Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Hanoi

Region: Hanoi

Country: Vietnam

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 14.242.67.45
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 2480
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;14.242.67.45.			IN	A

;; AUTHORITY SECTION:
.			513	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019100301 1800 900 604800 86400

;; Query time: 196 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Oct 04 11:17:48 CST 2019
;; MSG SIZE  rcvd: 116
Host info
45.67.242.14.in-addr.arpa domain name pointer static.vnpt.vn.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
45.67.242.14.in-addr.arpa	name = static.vnpt.vn.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
18.236.199.243 attack
Bad user agent
2020-03-11 13:49:20
113.163.202.208 attackspambots
SSH bruteforce more then 50 syn to 22 port per 10 seconds.
2020-03-11 13:50:57
66.96.237.96 attack
Port scan on 1 port(s): 8291
2020-03-11 13:51:52
42.115.71.87 attackspam
1583892783 - 03/11/2020 03:13:03 Host: 42.115.71.87/42.115.71.87 Port: 445 TCP Blocked
2020-03-11 13:46:59
222.186.42.7 attackspambots
03/11/2020-02:25:40.091653 222.186.42.7 Protocol: 6 ET SCAN Potential SSH Scan
2020-03-11 14:28:18
50.213.255.135 attackspambots
Scan detected 2020.03.11 03:12:37 blocked until 2020.04.05 00:44:00
2020-03-11 14:10:42
218.92.0.201 attackbotsspam
Mar 11 04:13:29 server sshd[32287]: Failed password for root from 218.92.0.201 port 18402 ssh2
Mar 11 04:13:33 server sshd[32287]: Failed password for root from 218.92.0.201 port 18402 ssh2
Mar 11 04:13:35 server sshd[32287]: Failed password for root from 218.92.0.201 port 18402 ssh2
2020-03-11 14:08:10
106.54.196.110 attack
$f2bV_matches
2020-03-11 14:16:17
37.38.251.22 attackspam
Brute force attack against VPN service
2020-03-11 14:00:52
78.128.113.22 attack
15 attempts against mh-mag-login-ban on comet
2020-03-11 14:07:24
50.254.163.74 attackspam
Scan detected 2020.03.11 03:12:56 blocked until 2020.04.05 00:44:19
2020-03-11 13:52:15
82.81.24.133 attackspam
Automatic report - Banned IP Access
2020-03-11 14:01:59
49.235.162.224 attackspambots
PHP Info File Request - Possible PHP Version Scan
2020-03-11 13:48:52
175.195.254.99 attackspam
Mar 11 03:47:18 amit sshd\[17844\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=175.195.254.99  user=root
Mar 11 03:47:20 amit sshd\[17844\]: Failed password for root from 175.195.254.99 port 33908 ssh2
Mar 11 03:53:06 amit sshd\[26803\]: Invalid user teamcity from 175.195.254.99
Mar 11 03:53:06 amit sshd\[26803\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=175.195.254.99
...
2020-03-11 13:58:32
14.246.79.187 attackbotsspam
1583892742 - 03/11/2020 03:12:22 Host: 14.246.79.187/14.246.79.187 Port: 445 TCP Blocked
2020-03-11 14:25:12

Recently Reported IPs

72.144.193.144 2.130.196.241 87.64.226.58 116.8.106.166
161.74.78.147 112.62.107.4 58.236.232.29 133.23.235.100
158.182.95.204 135.80.231.47 58.6.243.208 166.182.156.67
8.193.202.70 201.238.84.158 79.189.188.83 122.128.6.27
122.120.27.164 214.176.4.220 106.207.179.92 93.80.78.224