Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Viet Nam

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 14.241.92.68
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 31835
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;14.241.92.68.			IN	A

;; AUTHORITY SECTION:
.			600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022021300 1800 900 604800 86400

;; Query time: 43 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Feb 13 14:40:56 CST 2022
;; MSG SIZE  rcvd: 105
Host info
68.92.241.14.in-addr.arpa domain name pointer static.vnpt.vn.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
68.92.241.14.in-addr.arpa	name = static.vnpt.vn.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
94.54.201.97 attackbots
Dec 20 20:25:25 php1 sshd\[21025\]: Invalid user pi from 94.54.201.97
Dec 20 20:25:25 php1 sshd\[21024\]: Invalid user pi from 94.54.201.97
Dec 20 20:25:25 php1 sshd\[21025\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=94.54.201.97
Dec 20 20:25:26 php1 sshd\[21024\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=94.54.201.97
Dec 20 20:25:27 php1 sshd\[21024\]: Failed password for invalid user pi from 94.54.201.97 port 59988 ssh2
2019-12-21 19:16:54
45.55.231.94 attackspam
Invalid user guest from 45.55.231.94 port 41188
2019-12-21 19:19:35
81.31.204.9 attackspambots
Dec 21 13:31:27 server sshd\[29079\]: Invalid user mcwhinnie from 81.31.204.9
Dec 21 13:31:27 server sshd\[29079\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=81.31.204.9 
Dec 21 13:31:29 server sshd\[29079\]: Failed password for invalid user mcwhinnie from 81.31.204.9 port 56120 ssh2
Dec 21 13:40:28 server sshd\[31450\]: Invalid user hspark from 81.31.204.9
Dec 21 13:40:28 server sshd\[31450\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=81.31.204.9 
...
2019-12-21 19:40:37
197.51.144.150 attackspam
Unauthorized IMAP connection attempt
2019-12-21 19:28:12
218.92.0.138 attackbotsspam
Dec 21 12:41:32 ns3042688 sshd\[26388\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.138  user=root
Dec 21 12:41:34 ns3042688 sshd\[26388\]: Failed password for root from 218.92.0.138 port 53340 ssh2
Dec 21 12:41:50 ns3042688 sshd\[26388\]: Failed password for root from 218.92.0.138 port 53340 ssh2
Dec 21 12:41:58 ns3042688 sshd\[26579\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.138  user=root
Dec 21 12:42:00 ns3042688 sshd\[26579\]: Failed password for root from 218.92.0.138 port 31139 ssh2
...
2019-12-21 19:42:14
69.55.49.194 attackspam
SSH brutforce
2019-12-21 19:34:17
132.145.170.174 attackspam
Dec 21 00:10:42 hanapaa sshd\[20405\]: Invalid user qiang from 132.145.170.174
Dec 21 00:10:42 hanapaa sshd\[20405\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=132.145.170.174
Dec 21 00:10:44 hanapaa sshd\[20405\]: Failed password for invalid user qiang from 132.145.170.174 port 15240 ssh2
Dec 21 00:18:47 hanapaa sshd\[21212\]: Invalid user elling from 132.145.170.174
Dec 21 00:18:47 hanapaa sshd\[21212\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=132.145.170.174
2019-12-21 19:27:50
18.27.197.252 attackbotsspam
xmlrpc attack
2019-12-21 19:31:22
177.220.177.143 attackspambots
Dec 21 11:24:59 microserver sshd[6631]: Invalid user veroxcode from 177.220.177.143 port 53762
Dec 21 11:24:59 microserver sshd[6631]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=177.220.177.143
Dec 21 11:25:01 microserver sshd[6631]: Failed password for invalid user veroxcode from 177.220.177.143 port 53762 ssh2
Dec 21 11:33:47 microserver sshd[7999]: Invalid user vonderweidt from 177.220.177.143 port 33067
Dec 21 11:33:47 microserver sshd[7999]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=177.220.177.143
Dec 21 12:02:28 microserver sshd[12416]: Invalid user testing from 177.220.177.143 port 25929
Dec 21 12:02:28 microserver sshd[12416]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=177.220.177.143
Dec 21 12:02:30 microserver sshd[12416]: Failed password for invalid user testing from 177.220.177.143 port 25929 ssh2
Dec 21 12:09:27 microserver sshd[13306]: pam_unix(sshd:auth): auth
2019-12-21 19:49:36
51.38.234.54 attack
Dec 21 08:15:23 pkdns2 sshd\[32324\]: Invalid user test from 51.38.234.54Dec 21 08:15:24 pkdns2 sshd\[32324\]: Failed password for invalid user test from 51.38.234.54 port 41274 ssh2Dec 21 08:20:21 pkdns2 sshd\[32617\]: Invalid user 120 from 51.38.234.54Dec 21 08:20:23 pkdns2 sshd\[32617\]: Failed password for invalid user 120 from 51.38.234.54 port 45982 ssh2Dec 21 08:25:17 pkdns2 sshd\[32883\]: Invalid user polina from 51.38.234.54Dec 21 08:25:18 pkdns2 sshd\[32883\]: Failed password for invalid user polina from 51.38.234.54 port 50690 ssh2
...
2019-12-21 19:25:51
218.29.83.38 attack
detected by Fail2Ban
2019-12-21 19:48:03
178.33.45.156 attackspambots
$f2bV_matches
2019-12-21 19:55:06
82.165.76.56 attackspam
Dec 21 06:18:50 linuxvps sshd\[12602\]: Invalid user test@123 from 82.165.76.56
Dec 21 06:18:50 linuxvps sshd\[12602\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=82.165.76.56
Dec 21 06:18:52 linuxvps sshd\[12602\]: Failed password for invalid user test@123 from 82.165.76.56 port 45286 ssh2
Dec 21 06:24:06 linuxvps sshd\[16001\]: Invalid user Dallas from 82.165.76.56
Dec 21 06:24:06 linuxvps sshd\[16001\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=82.165.76.56
2019-12-21 19:29:25
185.53.20.88 attackbotsspam
[portscan] Port scan
2019-12-21 19:35:39
117.158.15.171 attack
Dec 21 00:45:20 web9 sshd\[23374\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=117.158.15.171  user=root
Dec 21 00:45:22 web9 sshd\[23374\]: Failed password for root from 117.158.15.171 port 2197 ssh2
Dec 21 00:51:32 web9 sshd\[24205\]: Invalid user ftp from 117.158.15.171
Dec 21 00:51:32 web9 sshd\[24205\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=117.158.15.171
Dec 21 00:51:33 web9 sshd\[24205\]: Failed password for invalid user ftp from 117.158.15.171 port 2198 ssh2
2019-12-21 19:45:20

Recently Reported IPs

14.243.186.248 14.243.20.255 14.243.195.118 14.243.197.46
14.243.49.250 14.244.122.24 14.243.53.166 14.244.184.175
14.244.212.50 14.245.165.233 14.245.244.38 14.245.242.4
14.245.206.81 14.244.65.24 14.245.44.206 14.245.166.239
14.246.196.194 14.244.206.138 14.246.219.9 14.247.24.175