Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Taiwan (Province of China)

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
IP Type Details Datetime
114.39.236.57 attackbots
1592655428 - 06/20/2020 14:17:08 Host: 114.39.236.57/114.39.236.57 Port: 445 TCP Blocked
2020-06-20 23:37:34
114.39.242.213 attack
" "
2020-05-28 00:55:24
114.39.21.159 attack
Telnet/23 MH Probe, Scan, BF, Hack -
2020-05-27 16:11:53
114.39.23.139 attackbotsspam
Telnet/23 MH Probe, Scan, BF, Hack -
2020-05-26 21:48:04
114.39.242.123 attackbotsspam
Telnet/23 MH Probe, Scan, BF, Hack -
2020-05-26 19:44:14
114.39.20.71 attackbots
SmallBizIT.US 1 packets to tcp(23)
2020-05-21 02:20:26
114.39.2.108 attackspambots
Unauthorized connection attempt from IP address 114.39.2.108 on Port 445(SMB)
2020-05-14 19:52:33
114.39.241.29 attack
Brute force blocker - service: proftpd1 - aantal: 59 - Tue Jan 22 12:40:06 2019
2020-02-07 04:15:01
114.39.241.107 attackbots
Unauthorized connection attempt detected from IP address 114.39.241.107 to port 1433
2019-12-23 13:01:07
114.39.234.5 attackbotsspam
Fail2Ban Ban Triggered
2019-11-21 21:20:44
114.39.226.187 attack
IP Ban Report :  
 https://help-dysk.pl/wordpress-firewall-plugins/ip/114.39.226.187/ 
 
 TW - 1H : (113)  
 Protection Against DDoS WordPress plugin :  
 "odzyskiwanie danych help-dysk" 
 IP Address Ranges by Country : TW 
 NAME ASN : ASN3462 
 
 IP : 114.39.226.187 
 
 CIDR : 114.39.0.0/16 
 
 PREFIX COUNT : 390 
 
 UNIQUE IP COUNT : 12267520 
 
 
 ATTACKS DETECTED ASN3462 :  
  1H - 8 
  3H - 15 
  6H - 27 
 12H - 79 
 24H - 104 
 
 DateTime : 2019-11-05 07:25:49 
 
 INFO : Port Scan TELNET Detected and Blocked by ADMIN  - data recovery
2019-11-05 18:01:58
114.39.243.52 attack
Telnet Server BruteForce Attack
2019-10-30 03:54:44
114.39.29.66 attackbotsspam
:
2019-08-07 17:23:16
114.39.22.155 attackbotsspam
37215/tcp
[2019-07-10]1pkt
2019-07-11 02:47:44
114.39.243.109 attackspam
37215/tcp
[2019-06-28]1pkt
2019-06-29 03:41:50
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 114.39.2.120
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 36340
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;114.39.2.120.			IN	A

;; AUTHORITY SECTION:
.			29	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025020401 1800 900 604800 86400

