: Failed password for root from 189.90.14.101 port 29345 ssh2
Aug  3 12:46:22 game-panel sshd[30942]: Failed password for root from 189.90.14.101 port 42945 ssh2
2020-08-03 21:45:22
124.156.107.252 attackspambots
Aug  3 13:45:59 django-0 sshd[23616]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=124.156.107.252  user=root
Aug  3 13:46:01 django-0 sshd[23616]: Failed password for root from 124.156.107.252 port 46884 ssh2
...
2020-08-03 21:53:56

Recently Reported IPs

114.239.42.11 114.24.41.93 114.24.41.9 114.24.42.118
114.24.42.126 114.24.42.148 114.24.42.190 114.24.42.2
114.24.72.14 114.24.72.119 114.24.72.176 114.24.72.207
114.24.72.201 114.24.72.183 114.24.71.91 114.24.72.22
114.24.72.233 114.24.72.244 114.24.72.33 114.24.72.37