Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Viet Nam

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 14.239.231.12
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 64459
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;14.239.231.12.			IN	A

;; AUTHORITY SECTION:
.			488	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022021301 1800 900 604800 86400

;; Query time: 18 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Feb 14 07:09:11 CST 2022
;; MSG SIZE  rcvd: 106
Host info
12.231.239.14.in-addr.arpa domain name pointer static.vnpt.vn.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
12.231.239.14.in-addr.arpa	name = static.vnpt.vn.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
220.134.138.111 attackspam
SSH Brute Force
2019-06-23 16:22:55
119.29.161.122 attack
SSH invalid-user multiple login attempts
2019-06-23 16:15:31
194.150.40.97 attackbots
[SMB remote code execution attempt: port tcp/445]
*(RWIN=1024)(06230742)
2019-06-23 16:34:01
79.137.87.44 attackbots
Jun 23 00:05:29 ip-172-31-1-72 sshd\[29772\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=79.137.87.44  user=root
Jun 23 00:05:31 ip-172-31-1-72 sshd\[29772\]: Failed password for root from 79.137.87.44 port 50721 ssh2
Jun 23 00:09:14 ip-172-31-1-72 sshd\[29925\]: Invalid user history from 79.137.87.44
Jun 23 00:09:14 ip-172-31-1-72 sshd\[29925\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=79.137.87.44
Jun 23 00:09:16 ip-172-31-1-72 sshd\[29925\]: Failed password for invalid user history from 79.137.87.44 port 42015 ssh2
2019-06-23 16:11:35
68.183.33.7 attackbots
[munged]::443 68.183.33.7 - - [23/Jun/2019:07:02:57 +0200] "POST /[munged]: HTTP/1.1" 200 9077 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
[munged]::443 68.183.33.7 - - [23/Jun/2019:07:02:59 +0200] "POST /[munged]: HTTP/1.1" 200 9077 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
[munged]::443 68.183.33.7 - - [23/Jun/2019:07:02:59 +0200] "POST /[munged]: HTTP/1.1" 200 9077 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
[munged]::443 68.183.33.7 - - [23/Jun/2019:07:03:07 +0200] "POST /[munged]: HTTP/1.1" 200 9077 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
[munged]::443 68.183.33.7 - - [23/Jun/2019:07:03:07 +0200] "POST /[munged]: HTTP/1.1" 200 9077 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
[munged]::443 68.183.33.7 - - [23/Jun/2019:07:03:14 +0200] "POST /[munged]: HTTP/1.1" 200 9077 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x8
2019-06-23 16:33:34
218.56.138.166 attackbots
2019-06-23T04:12:47.180785abusebot-7.cloudsearch.cf sshd\[2808\]: Invalid user michielan from 218.56.138.166 port 33896
2019-06-23 15:35:50
118.25.138.95 attackbotsspam
Jun 23 06:34:39 h2177944 sshd\[10427\]: Invalid user hl from 118.25.138.95 port 39800
Jun 23 06:34:39 h2177944 sshd\[10427\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.25.138.95
Jun 23 06:34:41 h2177944 sshd\[10427\]: Failed password for invalid user hl from 118.25.138.95 port 39800 ssh2
Jun 23 06:52:46 h2177944 sshd\[10735\]: Invalid user yuanwd from 118.25.138.95 port 35134
...
2019-06-23 16:24:41
82.209.232.5 attackspambots
Jun 22 14:38:27 xb3 sshd[31961]: Bad protocol version identification '' from 82.209.232.5 port 38978
Jun 22 14:38:28 xb3 sshd[31962]: reveeclipse mapping checking getaddrinfo for mm-5-232-209-82.static.mgts.by [82.209.232.5] failed - POSSIBLE BREAK-IN ATTEMPT!
Jun 22 14:38:30 xb3 sshd[31962]: Failed password for invalid user support from 82.209.232.5 port 39062 ssh2
Jun 22 14:38:30 xb3 sshd[31962]: Connection closed by 82.209.232.5 [preauth]
Jun 22 14:38:31 xb3 sshd[31987]: reveeclipse mapping checking getaddrinfo for mm-5-232-209-82.static.mgts.by [82.209.232.5] failed - POSSIBLE BREAK-IN ATTEMPT!
Jun 22 14:38:32 xb3 sshd[31987]: Failed password for invalid user ubnt from 82.209.232.5 port 42584 ssh2
Jun 22 14:38:32 xb3 sshd[31987]: Connection closed by 82.209.232.5 [preauth]
Jun 22 14:38:33 xb3 sshd[32007]: reveeclipse mapping checking getaddrinfo for mm-5-232-209-82.static.mgts.by [82.209.232.5] failed - POSSIBLE BREAK-IN ATTEMPT!
Jun 22 14:38:35 xb3 sshd[32007]: Fai........
-------------------------------
2019-06-23 16:34:30
177.250.0.97 attackspambots
23.06.2019 00:42:23 SSH access blocked by firewall
2019-06-23 15:58:09
134.175.39.108 attackspambots
Jun 23 01:11:19 cac1d2 sshd\[31467\]: Invalid user ankit from 134.175.39.108 port 46016
Jun 23 01:11:19 cac1d2 sshd\[31467\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.175.39.108
Jun 23 01:11:22 cac1d2 sshd\[31467\]: Failed password for invalid user ankit from 134.175.39.108 port 46016 ssh2
...
2019-06-23 16:35:33
185.176.26.18 attackspam
23.06.2019 05:24:08 Connection to port 9880 blocked by firewall
2019-06-23 15:52:39
118.25.90.127 attack
Jun 23 04:31:44 jupiter sshd\[12081\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.25.90.127  user=root
Jun 23 04:31:46 jupiter sshd\[12081\]: Failed password for root from 118.25.90.127 port 60894 ssh2
Jun 23 04:51:38 jupiter sshd\[12292\]: Invalid user uplink from 118.25.90.127
Jun 23 04:51:38 jupiter sshd\[12292\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.25.90.127
...
2019-06-23 15:51:33
190.119.190.122 attack
SSH-BRUTEFORCE
2019-06-23 16:21:49
120.92.208.72 attackbots
Jun 23 02:08:42 * sshd[3145]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=120.92.208.72
Jun 23 02:08:44 * sshd[3145]: Failed password for invalid user gta5 from 120.92.208.72 port 12802 ssh2
2019-06-23 16:37:10
134.175.0.75 attackbots
Jun 23 01:40:24 mail sshd\[18910\]: Invalid user redmine from 134.175.0.75 port 48694
Jun 23 01:40:24 mail sshd\[18910\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.175.0.75
...
2019-06-23 16:25:53

Recently Reported IPs

14.239.228.31 14.239.234.119 14.239.32.129 14.239.125.64
14.239.68.50 14.240.189.179 14.238.168.220 14.241.110.75
14.241.111.124 14.241.111.184 14.241.111.206 14.240.29.62
14.241.123.112 14.241.232.52 14.241.242.40 14.241.57.12
14.242.231.112 14.241.85.24 14.243.44.219 14.244.89.185