Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United Kingdom of Great Britain and Northern Ireland (the)

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
IP Type Details Datetime
81.139.205.170 attack
Unauthorized connection attempt detected from IP address 81.139.205.170 to port 445
2020-07-25 21:04:28
81.139.203.60 attack
Automatic report - Port Scan Attack
2019-11-09 13:53:59
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 81.139.2.14
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 52313
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;81.139.2.14.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025022800 1800 900 604800 86400

;; Query time: 48 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 28 17:23:44 CST 2025
;; MSG SIZE  rcvd: 104
Host info
14.2.139.81.in-addr.arpa domain name pointer host81-139-2-14.in-addr.btopenworld.com.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
14.2.139.81.in-addr.arpa	name = host81-139-2-14.in-addr.btopenworld.com.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
178.62.141.137 attackbotsspam
Invalid user anonymous from 178.62.141.137 port 40208
2020-05-01 16:55:34
138.197.129.38 attack
May  1 08:44:31 game-panel sshd[19274]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.197.129.38
May  1 08:44:34 game-panel sshd[19274]: Failed password for invalid user chun from 138.197.129.38 port 51600 ssh2
May  1 08:48:43 game-panel sshd[19435]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.197.129.38
2020-05-01 17:02:12
157.230.109.166 attackspambots
Invalid user sharon from 157.230.109.166 port 42242
2020-05-01 16:58:57
51.178.2.79 attackspambots
May  1 11:18:56 eventyay sshd[28765]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.178.2.79
May  1 11:18:58 eventyay sshd[28765]: Failed password for invalid user robert from 51.178.2.79 port 60356 ssh2
May  1 11:25:58 eventyay sshd[29036]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.178.2.79
...
2020-05-01 17:26:02
88.156.122.72 attackbots
2020-05-01T07:43:47.481963abusebot-7.cloudsearch.cf sshd[999]: Invalid user wkidup from 88.156.122.72 port 41426
2020-05-01T07:43:47.493704abusebot-7.cloudsearch.cf sshd[999]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=088156122072.tarnowskiegory.vectranet.pl
2020-05-01T07:43:47.481963abusebot-7.cloudsearch.cf sshd[999]: Invalid user wkidup from 88.156.122.72 port 41426
2020-05-01T07:43:49.676023abusebot-7.cloudsearch.cf sshd[999]: Failed password for invalid user wkidup from 88.156.122.72 port 41426 ssh2
2020-05-01T07:50:17.379161abusebot-7.cloudsearch.cf sshd[1328]: Invalid user corona from 88.156.122.72 port 36028
2020-05-01T07:50:17.387586abusebot-7.cloudsearch.cf sshd[1328]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=088156122072.tarnowskiegory.vectranet.pl
2020-05-01T07:50:17.379161abusebot-7.cloudsearch.cf sshd[1328]: Invalid user corona from 88.156.122.72 port 36028
2020-05-01T07:50:19.106
...
2020-05-01 17:18:06
182.61.53.74 attackbotsspam
$f2bV_matches
2020-05-01 16:51:05
175.24.81.169 attackspam
Invalid user tencent from 175.24.81.169 port 52808
2020-05-01 16:56:45
106.52.40.48 attack
May  1 09:42:49 DAAP sshd[24736]: Invalid user denys from 106.52.40.48 port 56638
May  1 09:42:49 DAAP sshd[24736]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.52.40.48
May  1 09:42:49 DAAP sshd[24736]: Invalid user denys from 106.52.40.48 port 56638
May  1 09:42:50 DAAP sshd[24736]: Failed password for invalid user denys from 106.52.40.48 port 56638 ssh2
May  1 09:47:53 DAAP sshd[24830]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.52.40.48  user=root
May  1 09:47:56 DAAP sshd[24830]: Failed password for root from 106.52.40.48 port 48930 ssh2
...
2020-05-01 17:13:46
106.75.152.95 attackspambots
May  1 09:56:13 eventyay sshd[25638]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.75.152.95
May  1 09:56:15 eventyay sshd[25638]: Failed password for invalid user bip from 106.75.152.95 port 45910 ssh2
May  1 10:02:00 eventyay sshd[25845]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.75.152.95
...
2020-05-01 17:12:31
69.119.114.36 attack
SSH brute-force attempt
2020-05-01 17:21:21
189.112.12.107 attackspambots
2020-05-01T08:47:42.664421homeassistant sshd[21948]: Invalid user jacopo from 189.112.12.107 port 3585
2020-05-01T08:47:42.671137homeassistant sshd[21948]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=189.112.12.107
...
2020-05-01 16:48:26
71.95.243.20 attack
"fail2ban match"
2020-05-01 17:21:01
49.233.188.133 attackbotsspam
Invalid user praxis from 49.233.188.133 port 43210
2020-05-01 17:28:56
120.201.125.204 attackspam
(sshd) Failed SSH login from 120.201.125.204 (CN/China/-): 5 in the last 3600 secs
2020-05-01 17:07:21
51.255.197.164 attack
2020-05-01T09:02:26.003205ionos.janbro.de sshd[98989]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.255.197.164  user=root
2020-05-01T09:02:27.881636ionos.janbro.de sshd[98989]: Failed password for root from 51.255.197.164 port 55852 ssh2
2020-05-01T09:09:17.890194ionos.janbro.de sshd[99012]: Invalid user ark from 51.255.197.164 port 60487
2020-05-01T09:09:18.000580ionos.janbro.de sshd[99012]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.255.197.164
2020-05-01T09:09:17.890194ionos.janbro.de sshd[99012]: Invalid user ark from 51.255.197.164 port 60487
2020-05-01T09:09:20.439959ionos.janbro.de sshd[99012]: Failed password for invalid user ark from 51.255.197.164 port 60487 ssh2
2020-05-01T09:16:09.195936ionos.janbro.de sshd[99027]: Invalid user star from 51.255.197.164 port 36955
2020-05-01T09:16:09.278539ionos.janbro.de sshd[99027]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid
...
2020-05-01 17:24:24

Recently Reported IPs

254.142.117.207 193.213.70.63 177.138.125.157 132.34.65.1
6.27.8.143 23.86.185.145 250.168.212.139 219.203.177.209
88.89.250.76 240.180.24.202 233.216.58.194 86.187.68.49
231.206.171.212 187.186.197.166 166.188.160.63 245.205.114.68
217.144.102.35 30.173.143.43 28.75.178.65 180.66.18.97