Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Viet Nam

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
IP Type Details Datetime
14.161.19.79 attack
1598327910 - 08/25/2020 05:58:30 Host: 14.161.19.79/14.161.19.79 Port: 445 TCP Blocked
...
2020-08-25 13:26:09
14.161.196.45 attackbots
Icarus honeypot on github
2020-08-03 15:37:37
14.161.197.21 attack
DATE:2020-05-12 23:11:17, IP:14.161.197.21, PORT:telnet Telnet brute force auth on honeypot server (epe-honey1-hq)
2020-05-13 08:22:11
14.161.19.179 attackspam
20/4/15@08:12:48: FAIL: Alarm-Network address from=14.161.19.179
20/4/15@08:12:48: FAIL: Alarm-Network address from=14.161.19.179
...
2020-04-15 21:01:46
14.161.19.243 attack
$f2bV_matches
2020-03-25 15:29:05
14.161.19.20 attackbotsspam
IMAP
2020-02-24 00:03:28
14.161.19.132 attackspambots
445/tcp 445/tcp
[2020-01-13/02-10]2pkt
2020-02-11 05:23:52
14.161.19.51 attack
Unauthorized connection attempt from IP address 14.161.19.51 on Port 445(SMB)
2020-02-06 02:35:58
14.161.19.225 attackbotsspam
IMAP
2019-12-20 05:38:20
14.161.19.98 attackspam
Sep 29 10:51:10 ny01 sshd[11267]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=14.161.19.98
Sep 29 10:51:12 ny01 sshd[11267]: Failed password for invalid user admin from 14.161.19.98 port 37382 ssh2
Sep 29 10:56:20 ny01 sshd[12486]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=14.161.19.98
2019-09-29 23:09:31
14.161.19.168 attackbotsspam
@LucianNitescu Personal Honeypot Network <<<>>> Donate at paypal.me/LNitescu <<<>>> 2019-07-20 05:23:23,283 INFO [shellcode_manager] (14.161.19.168) no match, writing hexdump (3fe902d36c8654465c231193cc2d7853 :2448919) - MS17010 (EternalBlue)
2019-07-21 16:14:05
14.161.19.134 attack
Brute force attempt
2019-07-16 09:56:31
14.161.19.98 attackspambots
Automatic report - Web App Attack
2019-06-24 17:08:38
14.161.19.54 attackspambots
Unauthorised access (Jun 22) SRC=14.161.19.54 LEN=52 TTL=117 ID=19375 DF TCP DPT=445 WINDOW=8192 SYN
2019-06-22 15:22:21
14.161.19.98 attack
Jun 22 06:36:55 raspberrypi sshd\[3076\]: Invalid user test from 14.161.19.98 port 42922
Jun 22 06:36:55 raspberrypi sshd\[3076\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=14.161.19.98
Jun 22 06:36:58 raspberrypi sshd\[3076\]: Failed password for invalid user test from 14.161.19.98 port 42922 ssh2
Jun 22 06:38:43 raspberrypi sshd\[3085\]: Invalid user test from 14.161.19.98 port 59618
Jun 22 06:38:43 raspberrypi sshd\[3085\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=14.161.19.98
...
2019-06-22 13:45:29
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 14.161.19.196
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 5779
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;14.161.19.196.			IN	A

;; AUTHORITY SECTION:
.			600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022020702 1800 900 604800 86400

;; Query time: 14 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Feb 08 07:03:47 CST 2022
;; MSG SIZE  rcvd: 106
Host info
196.19.161.14.in-addr.arpa domain name pointer static.vdc.com.vn.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
196.19.161.14.in-addr.arpa	name = static.vdc.com.vn.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
117.107.133.162 attackspambots
Invalid user losts from 117.107.133.162 port 36956
2020-03-28 08:05:28
71.40.80.50 attackspambots
Unauthorized connection attempt from IP address 71.40.80.50 on Port 445(SMB)
2020-03-28 08:23:21
41.72.0.114 attackbotsspam
Mar 27 23:26:59 master sshd[29739]: Failed password for invalid user admin from 41.72.0.114 port 41351 ssh2
Mar 27 23:27:13 master sshd[29741]: Failed password for invalid user admin from 41.72.0.114 port 41357 ssh2
2020-03-28 08:11:20
213.154.11.207 attack
CMS (WordPress or Joomla) login attempt.
2020-03-28 08:19:18
80.89.77.139 attackspam
Unauthorized connection attempt from IP address 80.89.77.139 on Port 445(SMB)
2020-03-28 08:32:23
49.235.39.217 attackbotsspam
Mar 27 23:32:18 pkdns2 sshd\[24373\]: Invalid user ixe from 49.235.39.217Mar 27 23:32:20 pkdns2 sshd\[24373\]: Failed password for invalid user ixe from 49.235.39.217 port 56372 ssh2Mar 27 23:35:38 pkdns2 sshd\[24540\]: Invalid user gitlab-prometheus from 49.235.39.217Mar 27 23:35:39 pkdns2 sshd\[24540\]: Failed password for invalid user gitlab-prometheus from 49.235.39.217 port 59288 ssh2Mar 27 23:38:58 pkdns2 sshd\[24674\]: Invalid user xmu from 49.235.39.217Mar 27 23:39:00 pkdns2 sshd\[24674\]: Failed password for invalid user xmu from 49.235.39.217 port 33978 ssh2
...
2020-03-28 08:06:33
171.239.212.106 attackspam
Unauthorized connection attempt from IP address 171.239.212.106 on Port 445(SMB)
2020-03-28 08:36:41
54.39.98.253 attack
SSH Invalid Login
2020-03-28 08:27:47
112.186.79.4 attackspambots
Mar 28 00:38:35  sshd[8540]: Failed password for invalid user john from 112.186.79.4 port 52395 ssh2
2020-03-28 08:18:41
51.178.2.81 attack
$f2bV_matches
2020-03-28 08:18:10
96.69.174.252 attackspambots
T: f2b postfix aggressive 3x
2020-03-28 08:27:23
103.199.22.248 attackspambots
Unauthorized connection attempt from IP address 103.199.22.248 on Port 445(SMB)
2020-03-28 08:30:01
122.248.36.213 attackspam
proto=tcp  .  spt=58546  .  dpt=25  .     Found on   Blocklist de       (700)
2020-03-28 08:14:35
94.177.214.200 attackbots
Automatic report BANNED IP
2020-03-28 08:16:14
179.186.135.185 attackspambots
Unauthorized connection attempt from IP address 179.186.135.185 on Port 445(SMB)
2020-03-28 08:43:56

Recently Reported IPs

182.119.110.0 42.234.149.86 175.10.7.24 117.2.184.9
187.162.115.129 45.67.214.29 193.29.187.186 184.22.172.149
113.13.203.151 193.93.194.116 124.163.82.197 212.231.194.68
5.154.106.21 139.177.196.188 124.89.248.23 200.59.56.104
207.154.224.160 154.201.44.131 180.248.198.55 175.0.19.215