Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Viet Nam

Internet Service Provider: Vietnam Posts and Telecommunications Group

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
Type Details Datetime
attackbotsspam
Automatic report - Port Scan Attack
2020-08-19 22:11:18
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 14.169.137.93
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 32950
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;14.169.137.93.			IN	A

;; AUTHORITY SECTION:
.			229	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2020081900 1800 900 604800 86400

;; Query time: 80 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Aug 19 22:11:06 CST 2020
;; MSG SIZE  rcvd: 117
Host info
93.137.169.14.in-addr.arpa domain name pointer static.vnpt.vn.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
93.137.169.14.in-addr.arpa	name = static.vnpt.vn.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
222.161.221.230 attackspam
abuse-sasl
2019-09-07 17:34:30
122.114.78.114 attack
Sep  7 13:25:46 www4 sshd\[63937\]: Invalid user tester from 122.114.78.114
Sep  7 13:25:46 www4 sshd\[63937\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.114.78.114
Sep  7 13:25:48 www4 sshd\[63937\]: Failed password for invalid user tester from 122.114.78.114 port 39304 ssh2
...
2019-09-07 18:27:17
37.59.37.69 attackspam
Sep  7 07:06:00 taivassalofi sshd[16572]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=37.59.37.69
Sep  7 07:06:02 taivassalofi sshd[16572]: Failed password for invalid user user from 37.59.37.69 port 51636 ssh2
...
2019-09-07 17:25:34
203.106.166.45 attackspam
Sep  6 23:55:48 xtremcommunity sshd\[13290\]: Invalid user ftp123 from 203.106.166.45 port 36408
Sep  6 23:55:48 xtremcommunity sshd\[13290\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=203.106.166.45
Sep  6 23:55:50 xtremcommunity sshd\[13290\]: Failed password for invalid user ftp123 from 203.106.166.45 port 36408 ssh2
Sep  7 00:01:06 xtremcommunity sshd\[13470\]: Invalid user default from 203.106.166.45 port 58119
Sep  7 00:01:06 xtremcommunity sshd\[13470\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=203.106.166.45
...
2019-09-07 18:43:09
200.141.196.75 attackbotsspam
Unauthorized connection attempt from IP address 200.141.196.75 on Port 445(SMB)
2019-09-07 18:25:09
51.255.168.30 attackbots
Sep  6 23:13:39 kapalua sshd\[1150\]: Invalid user jenkins@321 from 51.255.168.30
Sep  6 23:13:39 kapalua sshd\[1150\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=30.ip-51-255-168.eu
Sep  6 23:13:41 kapalua sshd\[1150\]: Failed password for invalid user jenkins@321 from 51.255.168.30 port 35546 ssh2
Sep  6 23:17:37 kapalua sshd\[1478\]: Invalid user 123456789 from 51.255.168.30
Sep  6 23:17:37 kapalua sshd\[1478\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=30.ip-51-255-168.eu
2019-09-07 17:19:09
51.254.210.53 attackbotsspam
Sep  7 03:25:31 pkdns2 sshd\[8957\]: Invalid user webuser from 51.254.210.53Sep  7 03:25:32 pkdns2 sshd\[8957\]: Failed password for invalid user webuser from 51.254.210.53 port 37256 ssh2Sep  7 03:29:36 pkdns2 sshd\[9077\]: Invalid user sammy from 51.254.210.53Sep  7 03:29:38 pkdns2 sshd\[9077\]: Failed password for invalid user sammy from 51.254.210.53 port 53042 ssh2Sep  7 03:33:44 pkdns2 sshd\[9268\]: Invalid user test from 51.254.210.53Sep  7 03:33:46 pkdns2 sshd\[9268\]: Failed password for invalid user test from 51.254.210.53 port 40600 ssh2
...
2019-09-07 17:30:12
61.155.234.38 attackspam
SSH-BruteForce
2019-09-07 17:39:34
176.192.125.74 attack
Unauthorized connection attempt from IP address 176.192.125.74 on Port 445(SMB)
2019-09-07 18:32:52
50.209.176.166 attack
Sep  7 09:09:24 icinga sshd[2022]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=50.209.176.166 
Sep  7 09:09:26 icinga sshd[2022]: Failed password for invalid user admin from 50.209.176.166 port 36624 ssh2
Sep  7 09:21:56 icinga sshd[9619]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=50.209.176.166 
...
2019-09-07 17:28:42
121.166.187.237 attackbots
Sep  4 16:50:06 itv-usvr-01 sshd[25963]: Invalid user yac from 121.166.187.237
Sep  4 16:50:06 itv-usvr-01 sshd[25963]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.166.187.237
Sep  4 16:50:06 itv-usvr-01 sshd[25963]: Invalid user yac from 121.166.187.237
Sep  4 16:50:08 itv-usvr-01 sshd[25963]: Failed password for invalid user yac from 121.166.187.237 port 37504 ssh2
Sep  4 16:54:49 itv-usvr-01 sshd[26161]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.166.187.237  user=root
Sep  4 16:54:51 itv-usvr-01 sshd[26161]: Failed password for root from 121.166.187.237 port 55608 ssh2
2019-09-07 17:41:08
184.55.218.3 attack
Fail2Ban Ban Triggered
HTTP SQL Injection Attempt
2019-09-07 17:31:57
200.111.175.252 attackbotsspam
Sep  7 11:20:14 bouncer sshd\[20284\]: Invalid user www from 200.111.175.252 port 55116
Sep  7 11:20:14 bouncer sshd\[20284\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=200.111.175.252 
Sep  7 11:20:16 bouncer sshd\[20284\]: Failed password for invalid user www from 200.111.175.252 port 55116 ssh2
...
2019-09-07 17:52:25
121.254.179.10 attackbots
port scan and connect, tcp 80 (http)
2019-09-07 18:04:04
111.230.29.17 attack
Automatic report - Banned IP Access
2019-09-07 17:23:10

Recently Reported IPs

22.179.48.192 7.27.200.240 219.48.221.69 11.40.118.56
125.123.81.247 130.206.120.198 103.35.137.125 172.253.93.182
122.62.50.165 13.108.182.205 29.100.203.209 26.91.137.6
246.197.215.8 14.181.4.167 187.44.86.102 98.176.63.114
113.121.23.202 115.135.221.204 89.163.212.110 171.221.15.171