Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Hai Duong

Region: Tinh Hai Duong

Country: Vietnam

Internet Service Provider: Vietnam Posts and Telecommunications Group

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
Type Details Datetime
attackspam
Invalid user admin from 14.160.39.106 port 55310
2020-01-22 00:06:09
attackspam
SSH bruteforce (Triggered fail2ban)
2019-12-21 07:56:14
attackbotsspam
Invalid user admin from 14.160.39.106 port 42255
2019-10-20 04:12:33
Comments on same subnet:
IP Type Details Datetime
14.160.39.26 attack
Unauthorized connection attempt from IP address 14.160.39.26 on port 993
2020-09-14 03:03:30
14.160.39.26 attack
Dovecot Invalid User Login Attempt.
2020-09-13 19:01:04
14.160.39.26 attack
CMS (WordPress or Joomla) login attempt.
2020-09-01 18:26:43
14.160.39.26 attack
Dovecot Invalid User Login Attempt.
2020-08-04 13:59:51
14.160.39.222 attackbots
Jul 19 01:45:55 Host-KLAX-C dovecot: imap-login: Disconnected (auth failed, 1 attempts in 5 secs): user=, method=PLAIN, rip=14.160.39.222, lip=185.198.26.142, TLS: Disconnected, session=<+xoylMaqiqQOoCfe>
...
2020-07-19 23:42:40
14.160.39.18 attackbots
(imapd) Failed IMAP login from 14.160.39.18 (VN/Vietnam/static.vnpt.vn): 1 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_TRIGGER; Logs: Jul 16 08:20:43 ir1 dovecot[2885757]: imap-login: Disconnected (auth failed, 1 attempts in 6 secs): user=, method=PLAIN, rip=14.160.39.18, lip=5.63.12.44, TLS, session=
2020-07-16 17:26:53
14.160.39.18 attack
Dovecot Invalid User Login Attempt.
2020-07-13 17:49:28
14.160.39.26 attackbots
(imapd) Failed IMAP login from 14.160.39.26 (VN/Vietnam/static.vnpt.vn): 1 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_TRIGGER; Logs: Jul 12 00:36:05 ir1 dovecot[2885757]: imap-login: Disconnected (auth failed, 1 attempts in 5 secs): user=, method=PLAIN, rip=14.160.39.26, lip=5.63.12.44, TLS, session=
2020-07-12 06:22:21
14.160.39.138 attackspam
Dovecot Invalid User Login Attempt.
2020-07-04 10:52:36
14.160.39.138 attackspam
Dovecot Invalid User Login Attempt.
2020-05-28 15:01:02
14.160.39.138 attack
Dovecot Invalid User Login Attempt.
2020-04-25 17:17:29
14.160.39.138 attackbotsspam
Dovecot Invalid User Login Attempt.
2020-04-24 02:00:00
14.160.39.138 attackspambots
Dovecot Invalid User Login Attempt.
2020-04-19 12:01:37
14.160.39.154 attackbotsspam
Mar  5 21:58:26 sigma sshd\[23720\]: Invalid user ubnt from 14.160.39.154Mar  5 21:58:29 sigma sshd\[23720\]: Failed password for invalid user ubnt from 14.160.39.154 port 53419 ssh2
...
2020-03-06 07:23:29
14.160.39.78 attackbotsspam
Unauthorized connection attempt detected from IP address 14.160.39.78 to port 445
2019-12-12 19:21:01
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 14.160.39.106
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 59891
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;14.160.39.106.			IN	A

;; AUTHORITY SECTION:
.			598	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019101901 1800 900 604800 86400

