Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Viet Nam

Internet Service Provider: Vietnam Posts and Telecommunications Group

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
Type Details Datetime
attackspambots
Unauthorized connection attempt detected from IP address 14.245.2.30 to port 445
2020-01-04 16:40:55
Comments on same subnet:
IP Type Details Datetime
14.245.230.134 attackbotsspam
Icarus honeypot on github
2020-08-17 02:21:12
14.245.211.93 attackspambots
06/26/2020-23:55:13.260209 14.245.211.93 Protocol: 6 ET SCAN Suspicious inbound to MSSQL port 1433
2020-06-27 13:39:59
14.245.247.145 attackbots
Unauthorized connection attempt from IP address 14.245.247.145 on Port 445(SMB)
2020-05-03 20:51:37
14.245.242.66 attack
Unauthorized connection attempt from IP address 14.245.242.66 on Port 445(SMB)
2020-04-27 00:57:05
14.245.220.244 attackbots
445/tcp
[2020-04-04]1pkt
2020-04-05 04:44:56
14.245.29.167 attackbotsspam
445/tcp 445/tcp 445/tcp...
[2020-02-01/03-23]6pkt,1pt.(tcp)
2020-03-23 14:20:49
14.245.240.103 attackbots
Lines containing failures of 14.245.240.103
auth.log:Feb 10 14:39:28 omfg sshd[29626]: Connection from 14.245.240.103 port 56141 on 78.46.60.16 port 22
auth.log:Feb 10 14:39:28 omfg sshd[29626]: Did not receive identification string from 14.245.240.103
auth.log:Feb 10 14:39:29 omfg sshd[29627]: Connection from 14.245.240.103 port 56124 on 78.46.60.41 port 22
auth.log:Feb 10 14:39:29 omfg sshd[29627]: Did not receive identification string from 14.245.240.103
auth.log:Feb 10 14:39:29 omfg sshd[29628]: Connection from 14.245.240.103 port 56139 on 78.46.60.50 port 22
auth.log:Feb 10 14:39:29 omfg sshd[29628]: Did not receive identification string from 14.245.240.103
auth.log:Feb 10 14:39:33 omfg sshd[29632]: Connection from 14.245.240.103 port 56062 on 78.46.60.50 port 22
auth.log:Feb 10 14:39:34 omfg sshd[29632]: Invalid user thostname0nich from 14.245.240.103
auth.log:Feb 10 14:39:34 omfg sshd[29632]: Connection closed by 14.245.240.103 port 56062 [preauth]


........
-------------------------------------------
2020-02-10 23:36:33
14.245.232.130 attack
unauthorized connection attempt
2020-01-22 17:52:47
14.245.212.200 attack
unauthorized connection attempt
2020-01-17 14:10:18
14.245.204.47 attackbots
Unauthorized connection attempt from IP address 14.245.204.47 on Port 445(SMB)
2020-01-17 01:28:09
14.245.2.184 attackspam
Unauthorized connection attempt from IP address 14.245.2.184 on Port 445(SMB)
2020-01-03 19:08:53
14.245.234.20 attackbots
Automatic report - Port Scan Attack
2019-11-18 20:12:29
14.245.247.105 attack
Attempt to attack host OS, exploiting network vulnerabilities, on 16-11-2019 06:20:29.
2019-11-16 20:25:13
14.245.209.218 attackspambots
Lines containing failures of 14.245.209.218
Oct 21 03:49:13 omfg postfix/smtpd[23347]: warning: hostname static.vnpt.vn does not resolve to address 14.245.209.218
Oct 21 03:49:13 omfg postfix/smtpd[23347]: connect from unknown[14.245.209.218]
Oct x@x


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=14.245.209.218
2019-10-23 07:09:00
14.245.200.48 attackbots
Attempt to attack host OS, exploiting network vulnerabilities, on 28-09-2019 13:35:14.
2019-09-28 21:17:46
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 14.245.2.30
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 45669
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;14.245.2.30.			IN	A

;; AUTHORITY SECTION:
.			384	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2020010400 1800 900 604800 86400

;; Query time: 93 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Jan 04 16:40:51 CST 2020
;; MSG SIZE  rcvd: 115
Host info
30.2.245.14.in-addr.arpa domain name pointer static.vnpt.vn.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
30.2.245.14.in-addr.arpa	name = static.vnpt.vn.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
60.209.129.206 attackspambots
MultiHost/MultiPort Probe, Scan, Hack -
2019-06-29 13:52:30
203.156.178.8 attackspam
445/tcp 445/tcp 445/tcp...
[2019-06-10/28]5pkt,1pt.(tcp)
2019-06-29 13:26:12
222.191.233.238 attackbots
'IP reached maximum auth failures for a one day block'
2019-06-29 14:11:43
195.3.146.88 attack
20089/tcp 40089/tcp 8977/tcp...
[2019-06-08/28]516pkt,146pt.(tcp)
2019-06-29 13:59:39
31.184.238.136 attackspam
Looking for resource vulnerabilities
2019-06-29 13:37:56
185.173.35.17 attack
138/tcp 5061/tcp 16010/tcp...
[2019-04-28/06-28]86pkt,45pt.(tcp),5pt.(udp)
2019-06-29 13:54:31
195.231.4.83 attackspam
Jun 29 04:31:08 work-partkepr sshd\[31240\]: Invalid user cron from 195.231.4.83 port 44313
Jun 29 04:31:08 work-partkepr sshd\[31240\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=195.231.4.83
...
2019-06-29 14:09:02
198.108.67.43 attackbots
Port scan: Attack repeated for 24 hours
2019-06-29 14:12:14
189.51.201.71 attackbots
SMTP-sasl brute force
...
2019-06-29 13:39:53
221.181.24.246 attackbotsspam
Invalid user support from 221.181.24.246 port 34200
2019-06-29 14:21:51
218.90.140.166 attackbots
Invalid user louis from 218.90.140.166 port 8321
2019-06-29 13:42:53
54.36.221.51 attackbots
techno.ws 54.36.221.51 \[29/Jun/2019:01:11:24 +0200\] "POST /wp-login.php HTTP/1.1" 200 5602 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0"
techno.ws 54.36.221.51 \[29/Jun/2019:01:11:24 +0200\] "POST /xmlrpc.php HTTP/1.1" 200 4068 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0"
2019-06-29 13:45:49
58.209.79.180 attackbotsspam
SASL broute force
2019-06-29 13:37:31
219.141.179.197 attackspam
Jun 29 01:10:52 server sshd[31247]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=219.141.179.197
...
2019-06-29 14:04:43
117.34.118.127 attack
445/tcp 445/tcp 445/tcp...
[2019-05-10/06-28]9pkt,1pt.(tcp)
2019-06-29 13:44:59

Recently Reported IPs

70.38.11.241 42.112.170.86 131.122.126.19 178.170.237.198
171.247.98.133 89.207.93.137 62.85.26.17 36.90.82.21
178.128.44.99 118.174.126.245 16.18.211.115 123.148.144.110
61.245.161.85 51.196.61.169 112.74.57.31 42.125.200.199
202.204.103.183 14.183.14.65 33.139.8.44 174.238.183.215