Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Hanoi

Region: Ha Noi

Country: Vietnam

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 14.189.50.119
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 4088
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;14.189.50.119.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025062701 1800 900 604800 86400

;; Query time: 39 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Jun 28 02:09:03 CST 2025
;; MSG SIZE  rcvd: 106
Host info
119.50.189.14.in-addr.arpa domain name pointer static.vnpt.vn.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
119.50.189.14.in-addr.arpa	name = static.vnpt.vn.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
190.221.81.6 attackbots
$f2bV_matches
2019-12-08 19:43:00
139.219.0.20 attack
Lines containing failures of 139.219.0.20
Dec  7 21:37:57 icinga sshd[9627]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.219.0.20  user=games
Dec  7 21:37:59 icinga sshd[9627]: Failed password for games from 139.219.0.20 port 51288 ssh2
Dec  7 21:37:59 icinga sshd[9627]: Received disconnect from 139.219.0.20 port 51288:11: Bye Bye [preauth]
Dec  7 21:37:59 icinga sshd[9627]: Disconnected from authenticating user games 139.219.0.20 port 51288 [preauth]
Dec  7 21:46:26 icinga sshd[11932]: Invalid user ibisate from 139.219.0.20 port 59248
Dec  7 21:46:26 icinga sshd[11932]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.219.0.20
Dec  7 21:46:28 icinga sshd[11932]: Failed password for invalid user ibisate from 139.219.0.20 port 59248 ssh2
Dec  7 21:46:28 icinga sshd[11932]: Received disconnect from 139.219.0.20 port 59248:11: Bye Bye [preauth]
Dec  7 21:46:28 icinga sshd[11932]: Disc........
------------------------------
2019-12-08 19:37:55
37.120.33.30 attackspambots
fail2ban
2019-12-08 19:38:47
157.230.58.196 attackbots
Dec  8 01:04:18 eddieflores sshd\[10097\]: Invalid user aplusbiz123 from 157.230.58.196
Dec  8 01:04:18 eddieflores sshd\[10097\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.230.58.196
Dec  8 01:04:19 eddieflores sshd\[10097\]: Failed password for invalid user aplusbiz123 from 157.230.58.196 port 46092 ssh2
Dec  8 01:09:46 eddieflores sshd\[10897\]: Invalid user gasul from 157.230.58.196
Dec  8 01:09:46 eddieflores sshd\[10897\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.230.58.196
2019-12-08 19:12:59
77.103.0.227 attack
Dec  8 11:21:05 cvbnet sshd[24968]: Failed password for root from 77.103.0.227 port 54252 ssh2
...
2019-12-08 19:29:27
86.121.129.65 attack
CloudCIX Reconnaissance Scan Detected, PTR: 86-121-129-65.rdsnet.ro.
2019-12-08 19:26:06
222.186.42.4 attack
Dec  8 12:37:09 sd-53420 sshd\[15172\]: User root from 222.186.42.4 not allowed because none of user's groups are listed in AllowGroups
Dec  8 12:37:10 sd-53420 sshd\[15172\]: Failed none for invalid user root from 222.186.42.4 port 16002 ssh2
Dec  8 12:37:10 sd-53420 sshd\[15172\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.42.4  user=root
Dec  8 12:37:12 sd-53420 sshd\[15172\]: Failed password for invalid user root from 222.186.42.4 port 16002 ssh2
Dec  8 12:37:16 sd-53420 sshd\[15172\]: Failed password for invalid user root from 222.186.42.4 port 16002 ssh2
...
2019-12-08 19:39:12
122.165.207.221 attackbots
Dec  8 09:49:21 ns382633 sshd\[2763\]: Invalid user sandeep from 122.165.207.221 port 28870
Dec  8 09:49:21 ns382633 sshd\[2763\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.165.207.221
Dec  8 09:49:23 ns382633 sshd\[2763\]: Failed password for invalid user sandeep from 122.165.207.221 port 28870 ssh2
Dec  8 09:56:26 ns382633 sshd\[4607\]: Invalid user client from 122.165.207.221 port 45314
Dec  8 09:56:26 ns382633 sshd\[4607\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.165.207.221
2019-12-08 19:32:05
14.162.158.234 attack
$f2bV_matches
2019-12-08 19:14:10
49.51.9.216 attackspambots
port scan and connect, tcp 8008 (http)
2019-12-08 19:23:41
202.107.188.197 attackbotsspam
DATE:2019-12-08 07:27:04, IP:202.107.188.197, PORT:telnet - Telnet brute force auth on a honeypot server (epe-dc)
2019-12-08 19:10:27
36.33.26.31 attackbotsspam
Host Scan
2019-12-08 19:35:56
67.214.122.78 attack
Dec  8 09:41:41 heissa sshd\[29573\]: Invalid user lisa from 67.214.122.78 port 56156
Dec  8 09:41:41 heissa sshd\[29573\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=67.214.122.78
Dec  8 09:41:43 heissa sshd\[29573\]: Failed password for invalid user lisa from 67.214.122.78 port 56156 ssh2
Dec  8 09:49:18 heissa sshd\[30792\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=67.214.122.78  user=root
Dec  8 09:49:20 heissa sshd\[30792\]: Failed password for root from 67.214.122.78 port 33923 ssh2
2019-12-08 19:16:11
144.217.214.100 attack
SSH Brute-Forcing (ownc)
2019-12-08 19:20:25
69.94.131.71 attack
Email Spam
2019-12-08 19:34:28

Recently Reported IPs

14.232.139.108 139.225.105.204 14.167.163.130 136.125.196.223
136.70.68.25 136.186.175.71 135.201.86.172 135.179.244.43
135.154.33.193 135.142.5.230 133.89.33.228 137.104.238.41
133.6.172.118 132.4.48.49 133.34.86.124 136.219.96.140
133.187.44.148 131.37.39.180 132.103.72.60 131.230.71.171