Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Ho Chi Minh City

Region: Ho Chi Minh

Country: Vietnam

Internet Service Provider: unknown

Hostname: unknown

Organization: VNPT Corp

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
IP Type Details Datetime
14.161.45.187 attack
(sshd) Failed SSH login from 14.161.45.187 (VN/Vietnam/static.vnpt.vn): 5 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: Oct 11 15:23:10 optimus sshd[3270]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=14.161.45.187  user=root
Oct 11 15:23:11 optimus sshd[3270]: Failed password for root from 14.161.45.187 port 51020 ssh2
Oct 11 15:55:09 optimus sshd[31504]: Invalid user test123 from 14.161.45.187
Oct 11 15:55:09 optimus sshd[31504]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=14.161.45.187 
Oct 11 15:55:10 optimus sshd[31504]: Failed password for invalid user test123 from 14.161.45.187 port 35170 ssh2
2020-10-12 04:09:04
14.161.45.187 attackbots
Oct 11 16:13:39 mx sshd[1351830]: Failed password for root from 14.161.45.187 port 47020 ssh2
Oct 11 16:14:33 mx sshd[1351838]: Invalid user uu from 14.161.45.187 port 52915
Oct 11 16:14:33 mx sshd[1351838]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=14.161.45.187 
Oct 11 16:14:33 mx sshd[1351838]: Invalid user uu from 14.161.45.187 port 52915
Oct 11 16:14:35 mx sshd[1351838]: Failed password for invalid user uu from 14.161.45.187 port 52915 ssh2
...
2020-10-11 20:07:57
14.161.45.187 attackspam
$f2bV_matches
2020-10-11 12:07:15
14.161.45.187 attack
2020-10-10 16:10:30.176107-0500  localhost sshd[48225]: Failed password for root from 14.161.45.187 port 36078 ssh2
2020-10-11 05:31:23
14.161.45.187 attackbots
Invalid user tester from 14.161.45.187 port 35104
2020-09-21 02:03:57
14.161.45.187 attackbots
Invalid user tester from 14.161.45.187 port 35104
2020-09-20 18:04:22
14.161.45.187 attackbotsspam
Aug 17 07:12:39 PorscheCustomer sshd[28388]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=14.161.45.187
Aug 17 07:12:41 PorscheCustomer sshd[28388]: Failed password for invalid user lisa from 14.161.45.187 port 36779 ssh2
Aug 17 07:14:24 PorscheCustomer sshd[28481]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=14.161.45.187
...
2020-08-17 13:29:25
14.161.45.187 attack
Connection to SSH Honeypot - Detected by HoneypotDB
2020-08-02 13:25:02
14.161.45.187 attackspam
Jul 23 16:54:26 Invalid user yxy from 14.161.45.187 port 40629
2020-07-23 23:09:34
14.161.45.187 attackspam
Jul 21 23:45:10 abendstille sshd\[7566\]: Invalid user mm from 14.161.45.187
Jul 21 23:45:10 abendstille sshd\[7566\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=14.161.45.187
Jul 21 23:45:12 abendstille sshd\[7566\]: Failed password for invalid user mm from 14.161.45.187 port 41466 ssh2
Jul 21 23:49:06 abendstille sshd\[11714\]: Invalid user sda from 14.161.45.187
Jul 21 23:49:06 abendstille sshd\[11714\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=14.161.45.187
...
2020-07-22 06:38:30
14.161.45.187 attack
2020-07-21T09:08:01.919873afi-git.jinr.ru sshd[15602]: Invalid user gitolite from 14.161.45.187 port 57538
2020-07-21T09:08:01.923118afi-git.jinr.ru sshd[15602]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=14.161.45.187
2020-07-21T09:08:01.919873afi-git.jinr.ru sshd[15602]: Invalid user gitolite from 14.161.45.187 port 57538
2020-07-21T09:08:03.706524afi-git.jinr.ru sshd[15602]: Failed password for invalid user gitolite from 14.161.45.187 port 57538 ssh2
2020-07-21T09:10:56.435301afi-git.jinr.ru sshd[16384]: Invalid user guest from 14.161.45.187 port 49604
...
2020-07-21 14:28:04
14.161.45.253 attack
Jul  5 17:26:58 Host-KLAX-C dovecot: imap-login: Disconnected (auth failed, 1 attempts in 9 secs): user=, method=PLAIN, rip=14.161.45.253, lip=185.198.26.142, TLS, session=
...
2020-07-06 08:07:12
14.161.45.187 attackspam
SSH Brute-Forcing (server1)
2020-06-28 15:50:13
14.161.45.187 attackspambots
Jun 19 12:41:20 vps639187 sshd\[26885\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=14.161.45.187  user=root
Jun 19 12:41:21 vps639187 sshd\[26885\]: Failed password for root from 14.161.45.187 port 60281 ssh2
Jun 19 12:44:41 vps639187 sshd\[26937\]: Invalid user ustin from 14.161.45.187 port 60197
Jun 19 12:44:41 vps639187 sshd\[26937\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=14.161.45.187
...
2020-06-19 18:58:42
14.161.45.179 attackbotsspam
Dovecot Invalid User Login Attempt.
2020-06-10 02:40:23
Whois info:
b
Dig info:

; <<>> DiG 9.10.3-P4-Ubuntu <<>> 14.161.45.13
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 53100
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;14.161.45.13.			IN	A

;; AUTHORITY SECTION:
.			1349	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019040501 1800 900 604800 86400

;; Query time: 0 msec
;; SERVER: 67.207.67.3#53(67.207.67.3)
;; WHEN: Sat Apr 06 02:04:01 +08 2019
;; MSG SIZE  rcvd: 116

Host info
13.45.161.14.in-addr.arpa domain name pointer static.vnpt.vn.
Nslookup info:
Server:		67.207.67.3
Address:	67.207.67.3#53

Non-authoritative answer:
13.45.161.14.in-addr.arpa	name = static.vnpt.vn.

