Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Viet Nam

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 14.250.214.195
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 35024
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;14.250.214.195.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025021102 1800 900 604800 86400

;; Query time: 10 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Feb 12 07:55:07 CST 2025
;; MSG SIZE  rcvd: 107
Host info
195.214.250.14.in-addr.arpa domain name pointer static.vnpt.vn.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
195.214.250.14.in-addr.arpa	name = static.vnpt.vn.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
42.119.63.207 attack
445/tcp
[2020-03-16]1pkt
2020-03-17 07:03:34
103.26.40.145 attack
Mar 16 23:48:46 xeon sshd[885]: Failed password for root from 103.26.40.145 port 39619 ssh2
2020-03-17 07:06:18
14.231.145.190 attackbots
445/tcp
[2020-03-16]1pkt
2020-03-17 06:42:24
142.93.216.193 attack
SSH bruteforce (Triggered fail2ban)
2020-03-17 06:42:03
144.121.28.206 attackbotsspam
Mar 16 08:06:53 mockhub sshd[29129]: Failed password for root from 144.121.28.206 port 59104 ssh2
...
2020-03-17 06:45:21
197.40.244.78 attackspambots
23/tcp
[2020-03-16]1pkt
2020-03-17 06:44:47
202.88.252.53 attack
SSH Invalid Login
2020-03-17 07:04:36
112.133.251.213 attackbotsspam
445/tcp
[2020-03-16]1pkt
2020-03-17 06:52:27
163.172.150.2 attack
Mar 16 21:12:22 ks10 sshd[2584204]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=163.172.150.2 
Mar 16 21:12:25 ks10 sshd[2584204]: Failed password for invalid user operator from 163.172.150.2 port 60334 ssh2
...
2020-03-17 06:28:19
168.227.95.252 attackspambots
Unauthorized connection attempt detected from IP address 168.227.95.252 to port 445
2020-03-17 07:07:27
93.119.232.188 attack
Port probing on unauthorized port 26
2020-03-17 06:52:58
194.26.29.14 attackbots
Mar 17 00:04:34 debian-2gb-nbg1-2 kernel: \[6658992.707069\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=194.26.29.14 DST=195.201.40.59 LEN=40 TOS=0x00 PREC=0x00 TTL=241 ID=354 PROTO=TCP SPT=51398 DPT=6221 WINDOW=1024 RES=0x00 SYN URGP=0
2020-03-17 07:11:01
185.156.73.42 attackspambots
03/16/2020-18:26:17.221262 185.156.73.42 Protocol: 6 ET SCAN NMAP -sS window 1024
2020-03-17 06:49:52
64.227.35.131 attackbots
Invalid user zhangbo from 64.227.35.131 port 32832
2020-03-17 06:36:25
171.245.98.7 attackbots
445/tcp
[2020-03-16]1pkt
2020-03-17 06:54:31

Recently Reported IPs

215.132.175.139 3.251.130.91 214.109.81.55 232.1.73.97
144.40.220.216 77.146.164.32 130.8.177.207 179.143.220.242
193.77.176.224 197.17.237.254 88.178.139.221 208.176.189.131
64.28.109.134 99.123.68.221 62.254.25.6 150.247.107.142
87.123.120.211 17.183.109.40 240.106.50.127 124.207.30.162