Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Nhi Khe

Region: Hanoi

Country: Vietnam

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 14.166.119.44
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 44752
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;14.166.119.44.			IN	A

;; AUTHORITY SECTION:
.			420	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2020090301 1800 900 604800 86400

;; Query time: 112 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Sep 04 08:44:56 CST 2020
;; MSG SIZE  rcvd: 117
Host info
44.119.166.14.in-addr.arpa domain name pointer static.vnpt.vn.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
44.119.166.14.in-addr.arpa	name = static.vnpt.vn.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
151.80.41.124 attackspam
Dec  9 19:47:46 sauna sshd[85082]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=151.80.41.124
Dec  9 19:47:49 sauna sshd[85082]: Failed password for invalid user 111111 from 151.80.41.124 port 52088 ssh2
...
2019-12-10 02:00:43
218.92.0.148 attack
web-1 [ssh] SSH Attack
2019-12-10 01:32:32
189.79.255.85 attack
Automatic report - Port Scan Attack
2019-12-10 01:52:21
118.25.103.132 attackspambots
2019-12-07 08:17:01 server sshd[35896]: Failed password for invalid user riitta from 118.25.103.132 port 42482 ssh2
2019-12-10 01:33:44
106.38.108.28 attackbots
MultiHost/MultiPort Probe, Scan, Hack -
2019-12-10 01:37:47
110.77.148.62 attackspambots
[munged]::80 110.77.148.62 - - [09/Dec/2019:16:02:45 +0100] "POST /[munged]: HTTP/1.1" 200 3861 "http://[munged]:/[munged]:" "Mozilla/5.0 (Windows NT 6.1; rv:60.0) Gecko/20100101 Firefox/60.0"
[munged]::80 110.77.148.62 - - [09/Dec/2019:16:02:46 +0100] "POST /[munged]: HTTP/1.1" 200 3860 "http://[munged]:/[munged]:" "Mozilla/5.0 (Windows NT 6.1; rv:60.0) Gecko/20100101 Firefox/60.0"
[munged]::80 110.77.148.62 - - [09/Dec/2019:16:02:47 +0100] "POST /[munged]: HTTP/1.1" 200 3860 "http://[munged]:/[munged]:" "Mozilla/5.0 (Windows NT 6.1; rv:60.0) Gecko/20100101 Firefox/60.0"
[munged]::80 110.77.148.62 - - [09/Dec/2019:16:02:48 +0100] "POST /[munged]: HTTP/1.1" 200 3860 "http://[munged]:/[munged]:" "Mozilla/5.0 (Windows NT 6.1; rv:60.0) Gecko/20100101 Firefox/60.0"
[munged]::80 110.77.148.62 - - [09/Dec/2019:16:02:49 +0100] "POST /[munged]: HTTP/1.1" 200 3860 "http://[munged]:/[munged]:" "Mozilla/5.0 (Windows NT 6.1; rv:60.0) Gecko/20100101 Firefox/60.0"
[munged]::80 110.77.148.62 - - [09/Dec/2019:16:02:49 +0100]
2019-12-10 01:56:06
105.186.67.70 attackspam
Unauthorized connection attempt detected from IP address 105.186.67.70 to port 445
2019-12-10 01:58:24
106.54.3.80 attackspam
$f2bV_matches
2019-12-10 01:51:27
106.12.60.137 attackspambots
2019-12-09T16:18:33.279352homeassistant sshd[17679]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.60.137  user=root
2019-12-09T16:18:34.912762homeassistant sshd[17679]: Failed password for root from 106.12.60.137 port 36348 ssh2
...
2019-12-10 01:41:27
167.71.242.140 attackspambots
Dec  9 17:53:16 vtv3 sshd[2412]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.71.242.140 
Dec  9 17:53:18 vtv3 sshd[2412]: Failed password for invalid user gilleland from 167.71.242.140 port 41500 ssh2
Dec  9 18:03:02 vtv3 sshd[7027]: Failed password for sync from 167.71.242.140 port 54834 ssh2
Dec  9 18:13:35 vtv3 sshd[11918]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.71.242.140 
Dec  9 18:13:37 vtv3 sshd[11918]: Failed password for invalid user rist from 167.71.242.140 port 46414 ssh2
Dec  9 18:19:00 vtv3 sshd[14372]: Failed password for root from 167.71.242.140 port 56322 ssh2
Dec  9 18:29:48 vtv3 sshd[19851]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.71.242.140 
Dec  9 18:29:50 vtv3 sshd[19851]: Failed password for invalid user tokubei from 167.71.242.140 port 47906 ssh2
Dec  9 18:35:17 vtv3 sshd[22994]: Failed password for root from 167.71.242.140 port 57812 s
2019-12-10 01:46:54
111.42.103.19 attackspam
Mirai and Reaper Exploitation Traffic
2019-12-10 01:51:06
106.13.162.168 attack
MultiHost/MultiPort Probe, Scan, Hack -
2019-12-10 01:53:58
177.250.0.97 attack
Dec  9 17:42:04 thevastnessof sshd[16069]: Failed password for root from 177.250.0.97 port 21729 ssh2
...
2019-12-10 01:42:55
2.16.106.168 attack
12/09/2019-16:03:24.479288 2.16.106.168 Protocol: 6 SURICATA TLS invalid record/traffic
2019-12-10 01:24:02
129.28.188.115 attack
Dec  9 16:03:01 MK-Soft-VM5 sshd[18760]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.28.188.115 
Dec  9 16:03:03 MK-Soft-VM5 sshd[18760]: Failed password for invalid user webmaster from 129.28.188.115 port 51736 ssh2
...
2019-12-10 01:46:14

Recently Reported IPs

147.52.99.144 221.109.219.38 168.101.90.147 14.92.232.40
219.98.6.161 201.149.54.90 222.135.3.85 78.215.50.101
222.247.33.101 190.104.119.237 178.65.243.33 173.167.239.1
5.35.93.101 213.31.175.155 61.163.39.39 207.172.58.228
71.79.4.176 216.155.157.187 212.52.221.19 141.157.155.82