Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Viet Nam

Internet Service Provider: Vietnam Posts and Telecommunications Group

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
Type Details Datetime
attackspam
Automatic report - Port Scan Attack
2020-06-22 15:17:52
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 14.243.52.142
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 47800
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;14.243.52.142.			IN	A

;; AUTHORITY SECTION:
.			386	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2020062200 1800 900 604800 86400

;; Query time: 109 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Jun 22 15:17:47 CST 2020
;; MSG SIZE  rcvd: 117
Host info
142.52.243.14.in-addr.arpa domain name pointer static.vnpt.vn.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
142.52.243.14.in-addr.arpa	name = static.vnpt.vn.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
81.22.45.49 attackspambots
ET CINS Active Threat Intelligence Poor Reputation IP group 74 - port: 4594 proto: TCP cat: Misc Attack
2019-11-09 18:14:27
106.12.52.20 attackbots
Nov  8 22:45:45 web1 sshd\[23498\]: Invalid user pussy from 106.12.52.20
Nov  8 22:45:45 web1 sshd\[23498\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.52.20
Nov  8 22:45:47 web1 sshd\[23498\]: Failed password for invalid user pussy from 106.12.52.20 port 44674 ssh2
Nov  8 22:50:41 web1 sshd\[23954\]: Invalid user ttnet from 106.12.52.20
Nov  8 22:50:41 web1 sshd\[23954\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.52.20
2019-11-09 18:26:55
189.70.124.175 attackbots
Nov  9 07:38:23 h2034429 sshd[18061]: Did not receive identification string from 189.70.124.175
Nov  9 07:43:39 h2034429 sshd[18175]: Did not receive identification string from 189.70.124.175


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=189.70.124.175
2019-11-09 18:29:37
186.86.52.83 attackspam
Nov  9 07:14:45 mxgate1 postfix/postscreen[27578]: CONNECT from [186.86.52.83]:8197 to [176.31.12.44]:25
Nov  9 07:14:45 mxgate1 postfix/dnsblog[27691]: addr 186.86.52.83 listed by domain cbl.abuseat.org as 127.0.0.2
Nov  9 07:14:45 mxgate1 postfix/dnsblog[27583]: addr 186.86.52.83 listed by domain bl.spamcop.net as 127.0.0.2
Nov  9 07:14:45 mxgate1 postfix/dnsblog[27579]: addr 186.86.52.83 listed by domain ix.dnsbl.xxxxxx.net as 127.0.0.2
Nov  9 07:14:45 mxgate1 postfix/dnsblog[27582]: addr 186.86.52.83 listed by domain b.barracudacentral.org as 127.0.0.2
Nov  9 07:14:45 mxgate1 postfix/dnsblog[27581]: addr 186.86.52.83 listed by domain zen.spamhaus.org as 127.0.0.4
Nov  9 07:14:45 mxgate1 postfix/dnsblog[27581]: addr 186.86.52.83 listed by domain zen.spamhaus.org as 127.0.0.11
Nov  9 07:14:51 mxgate1 postfix/postscreen[27578]: DNSBL rank 6 for [186.86.52.83]:8197
Nov x@x
Nov  9 07:14:56 mxgate1 postfix/postscreen[27578]: HANGUP after 4.2 from [186.86.52.83]:8197 in te........
-------------------------------
2019-11-09 18:23:33
217.23.13.91 attackbots
Port 1433 Scan
2019-11-09 18:20:08
62.234.67.109 attackbots
2019-11-09T09:06:34.971810abusebot-6.cloudsearch.cf sshd\[7679\]: Invalid user dd from 62.234.67.109 port 33760
2019-11-09 18:17:35
51.38.186.244 attack
Nov  9 01:25:09 plusreed sshd[27183]: Invalid user ftpuser1 from 51.38.186.244
...
2019-11-09 17:57:58
85.128.142.59 attackspambots
Automatic report - XMLRPC Attack
2019-11-09 18:33:29
192.144.187.10 attack
Nov  9 10:19:37 vps691689 sshd[29588]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=192.144.187.10
Nov  9 10:19:39 vps691689 sshd[29588]: Failed password for invalid user wildfly from 192.144.187.10 port 40644 ssh2
...
2019-11-09 18:20:51
51.91.48.22 attack
Nov  9 **REMOVED** sshd\[1768\]: Invalid user root123 from 51.91.48.22
Nov  9 **REMOVED** sshd\[1794\]: Invalid user root1 from 51.91.48.22
Nov  9 **REMOVED** sshd\[1797\]: Invalid user root2 from 51.91.48.22
2019-11-09 18:13:18
190.98.228.54 attack
2019-11-09T08:37:27.988468abusebot-7.cloudsearch.cf sshd\[5876\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=190.98.228.54  user=root
2019-11-09 18:16:34
49.81.38.160 attackbots
$f2bV_matches
2019-11-09 18:17:06
222.186.42.4 attack
SSH Brute Force, server-1 sshd[17907]: Failed password for root from 222.186.42.4 port 17848 ssh2
2019-11-09 17:57:30
95.46.157.211 attackbotsspam
09.11.2019 07:24:43 - RDP Login Fail Detected by 
https://www.elinox.de/RDP-Wächter
2019-11-09 18:17:58
112.196.70.204 attackspambots
Unauthorised access (Nov  9) SRC=112.196.70.204 LEN=40 TTL=51 ID=8603 TCP DPT=8080 WINDOW=2124 SYN 
Unauthorised access (Nov  8) SRC=112.196.70.204 LEN=40 TTL=51 ID=544 TCP DPT=8080 WINDOW=6751 SYN 
Unauthorised access (Nov  8) SRC=112.196.70.204 LEN=40 TTL=51 ID=36337 TCP DPT=8080 WINDOW=6751 SYN
2019-11-09 18:36:11

Recently Reported IPs

70.240.97.96 151.42.13.75 226.26.56.216 60.167.182.93
115.74.32.163 110.137.37.131 142.11.209.149 70.74.178.13
218.76.149.232 187.138.56.119 47.104.204.163 103.105.46.186
190.229.68.107 66.181.175.147 185.120.77.152 34.255.225.209
157.230.106.229 51.91.158.178 218.22.177.82 249.35.20.225