Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Viet Nam

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
IP Type Details Datetime
14.168.99.4 attack
unauthorized connection attempt
2020-02-07 15:57:36
14.168.99.4 attackbotsspam
Automatic report - Port Scan Attack
2020-01-11 18:47:48
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 14.168.99.212
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 40639
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;14.168.99.212.			IN	A

;; AUTHORITY SECTION:
.			351	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022020702 1800 900 604800 86400

;; Query time: 19 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Feb 08 14:43:44 CST 2022
;; MSG SIZE  rcvd: 106
Host info
212.99.168.14.in-addr.arpa domain name pointer static.vnpt.vn.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
212.99.168.14.in-addr.arpa	name = static.vnpt.vn.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
35.221.135.90 attackspambots
firewall-block, port(s): 3389/tcp
2019-12-31 05:48:19
106.13.72.95 attackbots
Dec 30 21:36:13 haigwepa sshd[22294]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.72.95 
Dec 30 21:36:15 haigwepa sshd[22294]: Failed password for invalid user sanjavier from 106.13.72.95 port 51366 ssh2
...
2019-12-31 05:31:37
202.51.178.126 attackbotsspam
proto=tcp  .  spt=41312  .  dpt=25  .     (Found on   Dark List de Dec 30)     (441)
2019-12-31 05:34:09
211.141.35.72 attackbots
Dec 30 21:08:34 sd-53420 sshd\[4027\]: User backup from 211.141.35.72 not allowed because none of user's groups are listed in AllowGroups
Dec 30 21:08:34 sd-53420 sshd\[4027\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=211.141.35.72  user=backup
Dec 30 21:08:36 sd-53420 sshd\[4027\]: Failed password for invalid user backup from 211.141.35.72 port 38856 ssh2
Dec 30 21:12:25 sd-53420 sshd\[10640\]: User root from 211.141.35.72 not allowed because none of user's groups are listed in AllowGroups
Dec 30 21:12:25 sd-53420 sshd\[10640\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=211.141.35.72  user=root
...
2019-12-31 05:50:21
85.203.15.121 attack
\[2019-12-30 16:52:06\] NOTICE\[2839\] chan_sip.c: Registration from '\' failed for '85.203.15.121:64383' - Wrong password
\[2019-12-30 16:52:06\] SECURITY\[2857\] res_security_log.c: SecurityEvent="InvalidPassword",EventTV="2019-12-30T16:52:06.875-0500",Severity="Error",Service="SIP",EventVersion="2",AccountID="3682",SessionID="0x7f0fb48c2048",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/85.203.15.121/64383",Challenge="0d73e352",ReceivedChallenge="0d73e352",ReceivedHash="bf19357e73c27e2b2d9e0dd509ec4543"
\[2019-12-30 16:58:36\] NOTICE\[2839\] chan_sip.c: Registration from '\' failed for '85.203.15.121:62782' - Wrong password
\[2019-12-30 16:58:36\] SECURITY\[2857\] res_security_log.c: SecurityEvent="InvalidPassword",EventTV="2019-12-30T16:58:36.514-0500",Severity="Error",Service="SIP",EventVersion="2",AccountID="1538",SessionID="0x7f0fb48c2048",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/85.203.15
2019-12-31 06:05:03
112.85.42.172 attackspam
Dec 30 22:37:24 * sshd[26499]: Failed password for root from 112.85.42.172 port 31145 ssh2
Dec 30 22:37:36 * sshd[26499]: error: maximum authentication attempts exceeded for root from 112.85.42.172 port 31145 ssh2 [preauth]
2019-12-31 05:43:21
117.48.208.71 attack
Unauthorized connection attempt detected from IP address 117.48.208.71 to port 22
2019-12-31 05:31:06
87.196.80.7 attack
[Aegis] @ 2019-12-30 20:12:08  0000 -> Multiple authentication failures.
2019-12-31 06:05:57
138.0.210.114 attackbots
proto=tcp  .  spt=51667  .  dpt=25  .     (Found on   Dark List de Dec 30)     (442)
2019-12-31 05:32:41
223.247.129.84 attackspam
Brute force attempt
2019-12-31 05:57:23
222.186.175.217 attack
SSH Brute-Force reported by Fail2Ban
2019-12-31 05:45:50
119.10.177.94 attackbotsspam
SPF Fail sender not permitted to send mail for @01com.com / Sent mail to target address hacked/leaked from abandonia in 2016
2019-12-31 05:58:10
114.67.84.229 attackbots
2019-12-30T21:23:31.757600shield sshd\[25536\]: Invalid user supp0rt33 from 114.67.84.229 port 49734
2019-12-30T21:23:31.762204shield sshd\[25536\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=114.67.84.229
2019-12-30T21:23:33.576425shield sshd\[25536\]: Failed password for invalid user supp0rt33 from 114.67.84.229 port 49734 ssh2
2019-12-30T21:27:25.444842shield sshd\[25920\]: Invalid user server from 114.67.84.229 port 52588
2019-12-30T21:27:25.449200shield sshd\[25920\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=114.67.84.229
2019-12-31 05:30:23
94.247.16.29 attack
SPF Fail sender not permitted to send mail for @1888sunroom.com / Sent mail to target address hacked/leaked from abandonia in 2016
2019-12-31 05:42:17
106.13.234.36 attackbots
Dec 30 22:45:59 [host] sshd[3107]: Invalid user gpadmin from 106.13.234.36
Dec 30 22:45:59 [host] sshd[3107]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.234.36
Dec 30 22:46:01 [host] sshd[3107]: Failed password for invalid user gpadmin from 106.13.234.36 port 44651 ssh2
2019-12-31 06:06:57

Recently Reported IPs

31.150.117.234 183.88.215.159 141.164.57.199 172.81.60.189
69.16.157.36 201.150.182.73 1.15.77.194 117.223.90.39
117.251.56.77 74.123.190.2 115.56.146.164 3.96.148.193
147.75.118.249 194.169.193.18 175.197.125.125 41.220.29.218
186.101.233.58 82.165.224.94 191.53.198.157 45.183.92.243