Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Viet Nam

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 14.225.249.142
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 28230
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;14.225.249.142.			IN	A

;; AUTHORITY SECTION:
.			486	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022091400 1800 900 604800 86400

;; Query time: 27 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Sep 14 21:23:04 CST 2022
;; MSG SIZE  rcvd: 107
Host info
Host 142.249.225.14.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 142.249.225.14.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
145.239.88.184 attackbotsspam
2019-11-19T23:12:15.347646tmaserv sshd\[9368\]: Failed password for invalid user server from 145.239.88.184 port 59742 ssh2
2019-11-20T00:13:09.650950tmaserv sshd\[14710\]: Invalid user tech from 145.239.88.184 port 34788
2019-11-20T00:13:09.654244tmaserv sshd\[14710\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=184.ip-145-239-88.eu
2019-11-20T00:13:11.184373tmaserv sshd\[14710\]: Failed password for invalid user tech from 145.239.88.184 port 34788 ssh2
2019-11-20T00:16:48.667648tmaserv sshd\[15087\]: Invalid user rpm from 145.239.88.184 port 44944
2019-11-20T00:16:48.672176tmaserv sshd\[15087\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=184.ip-145-239-88.eu
...
2019-11-20 06:22:02
158.69.204.172 attack
Nov 20 00:08:36 server sshd\[7971\]: Invalid user kongdol from 158.69.204.172
Nov 20 00:08:36 server sshd\[7971\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=172.ip-158-69-204.net 
Nov 20 00:08:38 server sshd\[7971\]: Failed password for invalid user kongdol from 158.69.204.172 port 33564 ssh2
Nov 20 00:30:56 server sshd\[13676\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=172.ip-158-69-204.net  user=root
Nov 20 00:30:58 server sshd\[13676\]: Failed password for root from 158.69.204.172 port 55798 ssh2
...
2019-11-20 05:58:19
71.6.199.23 attack
" "
2019-11-20 06:27:14
222.186.175.182 attackspam
2019-11-19T22:17:18.872541abusebot-5.cloudsearch.cf sshd\[1724\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.175.182  user=root
2019-11-20 06:19:47
185.220.101.20 attack
Automatic report - Banned IP Access
2019-11-20 06:02:43
216.213.29.3 attackspam
(From projobnetwork2@outlook.com) I came across your website (https://www.highlandfamilycare.com/page/contact.html) and just wanted to reach
out to see if you're hiring? 

If so, I'd like to extend an offer to post to top job sites like
ZipRecruiter, Glassdoor, TopUSAJobs, and more at no cost
for two weeks. 

Here are some of the key benefits: 

-- Post to top job sites with one click 
-- Manage all candidates in one place 
-- No cost for two weeks 

You can post your job openings now by going to our website below: 

>> http://www.TryProJob.com

* Please use offer code 987FREE -- Expires Soon * 

Thanks for your time, 
Ryan C. 

Pro Job Network 
10451 Twin Rivers Rd #279 
Columbia, MD 21044 

To OPT OUT, please email ryanc [at] pjnmail [dot] com
with "REMOVE highlandfamilycare.com" in the subject line.
2019-11-20 06:12:40
185.176.27.254 attackbotsspam
11/19/2019-17:11:26.773475 185.176.27.254 Protocol: 6 ET SCAN NMAP -sS window 1024
2019-11-20 06:16:56
217.21.193.74 attackbotsspam
217.21.193.74 was recorded 5 times by 3 hosts attempting to connect to the following ports: 1194. Incident counter (4h, 24h, all-time): 5, 13, 200
2019-11-20 06:15:11
200.110.172.2 attackbots
2019-11-19T21:13:54.310451abusebot-8.cloudsearch.cf sshd\[31902\]: Invalid user b1uRR3 from 200.110.172.2 port 56130
2019-11-20 06:05:21
103.81.84.140 attackspambots
ft-1848-fussball.de 103.81.84.140 \[19/Nov/2019:23:18:16 +0100\] "POST /wp-login.php HTTP/1.1" 200 2905 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0"
ft-1848-fussball.de 103.81.84.140 \[19/Nov/2019:23:18:17 +0100\] "POST /wp-login.php HTTP/1.1" 200 2874 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0"
ft-1848-fussball.de 103.81.84.140 \[19/Nov/2019:23:18:18 +0100\] "POST /xmlrpc.php HTTP/1.1" 200 514 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0"
2019-11-20 06:33:50
193.70.33.75 attack
Nov 19 22:02:03 mail sshd[10620]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=193.70.33.75 
Nov 19 22:02:04 mail sshd[10620]: Failed password for invalid user torill from 193.70.33.75 port 43474 ssh2
Nov 19 22:09:56 mail sshd[11662]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=193.70.33.75
2019-11-20 06:04:24
158.69.194.212 attack
Fail2Ban Ban Triggered
2019-11-20 06:02:06
222.186.180.223 attack
Nov 19 22:56:33 mail sshd[17937]: Failed password for root from 222.186.180.223 port 64948 ssh2
Nov 19 22:56:39 mail sshd[17937]: Failed password for root from 222.186.180.223 port 64948 ssh2
Nov 19 22:56:45 mail sshd[17937]: Failed password for root from 222.186.180.223 port 64948 ssh2
Nov 19 22:56:51 mail sshd[17937]: Failed password for root from 222.186.180.223 port 64948 ssh2
2019-11-20 06:02:26
52.162.239.76 attackspam
Nov 19 22:13:53 * sshd[32119]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=52.162.239.76
Nov 19 22:13:55 * sshd[32119]: Failed password for invalid user Markku from 52.162.239.76 port 59834 ssh2
2019-11-20 06:05:04
222.186.175.212 attackbots
Nov 20 03:55:33 vibhu-HP-Z238-Microtower-Workstation sshd\[19977\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.175.212  user=root
Nov 20 03:55:35 vibhu-HP-Z238-Microtower-Workstation sshd\[19977\]: Failed password for root from 222.186.175.212 port 25214 ssh2
Nov 20 03:55:52 vibhu-HP-Z238-Microtower-Workstation sshd\[19994\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.175.212  user=root
Nov 20 03:55:54 vibhu-HP-Z238-Microtower-Workstation sshd\[19994\]: Failed password for root from 222.186.175.212 port 63124 ssh2
Nov 20 03:56:10 vibhu-HP-Z238-Microtower-Workstation sshd\[19994\]: Failed password for root from 222.186.175.212 port 63124 ssh2
...
2019-11-20 06:28:02

Recently Reported IPs

69.176.95.150 50.114.111.75 14.225.249.143 23.254.101.186
45.199.139.254 187.144.62.66 201.102.68.135 120.77.64.244
49.254.143.155 154.201.33.67 154.84.140.78 82.25.212.28
156.239.50.12 110.182.177.60 15.235.15.122 156.239.48.145
114.149.120.242 165.227.179.201 193.233.140.228 89.252.156.220