Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: India

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
IP Type Details Datetime
14.142.57.66 attack
SSH login attempts.
2020-09-08 20:54:35
14.142.57.66 attackspambots
SSH login attempts.
2020-09-08 12:47:35
14.142.57.66 attackspambots
$f2bV_matches
2020-09-08 05:23:06
14.142.57.66 attackbots
Aug 27 23:56:18 abendstille sshd\[17699\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=14.142.57.66  user=root
Aug 27 23:56:19 abendstille sshd\[17699\]: Failed password for root from 14.142.57.66 port 59008 ssh2
Aug 28 00:00:41 abendstille sshd\[22038\]: Invalid user developer from 14.142.57.66
Aug 28 00:00:41 abendstille sshd\[22038\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=14.142.57.66
Aug 28 00:00:43 abendstille sshd\[22038\]: Failed password for invalid user developer from 14.142.57.66 port 39672 ssh2
...
2020-08-28 06:02:55
14.142.57.66 attackspam
2020-08-20T22:55:18.229526morrigan.ad5gb.com sshd[1386802]: Invalid user user02 from 14.142.57.66 port 45354
2020-08-20T22:55:20.176804morrigan.ad5gb.com sshd[1386802]: Failed password for invalid user user02 from 14.142.57.66 port 45354 ssh2
2020-08-21 15:50:04
14.142.57.66 attack
2020-08-13T05:52:18.265580n23.at sshd[4072872]: Failed password for root from 14.142.57.66 port 50724 ssh2
2020-08-13T05:56:47.165184n23.at sshd[4076383]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=14.142.57.66  user=root
2020-08-13T05:56:49.268354n23.at sshd[4076383]: Failed password for root from 14.142.57.66 port 33188 ssh2
...
2020-08-13 12:34:21
14.142.57.66 attack
Banned for a week because repeated abuses, for example SSH, but not only
2020-08-10 17:12:46
14.142.57.66 attackspam
Failed password for root from 14.142.57.66 port 49852 ssh2
2020-08-02 20:32:04
14.142.57.66 attack
Jul 14 06:34:24 vps sshd[22889]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=14.142.57.66 
Jul 14 06:34:26 vps sshd[22889]: Failed password for invalid user easy from 14.142.57.66 port 60134 ssh2
Jul 14 06:45:11 vps sshd[23698]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=14.142.57.66 
...
2020-07-14 16:26:52
14.142.57.66 attackbotsspam
Jul  7 21:28:05 rush sshd[30973]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=14.142.57.66
Jul  7 21:28:08 rush sshd[30973]: Failed password for invalid user user from 14.142.57.66 port 58784 ssh2
Jul  7 21:31:29 rush sshd[31145]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=14.142.57.66
...
2020-07-08 09:40:16
14.142.57.66 attackbotsspam
Unauthorized connection attempt detected from IP address 14.142.57.66 to port 22
2020-01-10 06:51:23
14.142.57.66 attack
Nov 24 16:51:16 jane sshd[1307]: Failed password for root from 14.142.57.66 port 40598 ssh2
Nov 24 16:58:55 jane sshd[8460]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=14.142.57.66 
...
2019-11-25 02:41:41
14.142.57.66 attackbots
2019-11-21T06:00:58.021052abusebot-5.cloudsearch.cf sshd\[17544\]: Invalid user skinny from 14.142.57.66 port 47182
2019-11-21 14:29:31
14.142.57.66 attackspambots
Failed password for invalid user peres from 14.142.57.66 port 48460 ssh2
pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=14.142.57.66  user=root
Failed password for root from 14.142.57.66 port 59050 ssh2
pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=14.142.57.66  user=root
Failed password for root from 14.142.57.66 port 41392 ssh2
2019-11-05 06:40:09
14.142.57.66 attack
Oct 30 13:54:42 sso sshd[13210]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=14.142.57.66
Oct 30 13:54:45 sso sshd[13210]: Failed password for invalid user ceshikongjian from 14.142.57.66 port 43480 ssh2
...
2019-10-30 22:22:06
Whois info:
b
Dig info:

; <<>> DiG 9.10.3-P4-Ubuntu <<>> 14.142.57.18
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 30808
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;14.142.57.18.			IN	A

;; AUTHORITY SECTION:
.			3600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019050100 1800 900 604800 86400

;; Query time: 2 msec
;; SERVER: 67.207.67.3#53(67.207.67.3)
;; WHEN: Wed May 01 16:37:50 +08 2019
;; MSG SIZE  rcvd: 116

Host info
18.57.142.14.in-addr.arpa domain name pointer 14.142.57.18.static-Delhi.vsnl.net.in.
Nslookup info:
Server:		67.207.67.3
Address:	67.207.67.3#53

Non-authoritative answer:
18.57.142.14.in-addr.arpa	name = 14.142.57.18.static-Delhi.vsnl.net.in.

Authoritative answers can be found from:

Related IP info:
Related comments:
IP Type Details Datetime
123.133.161.148 attackbots
Port Scan: TCP/80
2019-08-05 12:23:12
38.98.229.132 attackspambots
Port Scan: UDP/49153
2019-08-05 11:43:36
96.47.138.162 attack
Port Scan: UDP/137
2019-08-05 11:25:30
120.86.109.32 attackspambots
Port Scan: TCP/22
2019-08-05 11:20:46
132.148.86.231 attack
Port Scan: TCP/445
2019-08-05 12:22:43
166.167.216.143 attackbotsspam
Port Scan: UDP/30
2019-08-05 11:55:06
173.199.118.131 attack
Port Scan: TCP/445
2019-08-05 11:53:40
165.22.237.205 attackbotsspam
Port Scan: TCP/8088
2019-08-05 11:55:43
177.69.66.13 attack
Port Scan: UDP/137
2019-08-05 11:52:48
220.130.233.29 attack
Port Scan: TCP/445
2019-08-05 11:46:27
207.219.72.213 attack
Port Scan: TCP/445
2019-08-05 12:20:33
46.173.208.2 attackspam
Port Scan: TCP/445
2019-08-05 11:39:57
102.165.202.32 attack
Port Scan: TCP/993
2019-08-05 11:24:55
64.191.89.82 attackspam
Port Scan: UDP/137
2019-08-05 12:31:35
38.104.159.138 attackbots
Port Scan: UDP/137
2019-08-05 11:42:59

Recently Reported IPs

223.214.203.103 189.59.69.3 119.97.150.16 104.248.147.78
145.255.28.122 10.9.35.196 84.53.198.121 184.28.69.32
180.218.171.1 218.201.51.126 74.191.175.44 134.209.30.155
217.197.23.106 111.75.167.157 203.142.69.203 91.222.246.75
193.178.55.157 209.126.230.74 80.68.76.181 109.96.171.178