Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Viet Nam

Internet Service Provider: Vietnam Posts and Telecommunications Group

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
Type Details Datetime
attackbots
Jan 10 04:53:40 ms-srv sshd[61404]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=14.248.214.91
Jan 10 04:53:43 ms-srv sshd[61404]: Failed password for invalid user admin from 14.248.214.91 port 37869 ssh2
2020-01-10 16:10:58
Comments on same subnet:
IP Type Details Datetime
14.248.214.157 attack
Mar 10 11:21:24 taivassalofi sshd[5414]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=14.248.214.157
Mar 10 11:21:26 taivassalofi sshd[5414]: Failed password for invalid user ubnt from 14.248.214.157 port 60746 ssh2
...
2020-03-10 22:57:20
14.248.214.194 attackspambots
Jan  1 07:21:49 pl3server sshd[29293]: Address 14.248.214.194 maps to static.vnpt.vn, but this does not map back to the address - POSSIBLE BREAK-IN ATTEMPT!
Jan  1 07:21:49 pl3server sshd[29293]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=14.248.214.194  user=r.r
Jan  1 07:21:51 pl3server sshd[29293]: Failed password for r.r from 14.248.214.194 port 51200 ssh2
Jan  1 07:21:51 pl3server sshd[29293]: Connection closed by 14.248.214.194 [preauth]


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=14.248.214.194
2020-01-01 15:35:43
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 14.248.214.91
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 37672
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;14.248.214.91.			IN	A

;; AUTHORITY SECTION:
.			504	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2020011000 1800 900 604800 86400

;; Query time: 126 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Jan 10 16:10:53 CST 2020
;; MSG SIZE  rcvd: 117
Host info
91.214.248.14.in-addr.arpa domain name pointer static.vnpt.vn.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
91.214.248.14.in-addr.arpa	name = static.vnpt.vn.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
172.105.4.227 attack
Unauthorized connection attempt detected from IP address 172.105.4.227 to port 80 [T]
2020-01-06 02:50:17
121.163.48.30 attackspambots
Unauthorized connection attempt detected from IP address 121.163.48.30 to port 81 [J]
2020-01-06 02:25:43
187.10.204.142 attackspam
Unauthorized connection attempt detected from IP address 187.10.204.142 to port 80
2020-01-06 02:19:14
191.255.240.23 attack
Unauthorized connection attempt detected from IP address 191.255.240.23 to port 445
2020-01-06 02:43:50
189.165.147.204 attack
Unauthorized connection attempt detected from IP address 189.165.147.204 to port 8080
2020-01-06 02:17:01
156.96.151.237 attackspambots
Unauthorized connection attempt detected from IP address 156.96.151.237 to port 25 [J]
2020-01-06 02:23:04
181.129.112.130 attack
Unauthorized connection attempt detected from IP address 181.129.112.130 to port 445
2020-01-06 02:21:06
52.77.33.79 attackspambots
k+ssh-bruteforce
2020-01-06 02:35:47
201.168.156.34 attackbots
Unauthorized connection attempt detected from IP address 201.168.156.34 to port 81 [J]
2020-01-06 02:41:03
155.133.1.122 attackspambots
Unauthorized connection attempt detected from IP address 155.133.1.122 to port 23
2020-01-06 02:23:32
175.214.73.251 attackspambots
Unauthorized connection attempt detected from IP address 175.214.73.251 to port 80 [J]
2020-01-06 02:21:54
187.175.11.229 attack
Unauthorized connection attempt detected from IP address 187.175.11.229 to port 4567 [J]
2020-01-06 02:18:15
5.235.227.71 attack
Unauthorized connection attempt detected from IP address 5.235.227.71 to port 80
2020-01-06 02:37:54
200.236.98.145 attackbots
Unauthorized connection attempt detected from IP address 200.236.98.145 to port 23
2020-01-06 02:15:09
198.186.13.20 attackspambots
Automatic report - Port Scan Attack
2020-01-06 02:43:03

Recently Reported IPs

177.190.145.196 209.132.157.67 2.226.12.12 103.74.123.41
61.250.146.33 220.80.184.135 103.143.127.3 14.102.2.21
124.158.179.36 141.215.123.24 42.56.70.168 140.63.117.72
140.43.28.10 71.116.247.124 37.52.200.164 203.62.168.75
38.106.34.139 227.5.80.163 173.236.155.141 160.205.250.55