Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Vietnam

Internet Service Provider: unknown

Hostname: unknown

Organization: VNPT Corp

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:

; <<>> DiG 9.10.3-P4-Ubuntu <<>> 14.235.99.10
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 58557
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;14.235.99.10.			IN	A

;; AUTHORITY SECTION:
.			2396	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019050300 1800 900 604800 86400

;; Query time: 0 msec
;; SERVER: 67.207.67.3#53(67.207.67.3)
;; WHEN: Fri May 03 23:34:31 +08 2019
;; MSG SIZE  rcvd: 116

Host info
10.99.235.14.in-addr.arpa domain name pointer static.vnpt.vn.
Nslookup info:
Server:		67.207.67.3
Address:	67.207.67.3#53

Non-authoritative answer:
10.99.235.14.in-addr.arpa	name = static.vnpt.vn.

Authoritative answers can be found from:

Related IP info:
Related comments:
IP Type Details Datetime
171.232.149.32 attack
TCP port 1036: Scan and connection
2020-01-30 13:21:07
111.90.150.204 normal
Give me diamond at my number
2020-01-30 13:36:16
119.5.75.12 attackspambots
Unauthorized connection attempt detected from IP address 119.5.75.12 to port 6656 [T]
2020-01-30 13:50:08
59.168.113.60 attack
Unauthorized connection attempt detected from IP address 59.168.113.60 to port 9000 [T]
2020-01-30 13:37:21
114.229.84.211 attack
Unauthorized connection attempt detected from IP address 114.229.84.211 to port 6656 [T]
2020-01-30 13:54:29
121.56.212.121 attack
Unauthorized connection attempt detected from IP address 121.56.212.121 to port 6656 [T]
2020-01-30 13:49:19
159.89.115.126 attackbotsspam
$f2bV_matches
2020-01-30 13:25:40
111.230.230.40 attack
Jan 30 05:55:25 OPSO sshd\[7713\]: Invalid user atal from 111.230.230.40 port 41612
Jan 30 05:55:25 OPSO sshd\[7713\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.230.230.40
Jan 30 05:55:27 OPSO sshd\[7713\]: Failed password for invalid user atal from 111.230.230.40 port 41612 ssh2
Jan 30 05:59:18 OPSO sshd\[8287\]: Invalid user ekacandra from 111.230.230.40 port 37132
Jan 30 05:59:18 OPSO sshd\[8287\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.230.230.40
2020-01-30 13:15:56
121.205.177.104 attack
Unauthorized connection attempt detected from IP address 121.205.177.104 to port 6656 [T]
2020-01-30 13:32:49
222.186.15.158 attackspambots
Unauthorized connection attempt detected from IP address 222.186.15.158 to port 22 [T]
2020-01-30 13:23:53
182.110.116.120 attackspambots
Unauthorized connection attempt detected from IP address 182.110.116.120 to port 6656 [T]
2020-01-30 13:43:11
39.68.116.41 attackbots
Fail2Ban - FTP Abuse Attempt
2020-01-30 13:19:03
49.77.42.115 attack
Unauthorized connection attempt detected from IP address 49.77.42.115 to port 6656 [T]
2020-01-30 13:38:54
114.237.49.178 attackbots
Unauthorized connection attempt detected from IP address 114.237.49.178 to port 6656 [T]
2020-01-30 13:53:48
218.91.104.54 attackbotsspam
Unauthorized connection attempt detected from IP address 218.91.104.54 to port 6656 [T]
2020-01-30 13:28:09

Recently Reported IPs

217.122.98.237 151.15.238.20 104.115.200.94 104.223.213.140
120.132.112.249 32.31.213.107 57.230.253.27 164.132.98.35
2.65.171.183 94.136.198.177 77.245.12.63 118.149.175.189
139.204.54.219 190.126.113.77 184.36.63.49 222.200.103.128
62.138.2.243 204.5.7.90 1.2.183.62 128.92.163.196