Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Viet Nam

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 14.245.74.54
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 3124
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;14.245.74.54.			IN	A

;; AUTHORITY SECTION:
.			600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022021300 1800 900 604800 86400

;; Query time: 108 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Feb 13 14:41:03 CST 2022
;; MSG SIZE  rcvd: 105
Host info
54.74.245.14.in-addr.arpa domain name pointer static.vnpt.vn.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
54.74.245.14.in-addr.arpa	name = static.vnpt.vn.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
52.231.177.18 attack
Port scan on 14 port(s): 3 22 146 311 366 464 500 544 563 625 777 888 912 1068
2020-09-05 16:16:25
117.103.2.114 attack
Sep  5 05:24:50 firewall sshd[8509]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=117.103.2.114
Sep  5 05:24:50 firewall sshd[8509]: Invalid user nina from 117.103.2.114
Sep  5 05:24:52 firewall sshd[8509]: Failed password for invalid user nina from 117.103.2.114 port 35010 ssh2
...
2020-09-05 16:27:03
105.112.90.140 attack
Sep  4 18:48:56 mellenthin postfix/smtpd[28165]: NOQUEUE: reject: RCPT from unknown[105.112.90.140]: 554 5.7.1 Service unavailable; Client host [105.112.90.140] blocked using zen.spamhaus.org; https://www.spamhaus.org/query/ip/105.112.90.140 / https://www.spamhaus.org/sbl/query/SBLCSS; from= to= proto=ESMTP helo=<[105.112.90.140]>
2020-09-05 16:06:09
71.6.232.5 attackbotsspam
Unauthorized connection attempt from IP address 71.6.232.5 on Port 137(NETBIOS)
2020-09-05 16:46:34
186.10.125.209 attackspambots
$f2bV_matches
2020-09-05 16:25:59
191.240.157.92 attackbotsspam
Unauthorized connection attempt from IP address 191.240.157.92 on Port 445(SMB)
2020-09-05 16:29:11
65.155.30.101 attack
Automatic report - Banned IP Access
2020-09-05 16:43:07
120.92.45.102 attackbots
DATE:2020-09-05 08:59:59,IP:120.92.45.102,MATCHES:10,PORT:ssh
2020-09-05 16:31:29
45.95.168.227 attackbotsspam
DATE:2020-09-04 23:41:55, IP:45.95.168.227, PORT:telnet Telnet brute force auth on honeypot server (honey-neo-dc)
2020-09-05 16:24:28
219.131.193.180 attackbotsspam
2020-09-05T06:51:36.847684cyberdyne sshd[3661528]: Invalid user gangadhar from 219.131.193.180 port 2095
2020-09-05T06:51:36.850243cyberdyne sshd[3661528]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=219.131.193.180
2020-09-05T06:51:36.847684cyberdyne sshd[3661528]: Invalid user gangadhar from 219.131.193.180 port 2095
2020-09-05T06:51:38.424351cyberdyne sshd[3661528]: Failed password for invalid user gangadhar from 219.131.193.180 port 2095 ssh2
...
2020-09-05 16:25:27
103.130.192.135 attackbots
Sep  5 03:52:00 v22019038103785759 sshd\[20620\]: Invalid user ubuntu from 103.130.192.135 port 32804
Sep  5 03:52:00 v22019038103785759 sshd\[20620\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.130.192.135
Sep  5 03:52:02 v22019038103785759 sshd\[20620\]: Failed password for invalid user ubuntu from 103.130.192.135 port 32804 ssh2
Sep  5 03:56:39 v22019038103785759 sshd\[21038\]: Invalid user gitlab_ci from 103.130.192.135 port 33434
Sep  5 03:56:39 v22019038103785759 sshd\[21038\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.130.192.135
...
2020-09-05 16:47:18
218.92.0.133 attackbotsspam
Sep  5 01:19:27 dignus sshd[3238]: Failed password for root from 218.92.0.133 port 37459 ssh2
Sep  5 01:19:31 dignus sshd[3238]: Failed password for root from 218.92.0.133 port 37459 ssh2
Sep  5 01:19:35 dignus sshd[3238]: Failed password for root from 218.92.0.133 port 37459 ssh2
Sep  5 01:19:39 dignus sshd[3238]: Failed password for root from 218.92.0.133 port 37459 ssh2
Sep  5 01:19:42 dignus sshd[3238]: Failed password for root from 218.92.0.133 port 37459 ssh2
...
2020-09-05 16:20:22
5.253.114.26 attack
Spam
2020-09-05 16:07:07
167.71.72.70 attackbots
Invalid user tester from 167.71.72.70 port 59404
2020-09-05 16:23:58
197.237.31.187 attack
Sep  4 18:48:20 mellenthin postfix/smtpd[29029]: NOQUEUE: reject: RCPT from unknown[197.237.31.187]: 554 5.7.1 Service unavailable; Client host [197.237.31.187] blocked using zen.spamhaus.org; https://www.spamhaus.org/query/ip/197.237.31.187; from= to= proto=ESMTP helo=<197.237.31.187.wananchi.com>
2020-09-05 16:34:54

Recently Reported IPs

14.248.110.248 14.248.103.108 14.247.19.172 14.248.145.96
14.248.179.247 14.248.127.195 14.248.167.172 14.248.218.127
14.248.169.66 14.248.225.242 14.248.214.64 14.248.230.98
14.248.83.72 14.249.109.128 14.248.234.53 14.248.30.91
14.248.74.218 14.249.135.138 14.249.97.232 14.249.208.210