Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Viet Nam

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 14.165.66.158
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 63723
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;14.165.66.158.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025021600 1800 900 604800 86400

;; Query time: 63 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Feb 16 14:24:24 CST 2025
;; MSG SIZE  rcvd: 106
Host info
158.66.165.14.in-addr.arpa domain name pointer static.vnpt.vn.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
158.66.165.14.in-addr.arpa	name = static.vnpt.vn.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
190.7.150.2 attackspam
IP Ban Report : https://help-dysk.pl/wordpress-firewall-plugins/ip/190.7.150.2/ 
 CO - 1H : (59)  
 Protection Against DDoS WordPress plugin :  
 "odzyskiwanie danych help-dysk" 
 IP Address Ranges by Country : CO 
 NAME ASN : ASN27805 
 
 IP : 190.7.150.2 
 
 CIDR : 190.7.144.0/20 
 
 PREFIX COUNT : 52 
 
 UNIQUE IP COUNT : 2105088 
 
 
 WYKRYTE ATAKI Z ASN27805 :  
  1H - 2 
  3H - 5 
  6H - 9 
 12H - 14 
 24H - 17 
 
 INFO : Port Scan TELNET Detected and Blocked by ADMIN  - data recovery
2019-09-23 23:06:00
5.23.79.3 attack
Sep 23 04:33:45 hanapaa sshd\[16712\]: Invalid user wiki from 5.23.79.3
Sep 23 04:33:45 hanapaa sshd\[16712\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=postur.emax.is
Sep 23 04:33:48 hanapaa sshd\[16712\]: Failed password for invalid user wiki from 5.23.79.3 port 55371 ssh2
Sep 23 04:38:03 hanapaa sshd\[17070\]: Invalid user 123 from 5.23.79.3
Sep 23 04:38:03 hanapaa sshd\[17070\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=postur.emax.is
2019-09-23 22:43:06
116.87.230.42 attackspambots
CloudCIX Reconnaissance Scan Detected, PTR: 42.230.87.116.starhub.net.sg.
2019-09-23 22:29:48
68.183.127.13 attackbotsspam
Sep 23 16:32:50 vps647732 sshd[9538]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=68.183.127.13
Sep 23 16:32:52 vps647732 sshd[9538]: Failed password for invalid user attack from 68.183.127.13 port 37756 ssh2
...
2019-09-23 22:51:01
103.89.88.64 attackspambots
Brute Force attack - banned by Fail2Ban
2019-09-23 22:31:54
23.129.64.184 attackbots
Automatic report - Banned IP Access
2019-09-23 22:50:42
157.230.120.252 attack
Sep 23 16:41:00 nextcloud sshd\[30416\]: Invalid user degenius from 157.230.120.252
Sep 23 16:41:00 nextcloud sshd\[30416\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.230.120.252
Sep 23 16:41:02 nextcloud sshd\[30416\]: Failed password for invalid user degenius from 157.230.120.252 port 44488 ssh2
...
2019-09-23 23:06:12
1.174.55.227 attack
3 failed ftp login attempts in 3600s
2019-09-23 22:28:36
83.48.89.147 attackspambots
Sep 23 04:52:40 tdfoods sshd\[13446\]: Invalid user nimda from 83.48.89.147
Sep 23 04:52:40 tdfoods sshd\[13446\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=147.red-83-48-89.staticip.rima-tde.net
Sep 23 04:52:42 tdfoods sshd\[13446\]: Failed password for invalid user nimda from 83.48.89.147 port 44065 ssh2
Sep 23 04:56:54 tdfoods sshd\[13789\]: Invalid user 123 from 83.48.89.147
Sep 23 04:56:54 tdfoods sshd\[13789\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=147.red-83-48-89.staticip.rima-tde.net
2019-09-23 23:03:00
195.154.33.66 attackbots
Sep 23 16:45:50 vmanager6029 sshd\[2805\]: Invalid user benedita from 195.154.33.66 port 59896
Sep 23 16:45:50 vmanager6029 sshd\[2805\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=195.154.33.66
Sep 23 16:45:52 vmanager6029 sshd\[2805\]: Failed password for invalid user benedita from 195.154.33.66 port 59896 ssh2
2019-09-23 22:58:47
23.129.64.192 attack
Sep 23 15:48:12 rotator sshd\[4080\]: Invalid user admin from 23.129.64.192Sep 23 15:48:14 rotator sshd\[4080\]: Failed password for invalid user admin from 23.129.64.192 port 24275 ssh2Sep 23 15:48:21 rotator sshd\[4088\]: Invalid user admissions from 23.129.64.192Sep 23 15:48:23 rotator sshd\[4088\]: Failed password for invalid user admissions from 23.129.64.192 port 31346 ssh2Sep 23 15:48:29 rotator sshd\[4090\]: Invalid user ADMN from 23.129.64.192Sep 23 15:48:32 rotator sshd\[4090\]: Failed password for invalid user ADMN from 23.129.64.192 port 12478 ssh2
...
2019-09-23 22:30:59
103.200.118.61 attack
CloudCIX Reconnaissance Scan Detected, PTR: PTR record not found
2019-09-23 22:47:48
1.241.29.158 attackbotsspam
Autoban   1.241.29.158 AUTH/CONNECT
2019-09-23 22:48:53
14.215.46.94 attackspam
2019-09-23T08:18:48.1284661495-001 sshd\[45507\]: Invalid user lilian from 14.215.46.94 port 35293
2019-09-23T08:18:48.1347981495-001 sshd\[45507\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=14.215.46.94
2019-09-23T08:18:50.3885841495-001 sshd\[45507\]: Failed password for invalid user lilian from 14.215.46.94 port 35293 ssh2
2019-09-23T08:31:21.8787411495-001 sshd\[46465\]: Invalid user samba from 14.215.46.94 port 57504
2019-09-23T08:31:21.8823371495-001 sshd\[46465\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=14.215.46.94
2019-09-23T08:31:23.5087291495-001 sshd\[46465\]: Failed password for invalid user samba from 14.215.46.94 port 57504 ssh2
...
2019-09-23 22:10:57
173.234.57.210 attack
173.234.57.210 - - [23/Sep/2019:08:20:05 -0400] "GET /?page=products&action=view&manufacturerID=1&productID=../../../etc/passwd%00&linkID=3128 HTTP/1.1" 302 - "https://baldwinbrasshardware.com/?page=products&action=view&manufacturerID=1&productID=../../../etc/passwd%00&linkID=3128" "Mozilla/5.0 (Windows NT 10.0; WOW64; Rv:50.0) Gecko/20100101 Firefox/50.0"
...
2019-09-23 22:59:23

Recently Reported IPs

239.34.157.24 78.114.236.193 235.204.148.75 76.11.61.95
213.109.54.136 107.31.207.164 159.181.155.198 215.25.57.182
234.93.168.168 4.236.23.161 201.55.158.215 146.185.230.128
212.255.162.96 6.110.17.99 17.157.208.133 179.56.54.254
242.185.218.42 221.192.47.7 147.163.40.28 120.237.115.11