Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Rohtak

Region: Haryana

Country: India

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
IP Type Details Datetime
14.102.189.106 attackspambots
W 31101,/var/log/nginx/access.log,-,-
2020-06-22 13:35:34
14.102.189.201 attackspambots
unauthorized connection attempt
2020-02-07 16:41:28
Whois info:
b
Dig info:

; <<>> DiG 9.10.3-P4-Ubuntu <<>> 14.102.189.149
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 47374
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;14.102.189.149.			IN	A

;; AUTHORITY SECTION:
.			10800	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019123101 1800 900 604800 86400

;; Query time: 1 msec
;; SERVER: 100.100.2.136#53(100.100.2.136)
;; WHEN: Wed Jan 01 04:23:33 CST 2020
;; MSG SIZE  rcvd: 118

Host info
149.189.102.14.in-addr.arpa domain name pointer axntech-dynamic-149.189.102.14.axntechnologies.in.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
149.189.102.14.in-addr.arpa	name = axntech-dynamic-149.189.102.14.axntechnologies.in.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
51.68.251.201 attack
$f2bV_matches
2019-10-28 16:12:52
106.12.10.119 attack
5x Failed Password
2019-10-28 16:04:30
182.53.227.164 attackbots
445/tcp
[2019-10-28]1pkt
2019-10-28 16:13:56
132.232.7.197 attackspambots
Oct 28 06:55:09 pornomens sshd\[25930\]: Invalid user 123@asdQWE from 132.232.7.197 port 34540
Oct 28 06:55:09 pornomens sshd\[25930\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=132.232.7.197
Oct 28 06:55:12 pornomens sshd\[25930\]: Failed password for invalid user 123@asdQWE from 132.232.7.197 port 34540 ssh2
...
2019-10-28 16:24:59
210.179.38.12 attack
60001/tcp
[2019-10-28]1pkt
2019-10-28 15:51:32
58.71.195.163 attack
Automatic report - Port Scan Attack
2019-10-28 16:14:55
88.129.208.35 attackspambots
Honeypot attack, port: 23, PTR: h88-129-208-35.cust.a3fiber.se.
2019-10-28 16:02:08
106.13.95.27 attackspam
Automatic report - SSH Brute-Force Attack
2019-10-28 15:56:45
69.171.73.9 attack
Oct 28 07:00:57 work-partkepr sshd\[29369\]: Invalid user jboss from 69.171.73.9 port 49518
Oct 28 07:00:57 work-partkepr sshd\[29369\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=69.171.73.9
...
2019-10-28 16:13:22
184.30.210.217 attack
10/28/2019-08:42:59.521321 184.30.210.217 Protocol: 6 SURICATA TLS invalid record/traffic
2019-10-28 15:52:21
194.29.210.15 attackbotsspam
slow and persistent scanner
2019-10-28 16:15:54
144.178.74.147 attack
Automatic report - Port Scan Attack
2019-10-28 16:25:17
14.29.207.59 attackspambots
Oct 28 07:12:04 xeon sshd[5757]: Failed password for invalid user tom from 14.29.207.59 port 37868 ssh2
2019-10-28 15:55:39
111.123.65.88 attackbots
Unauthorised access (Oct 28) SRC=111.123.65.88 LEN=40 TOS=0x10 PREC=0x40 TTL=50 ID=2952 TCP DPT=23 WINDOW=60672 SYN
2019-10-28 16:24:31
5.232.49.104 attackbots
Automatic report - Port Scan Attack
2019-10-28 16:20:12

Recently Reported IPs

178.205.61.117 105.131.47.107 50.255.136.32 105.4.253.88
60.13.7.190 41.136.214.216 58.220.56.3 58.219.130.178
45.250.182.43 49.82.69.195 49.81.173.36 105.214.227.42
197.179.194.121 85.113.101.108 42.117.48.148 217.221.172.11
42.117.20.127 129.123.175.84 42.115.26.189 158.197.76.95