Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 20.114.133.139
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 33739
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;20.114.133.139.			IN	A

;; AUTHORITY SECTION:
.			316	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022021800 1800 900 604800 86400

;; Query time: 66 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 18 23:18:52 CST 2022
;; MSG SIZE  rcvd: 107
Host info
Host 139.133.114.20.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 139.133.114.20.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
111.67.99.214 attackbots
10 attempts against mh-mag-customerspam-ban on hill.magehost.pro
2019-07-27 10:35:17
50.249.31.13 attackbotsspam
DATE:2019-07-26 23:33:01, IP:50.249.31.13, PORT:ssh brute force auth on SSH service (patata)
2019-07-27 10:58:48
51.68.187.192 attackspambots
Triggered by Fail2Ban
2019-07-27 10:27:41
189.112.109.188 attackspambots
Automatic report - Banned IP Access
2019-07-27 11:04:17
81.22.45.148 attackbotsspam
Jul 27 04:48:35 lumpi kernel: INPUT:DROP:SPAMHAUS_EDROP:IN=eth0 OUT= MAC=52:54:a2:01:a5:04:d2:74:7f:6e:37:e3:08:00 SRC=81.22.45.148 DST=172.31.1.100 LEN=40 TOS=0x00 PREC=0x00 TTL=244 ID=57150 PROTO=TCP SPT=46217 DPT=3094 WINDOW=1024 RES=0x00 SYN URGP=0 
...
2019-07-27 10:53:18
217.182.7.137 attack
WordPress brute force
2019-07-27 10:54:24
165.227.77.120 attackbots
Unauthorized SSH login attempts
2019-07-27 11:08:35
206.81.8.14 attack
Jul 27 04:08:04 vps647732 sshd[14702]: Failed password for root from 206.81.8.14 port 55680 ssh2
...
2019-07-27 10:24:02
213.111.26.129 attackspambots
RDP Bruteforce
2019-07-27 10:46:33
172.93.192.35 attackspam
Jul 26 19:41:16   TCP Attack: SRC=172.93.192.35 DST=[Masked] LEN=376 TOS=0x08 PREC=0x20 TTL=47  DF PROTO=TCP SPT=53512 DPT=80 WINDOW=229 RES=0x00 ACK PSH URGP=0
2019-07-27 11:06:48
165.22.143.229 attackbots
failed root login
2019-07-27 10:22:00
128.106.163.98 attackbotsspam
scan z
2019-07-27 10:49:35
162.243.134.70 attack
47174/tcp 26/tcp 512/tcp...
[2019-05-26/07-26]74pkt,50pt.(tcp),4pt.(udp)
2019-07-27 10:47:39
172.247.109.65 attack
port scan and connect, tcp 80 (http)
2019-07-27 10:33:36
52.212.187.228 attackbots
26.07.2019 21:41:20 - Wordpress fail 
Detected by ELinOX-ALM
2019-07-27 10:45:44

Recently Reported IPs

20.114.197.2 20.114.193.175 20.114.21.25 20.114.234.198
20.114.218.151 20.114.32.172 20.114.226.229 20.114.56.124
20.115.110.209 20.115.232.1 20.114.87.37 20.114.230.66
20.115.27.60 20.115.44.34 20.115.58.141 20.117.91.125
20.115.72.61 20.117.82.27 20.117.82.214 20.115.72.35