Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Zhuhai

Region: Guangdong

Country: China

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 14.21.34.239
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 8511
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;14.21.34.239.			IN	A

;; AUTHORITY SECTION:
.			433	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2021122801 1800 900 604800 86400

;; Query time: 23 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Dec 29 11:16:46 CST 2021
;; MSG SIZE  rcvd: 105
Host info
Host 239.34.21.14.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 239.34.21.14.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
91.121.109.45 attack
Sep 26 00:21:08 vps01 sshd[27326]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=91.121.109.45
Sep 26 00:21:09 vps01 sshd[27326]: Failed password for invalid user admin from 91.121.109.45 port 48967 ssh2
2019-09-26 06:21:54
125.127.116.3 attack
Unauthorised access (Sep 25) SRC=125.127.116.3 LEN=44 TOS=0x10 PREC=0x40 TTL=49 ID=16277 TCP DPT=8080 WINDOW=59937 SYN
2019-09-26 06:45:40
51.158.109.248 attackspambots
[Wed Sep 25 18:57:22 2019 GMT] RussianBeautyOnline  [URIBL_INV,RDNS_NONE], Subject: xxxx: You have (1) private unread messge
2019-09-26 06:24:37
61.246.7.145 attack
Sep 25 18:03:49 xtremcommunity sshd\[469194\]: Invalid user cloud from 61.246.7.145 port 53458
Sep 25 18:03:49 xtremcommunity sshd\[469194\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.246.7.145
Sep 25 18:03:51 xtremcommunity sshd\[469194\]: Failed password for invalid user cloud from 61.246.7.145 port 53458 ssh2
Sep 25 18:09:05 xtremcommunity sshd\[469293\]: Invalid user oracle from 61.246.7.145 port 38324
Sep 25 18:09:05 xtremcommunity sshd\[469293\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.246.7.145
...
2019-09-26 06:23:45
203.130.192.242 attackspambots
Sep 25 17:56:21 ny01 sshd[20117]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=203.130.192.242
Sep 25 17:56:22 ny01 sshd[20117]: Failed password for invalid user git from 203.130.192.242 port 32770 ssh2
Sep 25 18:01:45 ny01 sshd[21068]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=203.130.192.242
2019-09-26 06:42:56
222.186.15.217 attack
2019-09-25T22:26:11.057061abusebot.cloudsearch.cf sshd\[16807\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.15.217  user=root
2019-09-26 06:27:48
37.59.37.69 attackbotsspam
Sep 25 22:45:41 Ubuntu-1404-trusty-64-minimal sshd\[6521\]: Invalid user dev from 37.59.37.69
Sep 25 22:45:41 Ubuntu-1404-trusty-64-minimal sshd\[6521\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=37.59.37.69
Sep 25 22:45:43 Ubuntu-1404-trusty-64-minimal sshd\[6521\]: Failed password for invalid user dev from 37.59.37.69 port 41148 ssh2
Sep 25 22:56:40 Ubuntu-1404-trusty-64-minimal sshd\[14997\]: Invalid user vps from 37.59.37.69
Sep 25 22:56:40 Ubuntu-1404-trusty-64-minimal sshd\[14997\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=37.59.37.69
2019-09-26 06:28:36
121.178.60.41 attack
Invalid user pi from 121.178.60.41 port 45470
2019-09-26 06:17:37
191.7.209.166 attackbotsspam
2019-09-25 15:57:12 H=(166.209.7.191.online.net.br) [191.7.209.166]:42699 I=[192.147.25.65]:25 F= rejected RCPT : RBL: found in thrukfz5b56tq6xao6odgdyjrq.zen.dq.spamhaus.net (127.0.0.11, 127.0.0.3, 127.0.0.4) (https://www.spamhaus.org/sbl/query/SBLCSS)
2019-09-25 15:57:14 H=(166.209.7.191.online.net.br) [191.7.209.166]:42699 I=[192.147.25.65]:25 F= rejected RCPT : RBL: found in thrukfz5b56tq6xao6odgdyjrq.zen.dq.spamhaus.net (127.0.0.11, 127.0.0.4, 127.0.0.3) (https://www.spamhaus.org/query/ip/191.7.209.166)
2019-09-25 15:57:16 H=(166.209.7.191.online.net.br) [191.7.209.166]:42699 I=[192.147.25.65]:25 F= rejected RCPT : RBL: found in thrukfz5b56tq6xao6odgdyjrq.zen.dq.spamhaus.net (127.0.0.4, 127.0.0.3, 127.0.0.11) (https://www.spamhaus.org/query/ip/191.7.209.166)
...
2019-09-26 06:20:42
87.247.234.154 attack
MultiHost/MultiPort Probe, Scan, Hack -
2019-09-26 06:26:07
156.196.75.4 attackspambots
Chat Spam
2019-09-26 06:19:27
189.52.165.134 attackspam
189.52.165.134 has been banned for [spam]
...
2019-09-26 06:23:30
178.203.53.130 attackspam
WordPress wp-login brute force :: 178.203.53.130 0.136 BYPASS [26/Sep/2019:06:56:42  1000] [censored_1] "POST /wp-login.php HTTP/1.1" 200 3972 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
2019-09-26 06:28:07
51.91.212.79 attackbotsspam
" "
2019-09-26 06:17:06
54.36.148.121 attackspam
Automatic report - Banned IP Access
2019-09-26 06:22:16

Recently Reported IPs

143.101.249.77 189.24.218.154 23.92.36.36 143.12.191.20
106.242.118.59 120.46.118.50 197.202.24.83 19.71.38.188
158.147.192.240 86.77.5.173 17.250.237.52 187.229.151.138
12.29.172.96 153.245.3.229 197.209.172.107 71.4.93.154
174.250.56.90 66.126.7.42 115.102.0.172 249.17.221.69