Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Vietnam

Internet Service Provider: unknown

Hostname: unknown

Organization: VNPT Corp

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:

; <<>> DiG 9.10.3-P4-Ubuntu <<>> 14.237.142.105
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 4093
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;14.237.142.105.			IN	A

;; AUTHORITY SECTION:
.			3600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019051501 1800 900 604800 86400

;; Query time: 2 msec
;; SERVER: 67.207.67.2#53(67.207.67.2)
;; WHEN: Wed May 15 23:10:55 CST 2019
;; MSG SIZE  rcvd: 118

Host info
105.142.237.14.in-addr.arpa domain name pointer static.vnpt.vn.
Nslookup info:
Server:		67.207.67.2
Address:	67.207.67.2#53

Non-authoritative answer:
105.142.237.14.in-addr.arpa	name = static.vnpt.vn.

Authoritative answers can be found from:

Related IP info:
Related comments:
IP Type Details Datetime
66.109.29.6 attack
Unauthorized connection attempt from IP address 66.109.29.6 on Port 445(SMB)
2019-09-01 05:07:26
50.64.152.76 attackspam
Aug 31 10:59:37 php2 sshd\[3215\]: Invalid user test from 50.64.152.76
Aug 31 10:59:37 php2 sshd\[3215\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=s0106bc9b68acafab.vc.shawcable.net
Aug 31 10:59:39 php2 sshd\[3215\]: Failed password for invalid user test from 50.64.152.76 port 51090 ssh2
Aug 31 11:03:44 php2 sshd\[3569\]: Invalid user ts35 from 50.64.152.76
Aug 31 11:03:44 php2 sshd\[3569\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=s0106bc9b68acafab.vc.shawcable.net
2019-09-01 05:04:51
24.210.199.30 attackspam
Aug 31 20:21:10 meumeu sshd[1310]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=24.210.199.30 
Aug 31 20:21:12 meumeu sshd[1310]: Failed password for invalid user semenov from 24.210.199.30 port 33128 ssh2
Aug 31 20:26:17 meumeu sshd[1939]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=24.210.199.30 
...
2019-09-01 05:28:15
218.249.69.210 attack
Aug 31 09:25:54 TORMINT sshd\[32426\]: Invalid user 123 from 218.249.69.210
Aug 31 09:25:54 TORMINT sshd\[32426\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.249.69.210
Aug 31 09:25:56 TORMINT sshd\[32426\]: Failed password for invalid user 123 from 218.249.69.210 port 9969 ssh2
...
2019-09-01 05:01:28
54.37.230.141 attackspam
Aug 31 22:55:22 vps647732 sshd[20077]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=54.37.230.141
Aug 31 22:55:24 vps647732 sshd[20077]: Failed password for invalid user test2 from 54.37.230.141 port 41544 ssh2
...
2019-09-01 05:17:54
210.212.194.113 attackspambots
Aug 31 23:00:20 tux-35-217 sshd\[11257\]: Invalid user avahii from 210.212.194.113 port 54236
Aug 31 23:00:20 tux-35-217 sshd\[11257\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=210.212.194.113
Aug 31 23:00:22 tux-35-217 sshd\[11257\]: Failed password for invalid user avahii from 210.212.194.113 port 54236 ssh2
Aug 31 23:05:09 tux-35-217 sshd\[11286\]: Invalid user sheldon from 210.212.194.113 port 42618
Aug 31 23:05:09 tux-35-217 sshd\[11286\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=210.212.194.113
...
2019-09-01 05:23:25
2.133.243.117 attack
Unauthorized connection attempt from IP address 2.133.243.117 on Port 445(SMB)
2019-09-01 05:02:33
103.91.91.194 attackbotsspam
Unauthorized connection attempt from IP address 103.91.91.194 on Port 445(SMB)
2019-09-01 05:15:26
121.254.84.4 attackbots
Unauthorized connection attempt from IP address 121.254.84.4 on Port 445(SMB)
2019-09-01 04:48:51
125.230.25.83 attackbotsspam
Unauthorized connection attempt from IP address 125.230.25.83 on Port 445(SMB)
2019-09-01 05:09:22
103.110.236.46 attack
Unauthorized connection attempt from IP address 103.110.236.46 on Port 445(SMB)
2019-09-01 04:51:18
35.202.27.205 attackspambots
$f2bV_matches
2019-09-01 05:14:38
51.254.222.6 attackbotsspam
Aug 28 11:54:22 itv-usvr-01 sshd[13127]: Invalid user yumiko from 51.254.222.6
Aug 28 11:54:22 itv-usvr-01 sshd[13127]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.254.222.6
Aug 28 11:54:22 itv-usvr-01 sshd[13127]: Invalid user yumiko from 51.254.222.6
Aug 28 11:54:24 itv-usvr-01 sshd[13127]: Failed password for invalid user yumiko from 51.254.222.6 port 50793 ssh2
Aug 28 12:01:45 itv-usvr-01 sshd[13417]: Invalid user suser from 51.254.222.6
2019-09-01 04:56:57
178.116.46.206 attackspam
SSH-bruteforce attempts
2019-09-01 05:27:06
217.118.79.44 attack
Unauthorized connection attempt from IP address 217.118.79.44 on Port 445(SMB)
2019-09-01 05:18:43

Recently Reported IPs

153.190.248.229 223.230.188.181 116.108.80.91 2.180.208.158
203.93.171.144 222.215.47.211 119.221.143.230 176.228.230.57
200.6.183.154 96.143.97.243 8.198.36.213 57.86.79.72
66.169.62.217 70.64.110.39 222.53.5.164 113.181.215.237
64.129.34.78 182.54.205.13 150.199.179.0 17.33.41.13