Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Viet Nam

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 14.229.139.207
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 28435
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;14.229.139.207.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025012500 1800 900 604800 86400

;; Query time: 10 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Jan 25 21:59:16 CST 2025
;; MSG SIZE  rcvd: 107
Host info
207.139.229.14.in-addr.arpa domain name pointer static.vnpt.vn.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
207.139.229.14.in-addr.arpa	name = static.vnpt.vn.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
162.244.77.140 attackspam
Jul 24 21:28:52 er4gw sshd[31381]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=162.244.77.140
2020-07-25 08:01:24
180.76.167.221 attackbotsspam
Invalid user etc from 180.76.167.221 port 53328
2020-07-25 08:09:54
222.186.180.17 attackspam
Jul 24 19:50:16 NPSTNNYC01T sshd[25281]: Failed password for root from 222.186.180.17 port 33752 ssh2
Jul 24 19:50:29 NPSTNNYC01T sshd[25281]: error: maximum authentication attempts exceeded for root from 222.186.180.17 port 33752 ssh2 [preauth]
Jul 24 19:50:35 NPSTNNYC01T sshd[25288]: Failed password for root from 222.186.180.17 port 43282 ssh2
...
2020-07-25 07:52:11
217.28.159.49 attackbots
Jul 25 01:59:11 OPSO sshd\[25746\]: Invalid user rick from 217.28.159.49 port 41465
Jul 25 01:59:11 OPSO sshd\[25746\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=217.28.159.49
Jul 25 01:59:13 OPSO sshd\[25746\]: Failed password for invalid user rick from 217.28.159.49 port 41465 ssh2
Jul 25 02:03:28 OPSO sshd\[27122\]: Invalid user psu from 217.28.159.49 port 49642
Jul 25 02:03:28 OPSO sshd\[27122\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=217.28.159.49
2020-07-25 08:04:55
221.229.196.55 attackspambots
Invalid user mitra from 221.229.196.55 port 59034
2020-07-25 08:23:56
200.122.249.203 attackspambots
Invalid user lwy from 200.122.249.203 port 36985
2020-07-25 08:05:49
85.239.35.12 attackbots
Jul 24 22:04:29 XXXXXX sshd[8406]: Invalid user sanchez from 85.239.35.12 port 39484
2020-07-25 08:19:40
202.105.98.210 attackbotsspam
Triggered by Fail2Ban at Ares web server
2020-07-25 08:27:19
129.211.99.254 attackbotsspam
Jul 25 01:26:51 vpn01 sshd[19657]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.211.99.254
Jul 25 01:26:53 vpn01 sshd[19657]: Failed password for invalid user shang from 129.211.99.254 port 57640 ssh2
...
2020-07-25 08:12:53
168.138.221.133 attack
Invalid user wmg from 168.138.221.133 port 55522
2020-07-25 08:00:56
106.12.204.81 attackspambots
Jul 25 00:41:17 vps647732 sshd[11246]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.204.81
Jul 25 00:41:19 vps647732 sshd[11246]: Failed password for invalid user vaibhav from 106.12.204.81 port 57160 ssh2
...
2020-07-25 07:59:57
134.209.18.220 attackspam
Automatic Fail2ban report - Trying login SSH
2020-07-25 08:12:26
104.248.153.158 attackbotsspam
Jul 25 01:01:25 *hidden* sshd[22641]: Invalid user ked from 104.248.153.158 port 57256 Jul 25 01:01:25 *hidden* sshd[22641]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.248.153.158 Jul 25 01:01:28 *hidden* sshd[22641]: Failed password for invalid user ked from 104.248.153.158 port 57256 ssh2
2020-07-25 07:59:40
60.164.250.12 attackspambots
Jul 25 01:03:39 ns381471 sshd[10096]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=60.164.250.12
Jul 25 01:03:41 ns381471 sshd[10096]: Failed password for invalid user store from 60.164.250.12 port 55211 ssh2
2020-07-25 07:50:02
152.136.165.226 attack
Brute-force attempt banned
2020-07-25 08:11:14

Recently Reported IPs

245.251.148.243 98.3.93.85 24.133.32.62 12.206.250.77
118.242.18.222 96.67.9.229 177.66.85.243 160.31.68.235
19.2.114.4 54.34.254.217 253.63.76.255 120.20.229.154
254.0.130.64 55.231.218.162 196.58.186.82 179.210.73.23
14.86.80.221 198.151.138.222 167.84.219.131 203.222.11.99