;; Query time: 171 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Oct 20 04:12:31 CST 2019
;; MSG SIZE  rcvd: 117
Host info
106.39.160.14.in-addr.arpa domain name pointer static.vnpt.vn.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
106.39.160.14.in-addr.arpa	name = static.vnpt.vn.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
113.137.36.187 attackspambots
May 21 19:26:54 lukav-desktop sshd\[4606\]: Invalid user mmx from 113.137.36.187
May 21 19:26:54 lukav-desktop sshd\[4606\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=113.137.36.187
May 21 19:26:55 lukav-desktop sshd\[4606\]: Failed password for invalid user mmx from 113.137.36.187 port 59182 ssh2
May 21 19:29:12 lukav-desktop sshd\[4665\]: Invalid user ayw from 113.137.36.187
May 21 19:29:12 lukav-desktop sshd\[4665\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=113.137.36.187
2020-05-22 02:15:26
113.214.25.170 attack
May 21 16:11:56 onepixel sshd[712002]: Invalid user gps from 113.214.25.170 port 52193
May 21 16:11:56 onepixel sshd[712002]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=113.214.25.170 
May 21 16:11:56 onepixel sshd[712002]: Invalid user gps from 113.214.25.170 port 52193
May 21 16:11:58 onepixel sshd[712002]: Failed password for invalid user gps from 113.214.25.170 port 52193 ssh2
May 21 16:14:26 onepixel sshd[712355]: Invalid user apk from 113.214.25.170 port 36178
2020-05-22 02:47:02
118.25.226.152 attackbotsspam
2020-05-21T16:42:51.675625centos sshd[10709]: Invalid user ahz from 118.25.226.152 port 57140
2020-05-21T16:42:54.002151centos sshd[10709]: Failed password for invalid user ahz from 118.25.226.152 port 57140 ssh2
2020-05-21T16:48:11.225359centos sshd[11007]: Invalid user oyj from 118.25.226.152 port 49750
...
2020-05-22 02:19:07
45.87.184.11 attack
Unauthorized connection attempt from IP address 45.87.184.11 on Port 445(SMB)
2020-05-22 02:29:02
139.59.56.174 attackbots
firewall-block, port(s): 11599/tcp
2020-05-22 02:31:01
159.65.97.7 attackspambots
firewall-block, port(s): 20033/tcp
2020-05-22 02:27:34
192.144.172.50 attackspambots
SSH Bruteforce Attempt (failed auth)
2020-05-22 02:18:45
188.163.109.153 attackspambots
0,23-02/19 [bc01/m20] PostRequest-Spammer scoring: maputo01_x2b
2020-05-22 02:29:24
80.82.77.245 attack
" "
2020-05-22 02:50:12
217.219.76.102 attackbots
Unauthorized connection attempt from IP address 217.219.76.102 on Port 445(SMB)
2020-05-22 02:39:53
213.118.170.210 attack
May 21 20:09:57 vps647732 sshd[3013]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=213.118.170.210
May 21 20:09:59 vps647732 sshd[3013]: Failed password for invalid user pnp from 213.118.170.210 port 46908 ssh2
...
2020-05-22 02:15:43
103.4.217.138 attackbots
2020-05-21T19:24:12.978060vps773228.ovh.net sshd[16132]: Invalid user zvl from 103.4.217.138 port 45095
2020-05-21T19:24:12.994014vps773228.ovh.net sshd[16132]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.4.217.138
2020-05-21T19:24:12.978060vps773228.ovh.net sshd[16132]: Invalid user zvl from 103.4.217.138 port 45095
2020-05-21T19:24:14.675870vps773228.ovh.net sshd[16132]: Failed password for invalid user zvl from 103.4.217.138 port 45095 ssh2
2020-05-21T19:29:38.524965vps773228.ovh.net sshd[16189]: Invalid user huangliang from 103.4.217.138 port 48296
...
2020-05-22 02:35:22
177.38.98.74 attackspambots
Honeypot attack, port: 445, PTR: 177-38-98-74.netway.psi.br.
2020-05-22 02:29:42
45.55.184.78 attack
May 21 11:56:08 XXX sshd[31070]: Invalid user unz from 45.55.184.78 port 41410
2020-05-22 02:36:46
120.157.75.11 attackspambots
Brute forcing email accounts
2020-05-22 02:15:12

Recently Reported IPs

61.167.224.151 99.103.51.184 105.167.139.78 115.35.150.53
232.57.162.110 196.0.82.69 221.197.5.90 89.82.32.221
35.163.193.139 139.118.117.14 116.249.180.39 65.44.143.170
242.68.143.41 84.168.3.150 123.190.38.23 100.207.219.95
5.81.178.166 168.229.131.103 75.165.155.168 24.73.206.108