Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: China

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 139.214.105.101
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 61725
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;139.214.105.101.		IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025013100 1800 900 604800 86400

;; Query time: 14 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Jan 31 23:36:01 CST 2025
;; MSG SIZE  rcvd: 108
Host info
101.105.214.139.in-addr.arpa domain name pointer 101.105.214.139.adsl-pool.jlccptt.net.cn.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
101.105.214.139.in-addr.arpa	name = 101.105.214.139.adsl-pool.jlccptt.net.cn.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
103.101.52.48 attackspambots
Nov  6 06:52:31 server sshd\[16851\]: Failed password for invalid user ftpuser from 103.101.52.48 port 55780 ssh2
Nov  6 14:02:08 server sshd\[31712\]: Invalid user teamspeak from 103.101.52.48
Nov  6 14:02:08 server sshd\[31712\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.101.52.48 
Nov  6 14:02:09 server sshd\[31712\]: Failed password for invalid user teamspeak from 103.101.52.48 port 44400 ssh2
Nov  6 14:33:57 server sshd\[7198\]: Invalid user postgres from 103.101.52.48
Nov  6 14:33:57 server sshd\[7198\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.101.52.48 
...
2019-11-06 19:39:26
118.25.125.189 attackspam
Nov  6 08:42:20 xeon sshd[49592]: Failed password for invalid user hts from 118.25.125.189 port 55566 ssh2
2019-11-06 19:33:46
31.14.133.173 attack
CloudCIX Reconnaissance Scan Detected, PTR: host173-133-14-31.serverdedicati.aruba.it.
2019-11-06 20:04:03
5.253.102.236 attackbotsspam
[portscan] Port scan
2019-11-06 19:42:23
184.30.210.217 attack
11/06/2019-12:52:06.105119 184.30.210.217 Protocol: 6 SURICATA TLS invalid record/traffic
2019-11-06 20:06:24
139.59.73.205 attackbotsspam
Nov  5 00:12:11 cw sshd[19234]: Invalid user 1234 from 139.59.73.205
Nov  5 00:12:11 cw sshd[19235]: Received disconnect from 139.59.73.205: 11: Bye Bye
Nov  5 00:12:13 cw sshd[19236]: Invalid user admin from 139.59.73.205
Nov  5 00:12:13 cw sshd[19237]: Received disconnect from 139.59.73.205: 11: Bye Bye
Nov  5 00:12:15 cw sshd[19238]: Invalid user ubnt from 139.59.73.205
Nov  5 00:12:15 cw sshd[19241]: Received disconnect from 139.59.73.205: 11: Bye Bye
Nov  5 00:12:17 cw sshd[19242]: User r.r from 139.59.73.205 not allowed because listed in DenyUsers
Nov  5 00:12:17 cw sshd[19243]: Received disconnect from 139.59.73.205: 11: Bye Bye
Nov  5 00:12:18 cw sshd[19244]: Invalid user default from 139.59.73.205
Nov  5 00:12:19 cw sshd[19245]: Received disconnect from 139.59.73.205: 11: Bye Bye
Nov  5 00:12:20 cw sshd[19246]: Invalid user default from 139.59.73.205
Nov  5 00:12:20 cw sshd[19247]: Received disconnect from 139.59.73.205: 11: Bye Bye
Nov  5 00:12:21 cw sshd[1924........
-------------------------------
2019-11-06 19:30:09
115.120.0.0 attackbotsspam
IP Ban Report :  
 https://help-dysk.pl/wordpress-firewall-plugins/ip/115.120.0.0/ 
 
 CN - 1H : (605)  
 Protection Against DDoS WordPress plugin :  
 "odzyskiwanie danych help-dysk" 
 IP Address Ranges by Country : CN 
 NAME ASN : ASN4847 
 