Authoritative answers can be found from:

Related IP info:
Related comments:
IP Type Details Datetime
36.237.84.106 attack
Unauthorized connection attempt from IP address 36.237.84.106 on Port 445(SMB)
2020-02-22 06:38:29
59.62.31.49 attack
Unauthorized connection attempt from IP address 59.62.31.49 on Port 445(SMB)
2020-02-22 06:44:58
176.100.82.99 attack
1582320660 - 02/21/2020 22:31:00 Host: 176.100.82.99/176.100.82.99 Port: 445 TCP Blocked
2020-02-22 06:35:59
167.114.144.96 attackspam
Feb 21 23:54:51 vps647732 sshd[2578]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.114.144.96
Feb 21 23:54:53 vps647732 sshd[2578]: Failed password for invalid user whmcs from 167.114.144.96 port 60816 ssh2
...
2020-02-22 06:57:47
213.136.83.55 attackbots
02/21/2020-22:30:57.494714 213.136.83.55 Protocol: 6 ET POLICY Cleartext WordPress Login
2020-02-22 06:39:51
170.80.225.46 attackbotsspam
$f2bV_matches
2020-02-22 07:03:15
51.178.27.119 attack
Lines containing failures of 51.178.27.119
Feb 20 20:28:43 comanche sshd[13110]: Connection from 51.178.27.119 port 60860 on 168.235.108.111 port 22
Feb 20 20:31:09 comanche sshd[13132]: Connection from 51.178.27.119 port 46786 on 168.235.108.111 port 22
Feb 20 20:31:10 comanche sshd[13132]: Received disconnect from 51.178.27.119 port 46786:11: Normal Shutdown, Thank you for playing [preauth]
Feb 20 20:31:10 comanche sshd[13132]: Disconnected from authenticating user r.r 51.178.27.119 port 46786 [preauth]
Feb 20 20:31:15 comanche sshd[13134]: Connection from 51.178.27.119 port 52659 on 168.235.108.111 port 22
Feb 20 20:31:16 comanche sshd[13134]: Received disconnect from 51.178.27.119 port 52659:11: Normal Shutdown, Thank you for playing [preauth]
Feb 20 20:31:16 comanche sshd[13134]: Disconnected from authenticating user r.r 51.178.27.119 port 52659 [preauth]
Feb 20 20:31:22 comanche sshd[13136]: Connection from 51.178.27.119 port 58532 on 168.235.108.111 port 22
Feb 20........
------------------------------
2020-02-22 06:34:52
138.118.123.138 attackspam
" "
2020-02-22 07:05:47
91.123.24.84 attack
Unauthorized connection attempt from IP address 91.123.24.84 on Port 445(SMB)
2020-02-22 06:41:28
171.8.4.38 attackspam
Unauthorized connection attempt from IP address 171.8.4.38 on Port 445(SMB)
2020-02-22 06:50:15
101.231.146.36 attackbots
Invalid user testftp from 101.231.146.36 port 46820
2020-02-22 07:11:23
60.172.4.133 attackbots
Unauthorized connection attempt from IP address 60.172.4.133 on Port 445(SMB)
2020-02-22 06:58:36
222.186.175.151 attackbots
Feb 22 03:55:30 gw1 sshd[2139]: Failed password for root from 222.186.175.151 port 19942 ssh2
Feb 22 03:55:43 gw1 sshd[2139]: Failed password for root from 222.186.175.151 port 19942 ssh2
Feb 22 03:55:43 gw1 sshd[2139]: error: maximum authentication attempts exceeded for root from 222.186.175.151 port 19942 ssh2 [preauth]
...
2020-02-22 06:57:25
222.186.180.41 attackspambots
2020-02-21T22:40:10.894465abusebot-2.cloudsearch.cf sshd[8925]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.180.41  user=root
2020-02-21T22:40:12.477978abusebot-2.cloudsearch.cf sshd[8925]: Failed password for root from 222.186.180.41 port 4824 ssh2
2020-02-21T22:40:15.713214abusebot-2.cloudsearch.cf sshd[8925]: Failed password for root from 222.186.180.41 port 4824 ssh2
2020-02-21T22:40:10.894465abusebot-2.cloudsearch.cf sshd[8925]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.180.41  user=root
2020-02-21T22:40:12.477978abusebot-2.cloudsearch.cf sshd[8925]: Failed password for root from 222.186.180.41 port 4824 ssh2
2020-02-21T22:40:15.713214abusebot-2.cloudsearch.cf sshd[8925]: Failed password for root from 222.186.180.41 port 4824 ssh2
2020-02-21T22:40:10.894465abusebot-2.cloudsearch.cf sshd[8925]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rh
...
2020-02-22 06:45:36
59.92.155.108 attackspam
Unauthorized connection attempt from IP address 59.92.155.108 on Port 445(SMB)
2020-02-22 06:49:54

Recently Reported IPs

36.67.78.77 187.45.234.237 198.108.67.91 139.59.135.84
82.239.217.87 190.94.136.98 192.95.21.44 145.255.8.235
52.98.2.178 200.69.204.143 79.135.32.21 31.199.192.20
54.231.235.26 221.132.17.74 220.118.32.54 116.109.27.81
103.207.2.204 88.35.5.195 80.20.125.243 37.202.66.112