Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Viet Nam

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 14.190.157.120
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 31704
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;14.190.157.120.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025021900 1800 900 604800 86400

;; Query time: 10 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Feb 19 23:13:30 CST 2025
;; MSG SIZE  rcvd: 107
Host info
120.157.190.14.in-addr.arpa domain name pointer static.vnpt.vn.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
120.157.190.14.in-addr.arpa	name = static.vnpt.vn.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
153.148.47.183 attackspam
Invalid user ctrls from 153.148.47.183 port 50396
2020-02-19 08:40:32
35.236.182.219 attack
Invalid user ubuntu from 35.236.182.219 port 38158
2020-02-19 09:12:29
218.244.158.69 attack
Time:     Tue Feb 18 18:47:50 2020 -0300
IP:       218.244.158.69 (CN/China/-)
Failures: 10 (ftpd)
Interval: 3600 seconds
Blocked:  Permanent Block
2020-02-19 08:39:35
108.160.199.217 attackbotsspam
SSH brute force
2020-02-19 08:49:57
196.203.31.154 attackbots
Invalid user ubuntu from 196.203.31.154 port 34646
2020-02-19 08:42:44
192.99.56.117 attack
Invalid user ubuntu from 192.99.56.117 port 51620
2020-02-19 08:43:05
183.82.149.102 attack
Tried sshing with brute force.
2020-02-19 08:59:14
134.175.68.129 attackspambots
Feb 18 14:01:40 hpm sshd\[998\]: Invalid user MYUSER from 134.175.68.129
Feb 18 14:01:40 hpm sshd\[998\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.175.68.129
Feb 18 14:01:42 hpm sshd\[998\]: Failed password for invalid user MYUSER from 134.175.68.129 port 54428 ssh2
Feb 18 14:05:11 hpm sshd\[1332\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.175.68.129  user=bin
Feb 18 14:05:13 hpm sshd\[1332\]: Failed password for bin from 134.175.68.129 port 55112 ssh2
2020-02-19 08:30:52
31.45.69.174 attackspambots
Invalid user riehm from 31.45.69.174 port 38804
2020-02-19 09:13:07
118.190.88.147 attack
Invalid user user from 118.190.88.147 port 45004
2020-02-19 08:49:45
121.157.82.202 attackspambots
Invalid user yuanwd from 121.157.82.202 port 40098
2020-02-19 09:02:29
103.219.112.47 attackbots
Tried sshing with brute force.
2020-02-19 08:36:50
78.148.46.129 attackbotsspam
Invalid user test3 from 78.148.46.129 port 39988
2020-02-19 09:07:47
46.214.137.44 attackspambots
Unauthorized connection attempt from IP address 46.214.137.44 on Port 445(SMB)
2020-02-19 08:27:15
120.79.255.199 attack
Invalid user user from 120.79.255.199 port 53316
2020-02-19 08:41:06

Recently Reported IPs

30.99.255.18 97.197.250.46 18.41.46.7 219.133.27.169
145.174.50.4 238.124.139.42 180.149.111.17 99.53.21.142
8.210.1.84 202.4.251.32 84.213.245.104 117.152.194.57
18.198.68.16 166.170.228.180 124.72.211.141 108.191.146.100
177.61.49.156 67.221.19.105 200.137.196.249 21.100.249.236