Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Seongnam-si

Region: Gyeonggi-do

Country: Korea Republic of

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 14.81.139.4
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 33936
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;14.81.139.4.			IN	A

;; AUTHORITY SECTION:
.			321	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2020010101 1800 900 604800 86400

;; Query time: 51 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Jan 02 00:12:40 CST 2020
;; MSG SIZE  rcvd: 115
Host info
Host 4.139.81.14.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 4.139.81.14.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
157.230.239.99 attackspam
Invalid user http from 157.230.239.99 port 42176
2019-11-21 08:01:04
87.184.21.214 attackspam
Automatic report - Port Scan Attack
2019-11-21 08:13:27
62.138.6.197 attack
CloudCIX Reconnaissance Scan Detected, PTR: astra4643.startdedicated.com.
2019-11-21 08:26:26
185.175.93.101 attack
185.175.93.101 was recorded 104 times by 33 hosts attempting to connect to the following ports: 5930,5922,5929,5927,5932,5923,5928,5937,5931,5926,5936,5935,5921,5924,5933,5934,5925. Incident counter (4h, 24h, all-time): 104, 505, 5367
2019-11-21 08:35:08
190.14.240.74 attackbotsspam
Nov 21 01:46:37 server sshd\[710\]: Invalid user perona from 190.14.240.74
Nov 21 01:46:37 server sshd\[710\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=1901424074.ip25.static.mediacommerce.com.co 
Nov 21 01:46:39 server sshd\[710\]: Failed password for invalid user perona from 190.14.240.74 port 39918 ssh2
Nov 21 01:57:09 server sshd\[3341\]: Invalid user test from 190.14.240.74
Nov 21 01:57:09 server sshd\[3341\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=1901424074.ip25.static.mediacommerce.com.co 
...
2019-11-21 08:06:19
51.68.181.207 attackbots
CloudCIX Reconnaissance Scan Detected, PTR: ns3135137.ip-51-68-181.eu.
2019-11-21 08:02:36
193.29.13.20 attackspam
firewall-block, port(s): 3392/tcp, 3393/tcp
2019-11-21 08:22:08
218.92.97.182 attackspambots
'IP reached maximum auth failures for a one day block'
2019-11-21 08:01:22
139.178.69.117 attackbotsspam
CloudCIX Reconnaissance Scan Detected, PTR: PTR record not found
2019-11-21 08:06:50
178.62.79.227 attack
Nov 20 23:34:03 DAAP sshd[29660]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.62.79.227  user=root
Nov 20 23:34:04 DAAP sshd[29660]: Failed password for root from 178.62.79.227 port 35952 ssh2
Nov 20 23:36:49 DAAP sshd[29761]: Invalid user benzina from 178.62.79.227 port 41214
Nov 20 23:36:49 DAAP sshd[29761]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.62.79.227
Nov 20 23:36:49 DAAP sshd[29761]: Invalid user benzina from 178.62.79.227 port 41214
Nov 20 23:36:51 DAAP sshd[29761]: Failed password for invalid user benzina from 178.62.79.227 port 41214 ssh2
...
2019-11-21 08:05:41
188.225.83.121 attack
Multiport scan : 28 ports scanned 123 555 1003 1212 1250 2017 2214 2227 2323 3003 3316 3338 3351 4123 4242 4412 4991 5151 5588 5960 9033 11114 19000 33801 33861 33870 39000 45389
2019-11-21 08:24:22
185.156.73.42 attackspam
Portscan or hack attempt detected by psad/fwsnort
2019-11-21 08:37:11
54.38.222.82 attack
CloudCIX Reconnaissance Scan Detected, PTR: ns3106946.ip-54-38-222.eu.
2019-11-21 08:30:25
178.128.154.236 attackspambots
Automatic report - XMLRPC Attack
2019-11-21 08:29:45
149.202.65.41 attack
CloudCIX Reconnaissance Scan Detected, PTR: ns3013945.ip-149-202-65.eu.
2019-11-21 08:33:47

Recently Reported IPs

201.103.125.127 131.16.158.255 52.189.115.11 165.179.49.175
154.103.131.0 60.183.39.246 179.79.157.34 71.123.55.227
37.70.217.215 177.18.54.237 113.95.188.179 41.142.245.48
222.186.175.23 33.241.169.229 130.174.80.255 175.51.161.61
168.98.220.83 202.0.241.56 78.84.37.4 4.7.210.197