Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 23.14.157.106
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 21093
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;23.14.157.106.			IN	A

;; AUTHORITY SECTION:
.			599	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022021801 1800 900 604800 86400

;; Query time: 58 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Feb 19 02:24:48 CST 2022
;; MSG SIZE  rcvd: 106
Host info
106.157.14.23.in-addr.arpa domain name pointer a23-14-157-106.deploy.static.akamaitechnologies.com.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
106.157.14.23.in-addr.arpa	name = a23-14-157-106.deploy.static.akamaitechnologies.com.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
185.176.27.246 attackspam
Feb 17 01:17:56 debian-2gb-nbg1-2 kernel: \[4157895.595935\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=185.176.27.246 DST=195.201.40.59 LEN=40 TOS=0x00 PREC=0x00 TTL=246 ID=17162 PROTO=TCP SPT=40930 DPT=7052 WINDOW=1024 RES=0x00 SYN URGP=0
2020-02-17 08:58:00
106.12.178.82 attackspambots
sshd jail - ssh hack attempt
2020-02-17 09:01:45
189.208.62.132 attack
MultiHost/MultiPort Probe, Scan, Hack -
2020-02-17 08:59:40
114.233.111.223 spamattack
[2020/02/17 01:42:24] [114.233.111.223:2095-0] User leslie@luxnetcorp.com.tw AUTH fails.
[2020/02/17 01:42:25] [114.233.111.223:2103-0] User leslie@luxnetcorp.com.tw AUTH fails.
[2020/02/17 01:42:36] [114.233.111.223:2098-0] User leslie@luxnetcorp.com.tw AUTH fails.
[2020/02/17 01:43:25] [114.233.111.223:2102-0] User leslie@luxnetcorp.com.tw AUTH fails.
[2020/02/17 01:43:31] [114.233.111.223:2099-0] User leslie@luxnetcorp.com.tw AUTH fails.
[2020/02/17 01:44:02] [114.233.111.223:2103-0] User leslie@luxnetcorp.com.tw AUTH fails.
[2020/02/17 01:44:33] [114.233.111.223:2103-0] User leslie@luxnetcorp.com.tw AUTH fails.
2020-02-17 09:10:44
8.33.33.137 attack
Feb 16 23:25:33 163-172-32-151 sshd[27161]: Invalid user backup from 8.33.33.137 port 51332
...
2020-02-17 08:40:46
49.85.98.183 spamattack
[2020/02/17 00:38:20] [49.85.98.183:2105-0] User leslie@luxnetcorp.com.tw AUTH fails.
[2020/02/17 00:38:21] [49.85.98.183:2098-0] User leslie@luxnetcorp.com.tw AUTH fails.
[2020/02/17 00:39:10] [49.85.98.183:2105-0] User leslie@luxnetcorp.com.tw AUTH fails.
[2020/02/17 00:39:11] [49.85.98.183:2097-0] User leslie@luxnetcorp.com.tw AUTH fails.
[2020/02/17 00:39:15] [49.85.98.183:2102-0] User leslie@luxnetcorp.com.tw AUTH fails.
[2020/02/17 00:39:17] [49.85.98.183:2097-0] User leslie@luxnetcorp.com.tw AUTH fails.
[2020/02/17 00:39:20] [49.85.98.183:2095-0] User leslie@luxnetcorp.com.tw AUTH fails.
2020-02-17 09:12:29
80.232.252.82 attack
Feb 16 14:08:02 hpm sshd\[8932\]: Invalid user zeph from 80.232.252.82
Feb 16 14:08:02 hpm sshd\[8932\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=80.232.252.82
Feb 16 14:08:05 hpm sshd\[8932\]: Failed password for invalid user zeph from 80.232.252.82 port 40390 ssh2
Feb 16 14:14:09 hpm sshd\[9856\]: Invalid user testing from 80.232.252.82
Feb 16 14:14:09 hpm sshd\[9856\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=80.232.252.82
2020-02-17 09:00:29
45.143.220.3 attackbots
[2020-02-16 18:43:21] NOTICE[1148] chan_sip.c: Registration from '"700" ' failed for '45.143.220.3:6149' - Wrong password
[2020-02-16 18:43:21] SECURITY[1163] res_security_log.c: SecurityEvent="InvalidPassword",EventTV="2020-02-16T18:43:21.704-0500",Severity="Error",Service="SIP",EventVersion="2",AccountID="700",SessionID="0x7fd82c9bc688",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/45.143.220.3/6149",Challenge="25d392f8",ReceivedChallenge="25d392f8",ReceivedHash="13c255886106f032faa00ff084c72144"
[2020-02-16 18:43:21] NOTICE[1148] chan_sip.c: Registration from '"700" ' failed for '45.143.220.3:6149' - Wrong password
[2020-02-16 18:43:21] SECURITY[1163] res_security_log.c: SecurityEvent="InvalidPassword",EventTV="2020-02-16T18:43:21.714-0500",Severity="Error",Service="SIP",EventVersion="2",AccountID="700",SessionID="0x7fd82c7af4d8",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/45.143.220.
...
2020-02-17 08:41:26
158.69.194.115 attack
Invalid user ruess from 158.69.194.115 port 37339
2020-02-17 09:05:17
189.208.62.134 attackbots
MultiHost/MultiPort Probe, Scan, Hack -
2020-02-17 08:54:38
93.113.133.100 attackspambots
Brute force attack to crack SMTP password (port 25 / 587)
2020-02-17 09:10:27
203.185.61.137 attackbotsspam
Feb 16 23:14:57 server sshd[244013]: Failed password for invalid user cobra from 203.185.61.137 port 45986 ssh2
Feb 16 23:25:13 server sshd[244424]: Failed password for invalid user backups from 203.185.61.137 port 48198 ssh2
Feb 16 23:28:06 server sshd[244702]: Failed password for invalid user upload from 203.185.61.137 port 48712 ssh2
2020-02-17 09:02:17
180.76.119.77 attack
Feb 17 01:11:33 legacy sshd[17415]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.76.119.77
Feb 17 01:11:35 legacy sshd[17415]: Failed password for invalid user developer from 180.76.119.77 port 56578 ssh2
Feb 17 01:19:02 legacy sshd[17866]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.76.119.77
...
2020-02-17 08:53:20
34.93.238.77 attackspam
Unauthorized SSH login attempts
2020-02-17 09:13:12
175.12.245.226 attackspambots
(ftpd) Failed FTP login from 175.12.245.226 (CN/China/-): 10 in the last 3600 secs
2020-02-17 08:57:03

Recently Reported IPs

23.14.154.161 23.138.32.193 23.14.155.12 23.138.144.45
23.14.86.138 23.14.86.136 23.14.86.137 23.14.86.139
23.14.86.152 23.14.86.144 23.14.86.153 23.14.86.147
23.14.86.155 23.14.86.154 3.99.168.94 23.14.86.146
23.14.86.160 23.14.86.161 23.14.86.163 23.14.86.168