Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Viet Nam

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 14.189.68.130
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 35146
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;14.189.68.130.			IN	A

;; AUTHORITY SECTION:
.			352	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022020700 1800 900 604800 86400

;; Query time: 17 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Feb 08 00:56:48 CST 2022
;; MSG SIZE  rcvd: 106
Host info
130.68.189.14.in-addr.arpa domain name pointer static.vnpt.vn.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
130.68.189.14.in-addr.arpa	name = static.vnpt.vn.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
150.109.99.243 attackbotsspam
Jun 15 14:21:12 jane sshd[28668]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=150.109.99.243 
Jun 15 14:21:14 jane sshd[28668]: Failed password for invalid user natural from 150.109.99.243 port 55586 ssh2
...
2020-06-15 21:27:23
183.47.50.8 attackspam
Jun 15 06:10:44 server1 sshd\[8534\]: Invalid user jordan from 183.47.50.8
Jun 15 06:10:45 server1 sshd\[8534\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=183.47.50.8 
Jun 15 06:10:50 server1 sshd\[8534\]: Failed password for invalid user jordan from 183.47.50.8 port 48580 ssh2
Jun 15 06:11:57 server1 sshd\[8754\]: Invalid user dong from 183.47.50.8
Jun 15 06:12:00 server1 sshd\[8754\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=183.47.50.8 
Jun 15 06:12:02 server1 sshd\[8754\]: Failed password for invalid user dong from 183.47.50.8 port 54960 ssh2
Jun 15 06:13:14 server1 sshd\[9019\]: Invalid user ftpuser2 from 183.47.50.8
Jun 15 06:13:16 server1 sshd\[9019\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=183.47.50.8 
Jun 15 06:13:18 server1 sshd\[9019\]: Failed password for invalid user ftpuser2 from 183.47.50.8 port 61339 ssh2
Jun 15 06:14:26 server1 sshd\[9527\]: In
2020-06-15 21:17:25
111.170.228.121 attackbots
Jun 15 08:13:19 esmtp postfix/smtpd[28187]: lost connection after AUTH from unknown[111.170.228.121]
Jun 15 08:13:21 esmtp postfix/smtpd[28187]: lost connection after AUTH from unknown[111.170.228.121]
Jun 15 08:13:23 esmtp postfix/smtpd[28187]: lost connection after AUTH from unknown[111.170.228.121]
Jun 15 08:13:25 esmtp postfix/smtpd[28187]: lost connection after AUTH from unknown[111.170.228.121]
Jun 15 08:13:27 esmtp postfix/smtpd[28187]: lost connection after AUTH from unknown[111.170.228.121]

