Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 129.119.89.14
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 10763
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;129.119.89.14.			IN	A

;; AUTHORITY SECTION:
.			506	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022040103 1800 900 604800 86400

;; Query time: 66 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Apr 02 03:51:45 CST 2022
;; MSG SIZE  rcvd: 106
Host info
Host 14.89.119.129.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 14.89.119.129.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
66.154.98.39 attackbots
3389/tcp 3389/tcp 3389/tcp
[2019-09-08]3pkt
2019-09-09 02:51:09
115.75.218.3 attack
88/tcp
[2019-09-08]1pkt
2019-09-09 02:55:33
40.76.203.208 attack
Sep  8 18:42:08 MK-Soft-VM6 sshd\[32460\]: Invalid user ts3server1 from 40.76.203.208 port 44392
Sep  8 18:42:08 MK-Soft-VM6 sshd\[32460\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=40.76.203.208
Sep  8 18:42:10 MK-Soft-VM6 sshd\[32460\]: Failed password for invalid user ts3server1 from 40.76.203.208 port 44392 ssh2
...
2019-09-09 03:24:19
129.211.10.228 attackbotsspam
2019-09-08T08:06:17.772497abusebot-3.cloudsearch.cf sshd\[5098\]: Invalid user ts3server from 129.211.10.228 port 25030
2019-09-09 03:30:08
61.180.65.44 attackspambots
Blocked 61.180.65.44 For policy violation
2019-09-09 03:05:03
54.36.148.71 attack
Automatic report - Banned IP Access
2019-09-09 03:28:54
95.215.58.146 attackspam
Sep  8 15:22:20 vps200512 sshd\[25070\]: Invalid user ftptest from 95.215.58.146
Sep  8 15:22:20 vps200512 sshd\[25070\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=95.215.58.146
Sep  8 15:22:22 vps200512 sshd\[25070\]: Failed password for invalid user ftptest from 95.215.58.146 port 42790 ssh2
Sep  8 15:27:09 vps200512 sshd\[25118\]: Invalid user sonar from 95.215.58.146
Sep  8 15:27:09 vps200512 sshd\[25118\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=95.215.58.146
2019-09-09 03:31:20
185.66.213.64 attack
Sep  8 09:29:22 aiointranet sshd\[22712\]: Invalid user admin from 185.66.213.64
Sep  8 09:29:22 aiointranet sshd\[22712\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=185.66.213.64
Sep  8 09:29:24 aiointranet sshd\[22712\]: Failed password for invalid user admin from 185.66.213.64 port 51154 ssh2
Sep  8 09:35:10 aiointranet sshd\[23183\]: Invalid user dbuser from 185.66.213.64
Sep  8 09:35:10 aiointranet sshd\[23183\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=185.66.213.64
2019-09-09 03:41:54
223.229.139.48 attack
Honeypot attack, port: 445, PTR: PTR record not found
2019-09-09 03:17:30
151.32.79.85 attackbots
23/tcp
[2019-09-08]1pkt
2019-09-09 03:06:08
122.157.216.23 attackspam
23/tcp
[2019-09-08]1pkt
2019-09-09 03:32:39
106.52.23.167 attackspam
2019-09-08T18:37:34.891453abusebot-7.cloudsearch.cf sshd\[26963\]: Invalid user www from 106.52.23.167 port 56134
2019-09-09 03:09:49
167.71.110.184 attack
SSH authentication failure
2019-09-09 03:28:20
159.65.67.134 attackspam
Sep  8 18:25:21 MK-Soft-VM6 sshd\[32199\]: Invalid user user1 from 159.65.67.134 port 60438
Sep  8 18:25:21 MK-Soft-VM6 sshd\[32199\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.65.67.134
Sep  8 18:25:23 MK-Soft-VM6 sshd\[32199\]: Failed password for invalid user user1 from 159.65.67.134 port 60438 ssh2
...
2019-09-09 02:56:29
164.132.209.242 attack
Sep  8 16:27:13 ws12vmsma01 sshd[38724]: Invalid user admin from 164.132.209.242
Sep  8 16:27:15 ws12vmsma01 sshd[38724]: Failed password for invalid user admin from 164.132.209.242 port 57512 ssh2
Sep  8 16:35:00 ws12vmsma01 sshd[39862]: Invalid user csgoserver from 164.132.209.242
...
2019-09-09 03:40:08

Recently Reported IPs

221.15.85.93 193.120.133.38 188.158.88.181 179.189.146.147
207.79.104.198 132.190.122.170 48.144.25.243 33.98.111.184
71.192.252.114 126.233.213.230 166.239.118.234 231.151.208.108
174.36.126.232 202.167.42.107 38.146.104.213 240.229.128.170
86.226.185.125 62.140.239.156 105.243.136.231 107.84.97.213