Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Republic of China (ROC)

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 114.39.133.142
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 39336
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;114.39.133.142.			IN	A

;; AUTHORITY SECTION:
.			321	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022020702 1800 900 604800 86400

;; Query time: 67 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Feb 08 11:26:30 CST 2022
;; MSG SIZE  rcvd: 107
Host info
142.133.39.114.in-addr.arpa domain name pointer 114-39-133-142.dynamic-ip.hinet.net.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
142.133.39.114.in-addr.arpa	name = 114-39-133-142.dynamic-ip.hinet.net.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
185.116.254.8 attackspam
IP Ban Report :  
 https://help-dysk.pl/wordpress-firewall-plugins/ip/185.116.254.8/ 
 
 PL - 1H : (44)  
 Protection Against DDoS WordPress plugin :  
 "odzyskiwanie danych help-dysk" 
 IP Address Ranges by Country : PL 
 NAME ASN : ASN47329 
 
 IP : 185.116.254.8 
 
 CIDR : 185.116.252.0/22 
 
 PREFIX COUNT : 11 
 
 UNIQUE IP COUNT : 9728 
 
 
 ATTACKS DETECTED ASN47329 :  
  1H - 2 
  3H - 2 
  6H - 2 
 12H - 2 
 24H - 2 
 
 DateTime : 2020-04-14 22:47:50 
 
 INFO : Looking for resource vulnerabilities 403 Detected and Blocked by ADMIN  - data recovery
2020-04-15 07:28:26
95.8.30.193 attackspambots
Apr 14 23:55:30 vps670341 sshd[24978]: Invalid user pi from 95.8.30.193 port 50559
2020-04-15 07:14:16
37.49.230.103 attackspam
Port Scan: Events[1] countPorts[1]: 22 ..
2020-04-15 06:58:00
97.96.19.244 attackspambots
Automatic report - Port Scan Attack
2020-04-15 07:26:09
92.46.220.190 attackspam
DATE:2020-04-15 01:35:36,IP:92.46.220.190,MATCHES:10,PORT:ssh
2020-04-15 07:38:13
129.204.119.178 attackbotsspam
Apr 14 22:48:13 plex sshd[18911]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.204.119.178  user=root
Apr 14 22:48:14 plex sshd[18911]: Failed password for root from 129.204.119.178 port 42050 ssh2
2020-04-15 07:11:40
94.102.56.181 attack
Port scan: Attack repeated for 24 hours
2020-04-15 07:09:05
45.14.151.246 attackbotsspam
Port Scan: Events[1] countPorts[1]: 80 ..
2020-04-15 07:22:46
27.128.187.131 attackspam
$f2bV_matches
2020-04-15 07:36:51
80.88.90.250 attack
2020-04-14T22:04:40.200758abusebot-3.cloudsearch.cf sshd[4167]: Invalid user bocloud from 80.88.90.250 port 34870
2020-04-14T22:04:40.207505abusebot-3.cloudsearch.cf sshd[4167]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=mail.recovery-ingatlan.hu
2020-04-14T22:04:40.200758abusebot-3.cloudsearch.cf sshd[4167]: Invalid user bocloud from 80.88.90.250 port 34870
2020-04-14T22:04:41.785748abusebot-3.cloudsearch.cf sshd[4167]: Failed password for invalid user bocloud from 80.88.90.250 port 34870 ssh2
2020-04-14T22:09:12.100806abusebot-3.cloudsearch.cf sshd[4537]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=mail.recovery-ingatlan.hu  user=root
2020-04-14T22:09:13.688597abusebot-3.cloudsearch.cf sshd[4537]: Failed password for root from 80.88.90.250 port 36700 ssh2
2020-04-14T22:13:27.742862abusebot-3.cloudsearch.cf sshd[4912]: Invalid user b from 80.88.90.250 port 38525
...
2020-04-15 07:36:21
46.101.199.196 attackspambots
15843/tcp 1626/tcp 16207/tcp...
[2020-04-12/14]9pkt,3pt.(tcp)
2020-04-15 07:21:20
94.191.64.59 attackspam
SSH Invalid Login
2020-04-15 06:58:37
190.128.230.206 attack
Apr 14 22:22:55 sip sshd[15570]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=190.128.230.206
Apr 14 22:22:56 sip sshd[15570]: Failed password for invalid user t3rr0r from 190.128.230.206 port 45527 ssh2
Apr 14 22:48:12 sip sshd[24869]: Failed password for root from 190.128.230.206 port 51267 ssh2
2020-04-15 07:13:31
54.37.85.97 attack
IP Ban Report :  
 https://help-dysk.pl/wordpress-firewall-plugins/ip/54.37.85.97/ 
 
 FR - 1H : (10)  
 Protection Against DDoS WordPress plugin :  
 "odzyskiwanie danych help-dysk" 
 IP Address Ranges by Country : FR 
 NAME ASN : ASN16276 
 
 IP : 54.37.85.97 
 
 CIDR : 54.37.0.0/16 
 
 PREFIX COUNT : 132 
 
 UNIQUE IP COUNT : 3052544 
 
 
 ATTACKS DETECTED ASN16276 :  
  1H - 1 
  3H - 1 
  6H - 1 
 12H - 3 
 24H - 4 
 
 DateTime : 2020-04-14 22:48:00 
 
 INFO : DNS DENIED Scan Detected and Blocked by ADMIN  - data recovery
2020-04-15 07:22:19
142.93.235.47 attack
Apr 14 22:40:26 OPSO sshd\[31960\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.235.47  user=root
Apr 14 22:40:28 OPSO sshd\[31960\]: Failed password for root from 142.93.235.47 port 46680 ssh2
Apr 14 22:44:16 OPSO sshd\[32464\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.235.47  user=root
Apr 14 22:44:18 OPSO sshd\[32464\]: Failed password for root from 142.93.235.47 port 55458 ssh2
Apr 14 22:47:59 OPSO sshd\[878\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.235.47  user=root
2020-04-15 07:24:35

Recently Reported IPs

62.148.157.163 123.169.35.166 106.12.95.129 106.75.126.243
36.76.105.50 186.179.186.191 112.96.199.245 201.191.49.10
59.115.67.248 91.92.211.236 121.206.167.131 45.186.220.114
34.199.80.43 2.179.149.5 210.22.129.182 78.186.185.145
202.97.188.90 45.142.253.219 206.189.148.74 212.193.29.62