Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: None

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 223.114.189.139
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 19651
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;223.114.189.139.		IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025020600 1800 900 604800 86400

;; Query time: 12 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Feb 06 18:50:05 CST 2025
;; MSG SIZE  rcvd: 108
Host info
Host 139.189.114.223.in-addr.arpa not found: 2(SERVFAIL)
Nslookup info:
server can't find 223.114.189.139.in-addr.arpa: SERVFAIL
Related IP info:
Related comments:
IP Type Details Datetime
117.6.247.166 attackbotsspam
unauthorized connection attempt
2020-07-01 15:28:41
49.233.81.2 attack
Jun 30 20:13:47 server sshd[30759]: Failed password for invalid user xd from 49.233.81.2 port 37948 ssh2
Jun 30 20:25:20 server sshd[10514]: Failed password for invalid user lyj from 49.233.81.2 port 57506 ssh2
Jun 30 20:29:34 server sshd[15757]: Failed password for root from 49.233.81.2 port 41346 ssh2
2020-07-01 15:30:39
125.124.117.226 attackbots
Tried sshing with brute force.
2020-07-01 15:37:33
61.56.100.108 attackbots
5555/tcp
[2020-06-30]1pkt
2020-07-01 15:33:28
88.204.210.194 attackbotsspam
 TCP (SYN) 88.204.210.194:32809 -> port 23, len 44
2020-07-01 15:09:05
189.213.93.213 attackspam
Unauthorized connection attempt detected from IP address 189.213.93.213 to port 23
2020-07-01 15:10:42
106.124.136.103 attackspam
Multiple SSH authentication failures from 106.124.136.103
2020-07-01 15:55:55
117.217.124.207 attackbotsspam
port scan and connect, tcp 8080 (http-proxy)
2020-07-01 15:13:51
200.192.246.187 attackbots
Unauthorized connection attempt detected from IP address 200.192.246.187 to port 23
2020-07-01 15:19:02
104.41.41.24 attackbotsspam
Jun 30 15:38:28 nextcloud sshd\[12330\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.41.41.24  user=root
Jun 30 15:38:31 nextcloud sshd\[12330\]: Failed password for root from 104.41.41.24 port 1472 ssh2
Jun 30 16:00:41 nextcloud sshd\[8577\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.41.41.24  user=root
2020-07-01 15:45:13
177.126.139.249 attack
Unauthorized connection attempt detected from IP address 177.126.139.249 to port 23
2020-07-01 15:55:08
140.143.208.213 attackspambots
Jun 30 04:28:25 rancher-0 sshd[41831]: Invalid user alpine from 140.143.208.213 port 46384
...
2020-07-01 15:11:09
201.149.3.102 attackbotsspam
Jul  1 01:41:57 itv-usvr-02 sshd[24165]: Invalid user qui from 201.149.3.102 port 57472
Jul  1 01:41:57 itv-usvr-02 sshd[24165]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=201.149.3.102
Jul  1 01:41:57 itv-usvr-02 sshd[24165]: Invalid user qui from 201.149.3.102 port 57472
Jul  1 01:41:59 itv-usvr-02 sshd[24165]: Failed password for invalid user qui from 201.149.3.102 port 57472 ssh2
Jul  1 01:47:38 itv-usvr-02 sshd[24344]: Invalid user jin from 201.149.3.102 port 47058
2020-07-01 15:53:52
139.180.224.122 attack
Automatic report - Banned IP Access
2020-07-01 15:45:01
124.118.186.230 attack
 TCP (SYN) 124.118.186.230:64311 -> port 21, len 48
2020-07-01 15:38:04

Recently Reported IPs

47.144.244.190 163.40.210.204 231.244.188.4 193.182.115.27
250.113.66.34 126.97.169.51 136.6.51.198 70.85.185.199
130.63.225.200 222.252.244.85 232.136.122.43 133.180.118.55
243.32.85.223 119.107.233.191 57.83.8.187 34.54.135.84
231.131.61.112 91.172.117.6 152.19.215.205 91.208.181.161