;; Query time: 43 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Feb 05 03:46:34 CST 2025
;; MSG SIZE  rcvd: 105
Host info
120.2.39.114.in-addr.arpa domain name pointer 114-39-2-120.dynamic-ip.hinet.net.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
120.2.39.114.in-addr.arpa	name = 114-39-2-120.dynamic-ip.hinet.net.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
157.230.113.218 attack
Sep 22 18:12:39 aiointranet sshd\[29641\]: Invalid user vukovic from 157.230.113.218
Sep 22 18:12:39 aiointranet sshd\[29641\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.230.113.218
Sep 22 18:12:41 aiointranet sshd\[29641\]: Failed password for invalid user vukovic from 157.230.113.218 port 53460 ssh2
Sep 22 18:16:10 aiointranet sshd\[29958\]: Invalid user wwwrun from 157.230.113.218
Sep 22 18:16:10 aiointranet sshd\[29958\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.230.113.218
2019-09-23 12:20:03
106.12.126.42 attackbots
Sep 23 05:54:06 markkoudstaal sshd[15690]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.126.42
Sep 23 05:54:08 markkoudstaal sshd[15690]: Failed password for invalid user arkserver from 106.12.126.42 port 60240 ssh2
Sep 23 05:58:57 markkoudstaal sshd[16176]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.126.42
2019-09-23 12:03:45
80.211.116.102 attackbotsspam
Sep 23 06:54:04 site3 sshd\[244795\]: Invalid user tester from 80.211.116.102
Sep 23 06:54:04 site3 sshd\[244795\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=80.211.116.102
Sep 23 06:54:07 site3 sshd\[244795\]: Failed password for invalid user tester from 80.211.116.102 port 52714 ssh2
Sep 23 06:58:25 site3 sshd\[244902\]: Invalid user telly from 80.211.116.102
Sep 23 06:58:25 site3 sshd\[244902\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=80.211.116.102
...
2019-09-23 12:23:16
222.186.31.136 attackbots
2019-09-23T04:06:24.070617abusebot-3.cloudsearch.cf sshd\[10012\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.31.136  user=root
2019-09-23 12:06:47
193.32.163.182 attackspambots
Invalid user admin from 193.32.163.182 port 55540
2019-09-23 09:22:04
103.230.155.2 attack
Sep 23 03:17:47 ArkNodeAT sshd\[22815\]: Invalid user demouser from 103.230.155.2
Sep 23 03:17:47 ArkNodeAT sshd\[22815\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.230.155.2
Sep 23 03:17:48 ArkNodeAT sshd\[22815\]: Failed password for invalid user demouser from 103.230.155.2 port 41198 ssh2
2019-09-23 09:30:54
86.63.79.197 attackspambots
ssh failed login
2019-09-23 12:07:15
46.101.170.142 attack
Sep 22 17:54:44 auw2 sshd\[14344\]: Invalid user oracle from 46.101.170.142
Sep 22 17:54:44 auw2 sshd\[14344\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=thibaut.sh
Sep 22 17:54:46 auw2 sshd\[14344\]: Failed password for invalid user oracle from 46.101.170.142 port 50770 ssh2
Sep 22 17:58:54 auw2 sshd\[14775\]: Invalid user tecmin from 46.101.170.142
Sep 22 17:58:54 auw2 sshd\[14775\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=thibaut.sh
2019-09-23 12:05:52
185.53.88.69 attackspam
MultiHost/MultiPort Probe, Scan, Hack -
2019-09-23 09:19:02
114.37.80.164 attackspam
Attempt to attack host OS, exploiting network vulnerabilities, on 22-09-2019 22:00:36.
2019-09-23 09:30:14
14.160.24.106 attack
Attempt to attack host OS, exploiting network vulnerabilities, on 22-09-2019 22:00:42.
2019-09-23 09:20:53
185.234.216.95 attackspambots
2019-09-23T04:46:36.936876beta postfix/smtpd[1042]: warning: unknown[185.234.216.95]: SASL LOGIN authentication failed: authentication failure
2019-09-23T04:52:37.311498beta postfix/smtpd[1119]: warning: unknown[185.234.216.95]: SASL LOGIN authentication failed: authentication failure
2019-09-23T04:58:37.390203beta postfix/smtpd[1226]: warning: unknown[185.234.216.95]: SASL LOGIN authentication failed: authentication failure
...
2019-09-23 12:17:46
58.213.101.191 attackspambots
Sep 23 07:03:26 hosting sshd[13825]: Invalid user hn from 58.213.101.191 port 39506
...
2019-09-23 12:12:24
92.44.163.171 attackbotsspam
IP Ban Report : https://help-dysk.pl/wordpress-firewall-plugins/ip/92.44.163.171/ 
 TR - 1H : (73)  
 Protection Against DDoS WordPress plugin :  
 "odzyskiwanie danych help-dysk" 
 IP Address Ranges by Country : TR 
 NAME ASN : ASN34984 
 
 IP : 92.44.163.171 
 
 CIDR : 92.44.163.0/24 
 
 PREFIX COUNT : 2324 
 
 UNIQUE IP COUNT : 1397504 
 
 
 WYKRYTE ATAKI Z ASN34984 :  
  1H - 2 
  3H - 3 
  6H - 3 
 12H - 4 
 24H - 6 
 
 INFO : SYN Flood DDoS Attack Denial-of-Service Attack (DoS) Detected and Blocked by ADMIN  - data recovery
2019-09-23 12:00:02
185.176.27.54 attackspam
09/23/2019-02:56:33.975424 185.176.27.54 Protocol: 6 ET DROP Dshield Block Listed Source group 1
2019-09-23 09:18:32

Recently Reported IPs

32.68.231.228 121.60.74.243 151.198.118.71 21.180.134.98
150.70.124.107 201.10.80.17 225.18.217.16 155.5.91.108
162.61.253.100 38.29.63.209 63.126.181.234 140.168.146.201
233.129.219.43 224.230.193.31 54.172.23.159 227.13.156.149
255.31.243.130 205.77.96.177 53.249.196.220 243.172.108.124