Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: China

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 114.249.239.155
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 29697
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;114.249.239.155.		IN	A

;; AUTHORITY SECTION:
.			533	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022100700 1800 900 604800 86400

;; Query time: 66 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Oct 07 17:46:35 CST 2022
;; MSG SIZE  rcvd: 108
Host info
Host 155.239.249.114.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 155.239.249.114.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
201.174.28.242 attackbots
Port Scan: UDP/137
2019-08-05 08:36:17
41.41.87.22 attackspam
1564953312 - 08/05/2019 04:15:12 Host: host-41.41.87.22.tedata.net/41.41.87.22 Port: 23 TCP Blocked
...
2019-08-05 08:10:32
92.189.164.96 attackbotsspam
Autoban   92.189.164.96 AUTH/CONNECT
2019-08-05 07:58:56
220.142.125.71 attack
Port Scan: TCP/23
2019-08-05 08:33:12
220.194.237.43 attackspam
Port Scan: TCP/6378
2019-08-05 08:32:50
172.104.112.244 attackbots
Port Scan: TCP/1080
2019-08-05 08:42:47
91.242.20.73 attackspam
Autoban   91.242.20.73 AUTH/CONNECT
2019-08-05 08:08:46
172.3.248.46 attackspambots
Port Scan: UDP/1999
2019-08-05 08:43:14
191.102.56.86 attack
Port Scan: TCP/23
2019-08-05 08:17:58
5.175.17.52 attack
Port Scan: TCP/445
2019-08-05 08:31:39
111.242.254.114 attackspam
Port Scan: TCP/23
2019-08-05 08:24:29
211.180.197.200 attack
SMB Server BruteForce Attack
2019-08-05 08:34:48
198.199.84.154 attackspam
Failed password for root from 198.199.84.154 port 46472 ssh2
Invalid user marixl from 198.199.84.154 port 46026
pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=198.199.84.154
Failed password for invalid user marixl from 198.199.84.154 port 46026 ssh2
Invalid user greenhg from 198.199.84.154 port 45060
pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=198.199.84.154
2019-08-05 07:53:41
166.62.120.244 attackspambots
Port Scan: TCP/445
2019-08-05 08:44:09
139.59.4.141 attack
Aug  5 02:53:15 server sshd\[20028\]: Invalid user butter from 139.59.4.141 port 51178
Aug  5 02:53:15 server sshd\[20028\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.4.141
Aug  5 02:53:17 server sshd\[20028\]: Failed password for invalid user butter from 139.59.4.141 port 51178 ssh2
Aug  5 02:57:50 server sshd\[6999\]: Invalid user admin from 139.59.4.141 port 44326
Aug  5 02:57:50 server sshd\[6999\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.4.141
2019-08-05 08:04:55

Recently Reported IPs

116.101.184.131 95.116.181.120 103.27.224.46 113.119.49.64
112.166.179.48 94.134.3.165 114.249.220.219 125.167.146.68
167.249.20.9 193.233.228.177 185.137.234.201 91.222.239.82
159.192.211.194 198.143.129.166 45.228.143.4 45.138.100.113
52.85.77.48 108.163.220.5 99.84.248.19 185.156.73.155