Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Republic of China (ROC)

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 114.42.56.87
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 33953
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;114.42.56.87.			IN	A

;; AUTHORITY SECTION:
.			382	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022040201 1800 900 604800 86400

;; Query time: 24 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Apr 03 10:11:24 CST 2022
;; MSG SIZE  rcvd: 105
Host info
87.56.42.114.in-addr.arpa domain name pointer 114-42-56-87.dynamic-ip.hinet.net.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
87.56.42.114.in-addr.arpa	name = 114-42-56-87.dynamic-ip.hinet.net.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
139.59.211.245 attack
$f2bV_matches
2020-01-12 00:04:05
139.199.219.235 attackspam
$f2bV_matches
2020-01-12 00:16:12
139.59.180.53 attackbotsspam
Jan 11 06:25:36 server sshd\[23864\]: Failed password for invalid user avis from 139.59.180.53 port 53014 ssh2
Jan 11 19:01:04 server sshd\[19561\]: Invalid user postgres from 139.59.180.53
Jan 11 19:01:04 server sshd\[19561\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.180.53 
Jan 11 19:01:05 server sshd\[19561\]: Failed password for invalid user postgres from 139.59.180.53 port 59310 ssh2
Jan 11 19:03:15 server sshd\[19846\]: Invalid user avis from 139.59.180.53
...
2020-01-12 00:04:38
139.59.89.7 attackbotsspam
$f2bV_matches
2020-01-11 23:50:42
221.223.192.165 attackbotsspam
Fail2Ban - FTP Abuse Attempt
2020-01-12 00:26:00
207.154.206.75 attack
Wordpress XMLRPC attack
2020-01-11 23:55:22
139.59.248.5 attackspam
ssh failed login
2020-01-12 00:01:51
165.227.94.184 attackbots
2020-01-11T14:09:47.194851 X postfix/smtpd[28444]: NOQUEUE: reject: RCPT from unknown[165.227.94.184]: 554 5.7.1 Service unavailable; Client host [165.227.94.184] blocked using zen.spamhaus.org; from= to= proto=ESMTP helo=
2020-01-12 00:16:46
106.13.210.71 attackbots
Jan 11 12:15:12 firewall sshd[27590]: Invalid user qwerty from 106.13.210.71
Jan 11 12:15:14 firewall sshd[27590]: Failed password for invalid user qwerty from 106.13.210.71 port 52934 ssh2
Jan 11 12:18:16 firewall sshd[27667]: Invalid user wrussell from 106.13.210.71
...
2020-01-12 00:28:17
139.199.0.84 attack
$f2bV_matches
2020-01-12 00:22:33
130.61.57.37 attackspambots
Unauthorized connection attempt detected from IP address 130.61.57.37 to port 2220 [J]
2020-01-11 23:56:32
139.59.26.106 attack
$f2bV_matches
2020-01-12 00:02:22
86.238.30.51 attack
$f2bV_matches
2020-01-11 23:54:11
151.80.41.64 attack
SSH Brute-Force attacks
2020-01-12 00:24:07
49.88.112.69 attackbots
Jan 11 15:38:04 hcbbdb sshd\[31406\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.88.112.69  user=root
Jan 11 15:38:06 hcbbdb sshd\[31406\]: Failed password for root from 49.88.112.69 port 46359 ssh2
Jan 11 15:39:27 hcbbdb sshd\[31531\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.88.112.69  user=root
Jan 11 15:39:28 hcbbdb sshd\[31531\]: Failed password for root from 49.88.112.69 port 25517 ssh2
Jan 11 15:40:47 hcbbdb sshd\[31660\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.88.112.69  user=root
2020-01-12 00:09:43

Recently Reported IPs

114.42.218.221 114.43.114.204 114.43.118.246 114.43.14.242
114.43.150.56 114.43.203.11 114.43.48.195 114.44.115.129
114.44.217.152 114.44.30.235 114.44.39.234 114.44.55.204
114.44.69.115 114.44.71.151 114.44.74.63 114.44.77.129
114.45.174.128 114.45.190.174 114.45.190.213 114.45.208.125