Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Vietnam

Internet Service Provider: unknown

Hostname: unknown

Organization: VNPT Corp

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:

; <<>> DiG 9.10.3-P4-Ubuntu <<>> 14.247.117.200
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 45710
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;14.247.117.200.			IN	A

;; AUTHORITY SECTION:
.			3600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019040400 1800 900 604800 86400

;; Query time: 3 msec
;; SERVER: 67.207.67.3#53(67.207.67.3)
;; WHEN: Thu Apr 04 14:14:04 +08 2019
;; MSG SIZE  rcvd: 118

Host info
200.117.247.14.in-addr.arpa domain name pointer static.vnpt.vn.
Nslookup info:
Server:		67.207.67.3
Address:	67.207.67.3#53

Non-authoritative answer:
200.117.247.14.in-addr.arpa	name = static.vnpt.vn.

Authoritative answers can be found from:

Related IP info:
Related comments:
IP Type Details Datetime
146.185.152.182 attackbotsspam
Invalid user altibase from 146.185.152.182 port 52182
2020-01-12 15:05:27
83.12.179.10 attack
unauthorized connection attempt
2020-01-12 15:13:12
42.118.34.3 attackbots
unauthorized connection attempt
2020-01-12 14:20:26
86.109.36.222 attack
Automatic report - Port Scan Attack
2020-01-12 14:58:19
183.129.162.42 attack
$f2bV_matches
2020-01-12 14:53:33
118.232.236.128 attackbots
1578805008 - 01/12/2020 05:56:48 Host: 118.232.236.128/118.232.236.128 Port: 445 TCP Blocked
2020-01-12 14:56:43
116.31.105.198 attackbotsspam
Unauthorized connection attempt detected from IP address 116.31.105.198 to port 2220 [J]
2020-01-12 15:03:51
179.154.239.138 attackbotsspam
Invalid user tim from 179.154.239.138 port 45266
pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=179.154.239.138
Failed password for invalid user tim from 179.154.239.138 port 45266 ssh2
Invalid user test from 179.154.239.138 port 41220
pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=179.154.239.138
2020-01-12 15:00:25
221.122.67.66 attack
Unauthorized connection attempt detected from IP address 221.122.67.66 to port 2220 [J]
2020-01-12 15:01:42
186.67.147.92 attackspam
Portscan or hack attempt detected by psad/fwsnort
2020-01-12 14:56:21
166.62.80.166 attack
Jan 12 06:23:43 vmd17057 sshd\[32661\]: Invalid user admin from 166.62.80.166 port 56840
Jan 12 06:23:43 vmd17057 sshd\[32661\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=166.62.80.166
Jan 12 06:23:46 vmd17057 sshd\[32661\]: Failed password for invalid user admin from 166.62.80.166 port 56840 ssh2
...
2020-01-12 14:53:55
66.249.72.23 attack
Unauthorized connection attempt detected from IP address 66.249.72.23 to port 80
2020-01-12 15:06:25
61.94.213.78 attack
1578804987 - 01/12/2020 05:56:27 Host: 61.94.213.78/61.94.213.78 Port: 445 TCP Blocked
2020-01-12 15:08:44
159.203.201.11 attackspambots
Unauthorized connection attempt detected from IP address 159.203.201.11 to port 990
2020-01-12 14:59:05
197.38.106.71 attack
unauthorized connection attempt
2020-01-12 14:22:27

Recently Reported IPs

186.77.202.165 94.249.25.172 3.86.246.47 87.207.49.195
45.57.71.144 41.205.47.65 87.233.17.245 45.57.41.1
78.128.112.102 193.201.224.76 87.193.219.194 71.6.233.154
219.166.7.216 177.10.216.37 23.96.5.219 197.248.24.18
13.251.238.253 188.131.186.207 134.73.7.202 170.79.182.100