Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Germany

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 139.25.112.14
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 27
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;139.25.112.14.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025011101 1800 900 604800 86400

;; Query time: 18 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Jan 12 11:14:51 CST 2025
;; MSG SIZE  rcvd: 106
Host info
Host 14.112.25.139.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 14.112.25.139.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
185.220.101.32 attackbots
Jul  2 17:17:08 srv206 sshd[23784]: Invalid user admin from 185.220.101.32
Jul  2 17:17:08 srv206 sshd[23784]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=185.220.101.32
Jul  2 17:17:08 srv206 sshd[23784]: Invalid user admin from 185.220.101.32
Jul  2 17:17:10 srv206 sshd[23784]: Failed password for invalid user admin from 185.220.101.32 port 34201 ssh2
...
2019-07-03 05:37:31
159.65.159.1 attackspam
Jul  2 23:41:01 ns3367391 sshd\[29574\]: Invalid user teamspeak from 159.65.159.1 port 51716
Jul  2 23:41:01 ns3367391 sshd\[29574\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.65.159.1
...
2019-07-03 06:15:17
62.234.201.168 attackbots
Mar  6 12:56:15 motanud sshd\[7436\]: Invalid user tw from 62.234.201.168 port 47412
Mar  6 12:56:15 motanud sshd\[7436\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=62.234.201.168
Mar  6 12:56:17 motanud sshd\[7436\]: Failed password for invalid user tw from 62.234.201.168 port 47412 ssh2
2019-07-03 05:40:02
106.12.215.130 attackspam
Jul  2 15:38:35 core01 sshd\[10625\]: Invalid user postgres from 106.12.215.130 port 37310
Jul  2 15:38:35 core01 sshd\[10625\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.215.130
...
2019-07-03 05:44:14
51.15.59.175 attackbotsspam
Brute force attempt
2019-07-03 05:30:02
94.192.139.167 attackbotsspam
Trying to deliver email spam, but blocked by RBL
2019-07-03 06:12:31
158.69.124.239 attackbots
Automatic report - Web App Attack
2019-07-03 06:02:58
185.234.219.60 attackbotsspam
2019-07-03T00:36:24.824003ns1.unifynetsol.net postfix/smtpd\[29784\]: warning: unknown\[185.234.219.60\]: SASL LOGIN authentication failed: authentication failure
2019-07-03T00:48:59.106499ns1.unifynetsol.net postfix/smtpd\[29784\]: warning: unknown\[185.234.219.60\]: SASL LOGIN authentication failed: authentication failure
2019-07-03T01:01:43.619942ns1.unifynetsol.net postfix/smtpd\[29784\]: warning: unknown\[185.234.219.60\]: SASL LOGIN authentication failed: authentication failure
2019-07-03T01:14:15.925380ns1.unifynetsol.net postfix/smtpd\[7183\]: warning: unknown\[185.234.219.60\]: SASL LOGIN authentication failed: authentication failure
2019-07-03T01:26:55.766053ns1.unifynetsol.net postfix/smtpd\[11673\]: warning: unknown\[185.234.219.60\]: SASL LOGIN authentication failed: authentication failure
2019-07-03 06:09:37
58.252.56.35 attack
IMAP brute force
...
2019-07-03 05:32:08
165.22.89.14 attackspambots
Triggered by Fail2Ban at Ares web server
2019-07-03 06:02:38
106.13.4.150 attack
Failed password for invalid user bitrix from 106.13.4.150 port 55871 ssh2
Invalid user jiong from 106.13.4.150 port 13784
pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.4.150
Failed password for invalid user jiong from 106.13.4.150 port 13784 ssh2
Invalid user deploy from 106.13.4.150 port 28194
pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.4.150
2019-07-03 05:30:47
138.197.105.79 attackspambots
2019-07-02T22:01:07.314389abusebot.cloudsearch.cf sshd\[7572\]: Invalid user langton from 138.197.105.79 port 40540
2019-07-03 06:14:29
198.108.67.83 attack
Port scan: Attack repeated for 24 hours
2019-07-03 05:54:01
169.197.108.188 attack
3389BruteforceFW21
2019-07-03 06:08:29
211.38.244.205 attack
Jul  2 23:37:01 ubuntu-2gb-nbg1-dc3-1 sshd[10719]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=211.38.244.205
Jul  2 23:37:03 ubuntu-2gb-nbg1-dc3-1 sshd[10719]: Failed password for invalid user mercredi from 211.38.244.205 port 45082 ssh2
...
2019-07-03 05:51:22

Recently Reported IPs

108.61.223.79 190.28.1.18 218.13.43.60 209.148.45.17
170.126.100.46 189.78.99.37 79.213.38.176 255.95.235.70
138.192.149.231 209.177.239.0 81.138.122.76 29.87.210.227
181.203.57.61 9.173.50.113 231.80.180.105 194.183.16.72
234.253.48.147 126.196.117.1 108.159.26.84 109.222.171.169