Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Ho Chi Minh City

Region: Ho Chi Minh

Country: Vietnam

Internet Service Provider: Vietnam Posts and Telecommunications Group

Hostname: unknown

Organization: VNPT Corp

Usage Type: unknown

Comments:
Type Details Datetime
attackspambots
Jul  3 15:14:49 iago sshd[17448]: Address 14.169.99.106 maps to static.vnpt.vn, but this does not map back to the address - POSSIBLE BREAK-IN ATTEMPT!
Jul  3 15:14:49 iago sshd[17448]: Invalid user admin from 14.169.99.106
Jul  3 15:14:49 iago sshd[17448]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=14.169.99.106 


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=14.169.99.106
2019-07-04 01:31:49
Comments on same subnet:
IP Type Details Datetime
14.169.99.179 attack
$f2bV_matches
2020-09-26 03:16:20
14.169.99.179 attack
$f2bV_matches
2020-09-25 19:06:11
14.169.99.199 attackspambots
Feb 10 16:09:52 mailman postfix/smtpd[7120]: warning: unknown[14.169.99.199]: SASL PLAIN authentication failed: authentication failure
2020-02-11 10:05:57
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 14.169.99.106
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 6054
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;14.169.99.106.			IN	A

;; AUTHORITY SECTION:
.			3600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019070302 1800 900 604800 86400

;; Query time: 2 msec
;; SERVER: 67.207.67.2#53(67.207.67.2)
;; WHEN: Thu Jul 04 01:31:42 CST 2019
;; MSG SIZE  rcvd: 117
Host info
106.99.169.14.in-addr.arpa domain name pointer static.vnpt.vn.
Nslookup info:
Server:		67.207.67.2
Address:	67.207.67.2#53

Non-authoritative answer:
106.99.169.14.in-addr.arpa	name = static.vnpt.vn.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
90.189.117.121 attackbotsspam
Mar 27 00:34:30 vpn01 sshd[25271]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=90.189.117.121
Mar 27 00:34:31 vpn01 sshd[25271]: Failed password for invalid user vwv from 90.189.117.121 port 37234 ssh2
...
2020-03-27 07:49:39
167.114.211.94 attack
[portscan] Port scan
2020-03-27 08:05:04
189.202.204.237 attackspambots
2020-03-26T23:23:59.775083shield sshd\[29090\]: Invalid user shachunyang from 189.202.204.237 port 57986
2020-03-26T23:23:59.782814shield sshd\[29090\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=237.189-202-204.bestelclientes.com.mx
2020-03-26T23:24:01.605537shield sshd\[29090\]: Failed password for invalid user shachunyang from 189.202.204.237 port 57986 ssh2
2020-03-26T23:32:23.349571shield sshd\[30698\]: Invalid user jeff from 189.202.204.237 port 38083
2020-03-26T23:32:23.358901shield sshd\[30698\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=237.189-202-204.bestelclientes.com.mx
2020-03-27 07:55:24
170.130.187.6 attack
Unauthorized connection attempt detected from IP address 170.130.187.6 to port 2048
2020-03-27 07:58:42
81.170.239.2 attackspam
81.170.239.2 - - \[26/Mar/2020:22:17:43 +0100\] "POST /wp-login.php HTTP/1.0" 200 4404 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0"
81.170.239.2 - - \[26/Mar/2020:22:17:44 +0100\] "POST /wp-login.php HTTP/1.0" 200 4236 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0"
81.170.239.2 - - \[26/Mar/2020:22:17:44 +0100\] "POST /xmlrpc.php HTTP/1.0" 200 736 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0"
2020-03-27 07:58:19
119.47.90.197 attack
Invalid user install from 119.47.90.197 port 36810
2020-03-27 07:44:13
104.199.216.0 attackspam
CMS (WordPress or Joomla) login attempt.
2020-03-27 08:11:45
163.172.191.141 attackspambots
Invalid user yan from 163.172.191.141 port 52054
2020-03-27 08:15:34
211.22.154.223 attackbots
Invalid user simulation from 211.22.154.223 port 53828
2020-03-27 08:16:15
106.13.107.106 attackbots
Invalid user bw from 106.13.107.106 port 35780
2020-03-27 07:51:17
142.93.56.12 attackspambots
Invalid user ky from 142.93.56.12 port 46356
2020-03-27 07:50:27
194.26.69.106 attack
Mar 27 00:48:42 debian-2gb-nbg1-2 kernel: \[7525595.721364\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=194.26.69.106 DST=195.201.40.59 LEN=40 TOS=0x08 PREC=0x00 TTL=241 ID=4274 PROTO=TCP SPT=55162 DPT=7847 WINDOW=1024 RES=0x00 SYN URGP=0
2020-03-27 07:52:25
222.186.15.158 attack
[MK-Root1] SSH login failed
2020-03-27 07:53:33
61.243.39.70 attackbots
port scan and connect, tcp 1433 (ms-sql-s)
2020-03-27 07:56:14
115.68.184.88 attack
Scanned 6 times in the last 24 hours on port 22
2020-03-27 08:19:51

Recently Reported IPs

115.192.180.151 199.254.96.251 113.90.232.89 116.22.92.191
47.254.135.232 161.128.85.132 52.184.29.61 87.29.150.123
98.196.40.40 52.32.215.247 2001:268:c1c0:9842:a985:b2d8:804d:985b 122.52.37.191
59.53.182.34 179.5.76.150 154.125.43.157 176.16.154.107
97.210.110.74 178.204.57.84 8.199.63.209 219.94.67.254