 IP : 115.120.0.0 
 
 CIDR : 115.120.0.0/17 
 
 PREFIX COUNT : 1024 
 
 UNIQUE IP COUNT : 6630912 
 
 
 ATTACKS DETECTED ASN4847 :  
  1H - 1 
  3H - 1 
  6H - 2 
 12H - 3 
 24H - 4 
 
 DateTime : 2019-11-06 07:24:01 
 
 INFO : Port MAX SCAN Scan Detected and Blocked by ADMIN  - data recovery
2019-11-06 19:32:03
41.225.16.234 attackbotsspam
2019-11-06T07:24:08.205974 X postfix/smtpd[19205]: NOQUEUE: reject: RCPT from unknown[41.225.16.234]: 554 5.7.1 Service unavailable; Client host [41.225.16.234] blocked using zen.spamhaus.org; https://www.spamhaus.org/query/ip/41.225.16.234; from= to= proto=ESMTP helo=
2019-11-06 19:28:54
117.50.25.196 attack
Nov  6 02:30:06 TORMINT sshd\[7482\]: Invalid user 123456 from 117.50.25.196
Nov  6 02:30:06 TORMINT sshd\[7482\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=117.50.25.196
Nov  6 02:30:08 TORMINT sshd\[7482\]: Failed password for invalid user 123456 from 117.50.25.196 port 50572 ssh2
...
2019-11-06 20:10:42
222.186.175.155 attackspambots
Nov  6 12:43:54 legacy sshd[28318]: Failed password for root from 222.186.175.155 port 28694 ssh2
Nov  6 12:44:12 legacy sshd[28318]: error: maximum authentication attempts exceeded for root from 222.186.175.155 port 28694 ssh2 [preauth]
Nov  6 12:44:22 legacy sshd[28328]: Failed password for root from 222.186.175.155 port 34234 ssh2
...
2019-11-06 19:46:12
45.227.253.140 attackbotsspam
v+mailserver-auth-bruteforce
2019-11-06 19:28:22
51.75.124.215 attackspam
Nov  4 06:47:35 db01 sshd[17734]: Failed password for r.r from 51.75.124.215 port 45768 ssh2
Nov  4 06:47:35 db01 sshd[17734]: Received disconnect from 51.75.124.215: 11: Bye Bye [preauth]
Nov  4 07:01:14 db01 sshd[18867]: Failed password for r.r from 51.75.124.215 port 46224 ssh2
Nov  4 07:01:14 db01 sshd[18867]: Received disconnect from 51.75.124.215: 11: Bye Bye [preauth]
Nov  4 07:04:39 db01 sshd[19069]: Failed password for r.r from 51.75.124.215 port 55148 ssh2
Nov  4 07:04:39 db01 sshd[19069]: Received disconnect from 51.75.124.215: 11: Bye Bye [preauth]
Nov  4 07:07:51 db01 sshd[19370]: Failed password for r.r from 51.75.124.215 port 35844 ssh2
Nov  4 07:07:51 db01 sshd[19370]: Received disconnect from 51.75.124.215: 11: Bye Bye [preauth]
Nov  4 07:11:02 db01 sshd[19663]: Failed password for r.r from 51.75.124.215 port 44768 ssh2
Nov  4 07:11:02 db01 sshd[19663]: Received disconnect from 51.75.124.215: 11: Bye Bye [preauth]
Nov  4 07:14:09 db01 sshd[19928]: Faile........
-------------------------------
2019-11-06 19:34:11
80.211.16.26 attackbots
no
2019-11-06 20:04:47
139.59.29.88 attackbotsspam
Nov  6 12:20:09 cp sshd[21950]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.29.88
2019-11-06 19:50:53
149.56.45.87 attack
2019-11-06T06:54:40.315112abusebot-6.cloudsearch.cf sshd\[25213\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=87.ip-149-56-45.net  user=root
2019-11-06 19:26:31

Recently Reported IPs

16.70.31.161 8.192.44.226 78.230.72.228 224.64.249.25
104.183.19.221 38.12.49.225 90.245.3.124 38.148.173.126
227.213.138.219 242.15.24.208 117.163.22.151 138.12.50.212
92.70.204.195 48.43.190.123 145.220.190.115 93.124.190.118
115.230.240.97 159.207.29.182 73.17.104.131 194.59.185.101