Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: unknown

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 14.164.217.5
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 43571
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;14.164.217.5.			IN	A

;; AUTHORITY SECTION:
.			599	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022030803 1800 900 604800 86400

;; Query time: 94 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Mar 09 08:47:18 CST 2022
;; MSG SIZE  rcvd: 105
Host info
5.217.164.14.in-addr.arpa domain name pointer static.vnpt.vn.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
5.217.164.14.in-addr.arpa	name = static.vnpt.vn.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
81.214.130.65 attack
9000/tcp 8000/tcp 8000/tcp
[2019-10-05/11-19]3pkt
2019-11-20 08:14:44
37.120.190.27 attackspambots
Nov 19 21:07:26 124388 sshd[18076]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=37.120.190.27
Nov 19 21:07:26 124388 sshd[18076]: Invalid user vcsa from 37.120.190.27 port 50672
Nov 19 21:07:28 124388 sshd[18076]: Failed password for invalid user vcsa from 37.120.190.27 port 50672 ssh2
Nov 19 21:10:37 124388 sshd[18082]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=37.120.190.27  user=root
Nov 19 21:10:39 124388 sshd[18082]: Failed password for root from 37.120.190.27 port 59294 ssh2
2019-11-20 08:38:33
128.199.162.108 attackspambots
2019-11-19T22:44:29.635092abusebot-5.cloudsearch.cf sshd\[1971\]: Invalid user vanilla from 128.199.162.108 port 44932
2019-11-20 08:43:31
107.152.138.138 attackspambots
1433/tcp 445/tcp...
[2019-09-24/11-19]10pkt,2pt.(tcp)
2019-11-20 08:24:37
117.50.12.10 attackspam
2019-11-19T22:02:53.919036homeassistant sshd[3855]: Invalid user mysql from 117.50.12.10 port 50404
2019-11-19T22:02:53.925919homeassistant sshd[3855]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=117.50.12.10
...
2019-11-20 08:47:50
35.225.211.131 attack
joshuajohannes.de 35.225.211.131 \[19/Nov/2019:22:10:32 +0100\] "POST /wp-login.php HTTP/1.1" 200 6301 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0"
joshuajohannes.de 35.225.211.131 \[19/Nov/2019:22:10:33 +0100\] "POST /wp-login.php HTTP/1.1" 200 6269 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0"
joshuajohannes.de 35.225.211.131 \[19/Nov/2019:22:10:34 +0100\] "POST /xmlrpc.php HTTP/1.1" 200 4098 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0"
2019-11-20 08:41:39
124.235.206.130 attackspam
2019-11-19T23:29:19.064001scmdmz1 sshd\[18930\]: Invalid user sv from 124.235.206.130 port 43557
2019-11-19T23:29:19.066970scmdmz1 sshd\[18930\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=124.235.206.130
2019-11-19T23:29:20.717465scmdmz1 sshd\[18930\]: Failed password for invalid user sv from 124.235.206.130 port 43557 ssh2
...
2019-11-20 08:20:21
162.158.63.21 attackbots
8080/tcp 8443/tcp...
[2019-09-20/11-19]12pkt,2pt.(tcp)
2019-11-20 08:25:04
178.18.34.36 attackbotsspam
445/tcp 1433/tcp...
[2019-10-08/11-19]7pkt,2pt.(tcp)
2019-11-20 08:11:16
192.241.143.162 attackbots
Nov 20 00:06:05 server sshd\[7600\]: Invalid user rabian from 192.241.143.162
Nov 20 00:06:05 server sshd\[7600\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=192.241.143.162 
Nov 20 00:06:08 server sshd\[7600\]: Failed password for invalid user rabian from 192.241.143.162 port 49432 ssh2
Nov 20 00:22:24 server sshd\[11441\]: Invalid user perlaki from 192.241.143.162
Nov 20 00:22:24 server sshd\[11441\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=192.241.143.162 
...
2019-11-20 08:30:01
87.197.162.136 attack
23/tcp 8000/tcp 88/tcp...
[2019-09-22/11-19]7pkt,5pt.(tcp)
2019-11-20 08:42:26
117.48.231.173 attack
Invalid user home from 117.48.231.173 port 46332
pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=117.48.231.173
Failed password for invalid user home from 117.48.231.173 port 46332 ssh2
pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=117.48.231.173  user=root
Failed password for root from 117.48.231.173 port 53440 ssh2
2019-11-20 08:18:39
72.87.95.169 attackspambots
9000/tcp 8081/tcp 85/tcp
[2019-11-07/19]3pkt
2019-11-20 08:32:01
178.159.127.59 attackspambots
23/tcp 9001/tcp
[2019-10-19/11-19]2pkt
2019-11-20 08:22:08
117.139.202.64 attackspambots
Nov 20 00:22:07 vps691689 sshd[18827]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=117.139.202.64
Nov 20 00:22:09 vps691689 sshd[18827]: Failed password for invalid user gt from 117.139.202.64 port 54266 ssh2
...
2019-11-20 08:18:09

Recently Reported IPs

14.164.167.211 118.27.22.182 14.164.237.140 14.164.46.214
14.164.47.201 14.164.75.196 14.164.6.104 14.164.99.174
14.165.104.32 14.164.47.180 118.27.22.197 14.164.74.92
14.165.106.213 14.164.44.197 14.165.107.141 14.164.99.108
14.165.112.56 14.165.113.119 14.165.115.219 14.165.157.34