........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=111.170.228.121
2020-06-15 21:22:24
222.186.173.201 attackspambots
2020-06-15T14:59:28.856354rocketchat.forhosting.nl sshd[23330]: Failed password for root from 222.186.173.201 port 4250 ssh2
2020-06-15T14:59:31.578004rocketchat.forhosting.nl sshd[23330]: Failed password for root from 222.186.173.201 port 4250 ssh2
2020-06-15T14:59:35.836556rocketchat.forhosting.nl sshd[23330]: Failed password for root from 222.186.173.201 port 4250 ssh2
...
2020-06-15 21:02:50
106.12.28.157 attackbotsspam
Jun 15 15:08:32 legacy sshd[8072]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.28.157
Jun 15 15:08:34 legacy sshd[8072]: Failed password for invalid user admin from 106.12.28.157 port 54946 ssh2
Jun 15 15:09:53 legacy sshd[8130]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.28.157
...
2020-06-15 21:13:55
222.186.180.223 attack
2020-06-15T14:46:52.260352rocketchat.forhosting.nl sshd[23185]: Failed password for root from 222.186.180.223 port 64928 ssh2
2020-06-15T14:46:56.315837rocketchat.forhosting.nl sshd[23185]: Failed password for root from 222.186.180.223 port 64928 ssh2
2020-06-15T14:47:01.776866rocketchat.forhosting.nl sshd[23185]: Failed password for root from 222.186.180.223 port 64928 ssh2
...
2020-06-15 20:58:00
103.206.61.128 attackbotsspam
Unauthorised access (Jun 15) SRC=103.206.61.128 LEN=52 TTL=114 ID=7586 DF TCP DPT=445 WINDOW=8192 SYN
2020-06-15 21:21:18
157.230.41.242 attackbotsspam
Jun 15 14:21:19 vpn01 sshd[2472]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.230.41.242
Jun 15 14:21:21 vpn01 sshd[2472]: Failed password for invalid user support from 157.230.41.242 port 57548 ssh2
...
2020-06-15 21:18:15
106.54.127.61 attackspam
Jun 15 13:24:09 onepixel sshd[1178719]: Invalid user vts from 106.54.127.61 port 54676
Jun 15 13:24:09 onepixel sshd[1178719]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.54.127.61 
Jun 15 13:24:09 onepixel sshd[1178719]: Invalid user vts from 106.54.127.61 port 54676
Jun 15 13:24:10 onepixel sshd[1178719]: Failed password for invalid user vts from 106.54.127.61 port 54676 ssh2
Jun 15 13:28:58 onepixel sshd[1179272]: Invalid user om from 106.54.127.61 port 48106
2020-06-15 21:42:47
95.107.199.90 attackbotsspam
DATE:2020-06-15 14:21:21, IP:95.107.199.90, PORT:5900 VNC brute force auth on honeypot server (epe-honey1-hq)
2020-06-15 21:14:24
179.53.207.222 attack
Jun 15 13:46:28 m1 sshd[14262]: Failed password for r.r from 179.53.207.222 port 45482 ssh2
Jun 15 14:15:35 m1 sshd[26723]: Invalid user admin from 179.53.207.222
Jun 15 14:15:37 m1 sshd[26723]: Failed password for invalid user admin from 179.53.207.222 port 57850 ssh2


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=179.53.207.222
2020-06-15 21:39:07
115.231.221.129 attackbots
Jun 15 13:22:00 django-0 sshd\[8165\]: Failed password for root from 115.231.221.129 port 52166 ssh2Jun 15 13:25:43 django-0 sshd\[8276\]: Failed password for root from 115.231.221.129 port 40200 ssh2Jun 15 13:29:23 django-0 sshd\[8361\]: Invalid user zmh from 115.231.221.129
...
2020-06-15 21:34:13
27.22.9.173 attackbotsspam
Jun 15 08:15:50 esmtp postfix/smtpd[28253]: lost connection after AUTH from unknown[27.22.9.173]
Jun 15 08:15:51 esmtp postfix/smtpd[28118]: lost connection after AUTH from unknown[27.22.9.173]
Jun 15 08:15:53 esmtp postfix/smtpd[28131]: lost connection after AUTH from unknown[27.22.9.173]
Jun 15 08:15:56 esmtp postfix/smtpd[28099]: lost connection after AUTH from unknown[27.22.9.173]
Jun 15 08:15:59 esmtp postfix/smtpd[28248]: lost connection after AUTH from unknown[27.22.9.173]

........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=27.22.9.173
2020-06-15 21:45:11
193.112.50.203 attackbotsspam
Jun 15 14:56:45 mout sshd[17392]: Invalid user ysop from 193.112.50.203 port 10692
2020-06-15 21:13:25
209.107.210.172 attackspambots
Fail2Ban Ban Triggered
2020-06-15 21:45:28

Recently Reported IPs

66.212.17.162 120.85.93.171 115.59.11.240 222.89.21.254
103.42.126.124 160.251.51.127 103.153.76.131 202.150.144.242
110.155.174.220 154.159.247.82 60.2.221.43 88.248.140.53
182.119.52.71 61.183.87.194 91.243.227.19 37.113.157.226
218.173.229.66 112.94.100.20 90.77.143.200 114.231.215.111