Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Matsumoto

Region: Nagano

Country: Japan

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 14.14.70.138
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 44331
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;14.14.70.138.			IN	A

;; AUTHORITY SECTION:
.			594	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2024053000 1800 900 604800 86400

;; Query time: 17 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu May 30 15:46:53 CST 2024
;; MSG SIZE  rcvd: 105
Host info
138.70.14.14.in-addr.arpa domain name pointer host14-14-70-138.tvm.ne.jp.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
138.70.14.14.in-addr.arpa	name = host14-14-70-138.tvm.ne.jp.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
49.235.81.23 attack
May  2 08:33:17 [host] sshd[8364]: Invalid user kt
May  2 08:33:17 [host] sshd[8364]: pam_unix(sshd:a
May  2 08:33:19 [host] sshd[8364]: Failed password
2020-05-02 16:56:22
51.83.42.108 attack
2020-05-02T09:44:19.301517sd-86998 sshd[29025]: Invalid user supervisores from 51.83.42.108 port 34460
2020-05-02T09:44:19.304050sd-86998 sshd[29025]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=108.ip-51-83-42.eu
2020-05-02T09:44:19.301517sd-86998 sshd[29025]: Invalid user supervisores from 51.83.42.108 port 34460
2020-05-02T09:44:21.090465sd-86998 sshd[29025]: Failed password for invalid user supervisores from 51.83.42.108 port 34460 ssh2
2020-05-02T09:47:56.930686sd-86998 sshd[29242]: Invalid user yahoo from 51.83.42.108 port 44134
...
2020-05-02 16:47:58
94.229.66.131 attackspam
prod6
...
2020-05-02 16:55:39
123.24.44.146 attackbotsspam
1588391506 - 05/02/2020 05:51:46 Host: 123.24.44.146/123.24.44.146 Port: 445 TCP Blocked
2020-05-02 16:59:21
149.56.132.202 attackspambots
2020-05-02T03:51:55.473663homeassistant sshd[17234]: Invalid user sj from 149.56.132.202 port 54082
2020-05-02T03:51:55.480408homeassistant sshd[17234]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=149.56.132.202
...
2020-05-02 16:51:52
71.6.233.9 attackspam
Port scan: Attack repeated for 24 hours
2020-05-02 16:28:10
113.110.194.25 attackbotsspam
1588391528 - 05/02/2020 05:52:08 Host: 113.110.194.25/113.110.194.25 Port: 445 TCP Blocked
2020-05-02 16:43:18
123.206.77.192 attackspam
Brute-force attempt banned
2020-05-02 16:49:30
184.150.96.144 attackspam
PORN SPAM !
2020-05-02 16:55:10
217.182.95.16 attackspambots
Brute-force attempt banned
2020-05-02 16:47:00
77.68.20.250 attackbots
(mod_security) mod_security (id:20000010) triggered by 77.68.20.250 (GB/United Kingdom/-): 5 in the last 300 secs
2020-05-02 17:00:17
144.217.7.75 attackspambots
May  2 09:55:14 vpn01 sshd[24925]: Failed password for root from 144.217.7.75 port 48044 ssh2
May  2 09:59:59 vpn01 sshd[25019]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=144.217.7.75
...
2020-05-02 17:02:14
51.178.201.135 attackbots
Repeated brute force against a port
2020-05-02 16:37:40
52.156.152.50 attackbotsspam
Invalid user dl from 52.156.152.50 port 55274
2020-05-02 16:29:21
124.156.121.233 attackbotsspam
(sshd) Failed SSH login from 124.156.121.233 (SG/Singapore/-): 5 in the last 3600 secs
2020-05-02 17:13:32

Recently Reported IPs

71.177.218.148 96.156.79.162 49.42.165.174 126.78.112.230
29.141.133.79 33.219.79.35 141.246.245.197 86.100.73.240
2.192.10.120 106.239.41.115 41.185.167.36 70.254.198.112
8.50.177.48 64.157.25.83 166.146.87.207 133.124.55.163
190.130.61.41 19.169.253.20 116.231.89.242 235.105.215.198