Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Italy

Internet Service Provider: unknown

Hostname: unknown

Organization: Telecom Italia

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:

; <<>> DiG 9.10.3-P4-Ubuntu <<>> 79.48.114.14
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 40268
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;79.48.114.14.			IN	A

;; AUTHORITY SECTION:
.			3600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019060700 1800 900 604800 86400

;; Query time: 3 msec
;; SERVER: 67.207.67.2#53(67.207.67.2)
;; WHEN: Sat Jun 08 01:14:01 CST 2019
;; MSG SIZE  rcvd: 116

Host info
14.114.48.79.in-addr.arpa domain name pointer host14-114-static.48-79-b.business.telecomitalia.it.
Nslookup info:
Server:		67.207.67.2
Address:	67.207.67.2#53

Non-authoritative answer:
14.114.48.79.in-addr.arpa	name = host14-114-static.48-79-b.business.telecomitalia.it.

Authoritative answers can be found from:

Related IP info:
Related comments:
IP Type Details Datetime
77.26.188.72 attackbotsspam
DATE:2019-10-18 13:42:30, IP:77.26.188.72, PORT:telnet Telnet brute force auth on honeypot server (honey-neo-dc)
2019-10-18 21:56:46
159.203.7.104 attackbots
Oct 18 15:33:39 markkoudstaal sshd[3995]: Failed password for root from 159.203.7.104 port 35450 ssh2
Oct 18 15:37:49 markkoudstaal sshd[4375]: Failed password for root from 159.203.7.104 port 46990 ssh2
2019-10-18 21:50:26
91.134.135.220 attackbots
Oct 18 14:28:51 eventyay sshd[3213]: Failed password for root from 91.134.135.220 port 35388 ssh2
Oct 18 14:32:22 eventyay sshd[3273]: Failed password for root from 91.134.135.220 port 44902 ssh2
...
2019-10-18 22:20:55
61.142.103.115 attack
Automatic report - Port Scan
2019-10-18 22:22:13
201.208.40.64 attackspam
IP Ban Report : https://help-dysk.pl/wordpress-firewall-plugins/ip/201.208.40.64/ 
 VE - 1H : (27)  
 Protection Against DDoS WordPress plugin :  
 "odzyskiwanie danych help-dysk" 
 IP Address Ranges by Country : VE 
 NAME ASN : ASN8048 
 
 IP : 201.208.40.64 
 
 CIDR : 201.208.32.0/19 
 
 PREFIX COUNT : 467 
 
 UNIQUE IP COUNT : 2731520 
 
 
 WYKRYTE ATAKI Z ASN8048 :  
  1H - 1 
  3H - 5 
  6H - 7 
 12H - 13 
 24H - 24 
 
 DateTime : 2019-10-18 13:42:39 
 
 INFO :  HACK ! - Looking for resource vulnerabilities Scan Detected and Blocked by ADMIN  - data recovery
2019-10-18 21:48:05
81.106.220.20 attack
Oct 18 14:01:29 microserver sshd[62116]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=81.106.220.20  user=root
Oct 18 14:01:31 microserver sshd[62116]: Failed password for root from 81.106.220.20 port 34235 ssh2
Oct 18 14:05:57 microserver sshd[62770]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=81.106.220.20  user=root
Oct 18 14:05:58 microserver sshd[62770]: Failed password for root from 81.106.220.20 port 54613 ssh2
Oct 18 14:10:02 microserver sshd[62997]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=81.106.220.20  user=root
Oct 18 14:22:28 microserver sshd[64891]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=81.106.220.20  user=root
Oct 18 14:22:31 microserver sshd[64891]: Failed password for root from 81.106.220.20 port 49510 ssh2
Oct 18 14:26:44 microserver sshd[65504]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid
2019-10-18 22:10:09
176.107.131.128 attackspam
Invalid user crysler from 176.107.131.128 port 52478
2019-10-18 22:11:23
188.233.12.59 attackbots
Port 1433 Scan
2019-10-18 21:43:04
187.60.221.92 attack
Automatic report - Port Scan Attack
2019-10-18 22:16:37
14.142.12.242 attackbots
2019-10-18T12:29:28.257270shield sshd\[27772\]: Invalid user AMyaqi!\#\(!\*!\)\#\$\^%SH63536719qll from 14.142.12.242 port 36386
2019-10-18T12:29:28.262590shield sshd\[27772\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=14.142.12.242
2019-10-18T12:29:30.422081shield sshd\[27772\]: Failed password for invalid user AMyaqi!\#\(!\*!\)\#\$\^%SH63536719qll from 14.142.12.242 port 36386 ssh2
2019-10-18T12:33:50.937437shield sshd\[28850\]: Invalid user emmet from 14.142.12.242 port 56468
2019-10-18T12:33:50.943240shield sshd\[28850\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=14.142.12.242
2019-10-18 22:22:44
139.217.103.62 attackbots
Oct 18 15:48:44 legacy sshd[11453]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.217.103.62
Oct 18 15:48:46 legacy sshd[11453]: Failed password for invalid user ts3 from 139.217.103.62 port 42392 ssh2
Oct 18 15:54:31 legacy sshd[11575]: Failed password for root from 139.217.103.62 port 36068 ssh2
...
2019-10-18 22:06:53
61.132.48.122 attackspambots
3389BruteforceFW23
2019-10-18 21:57:05
104.248.205.67 attackspam
Oct 18 15:16:19 localhost sshd\[25194\]: Invalid user mafalda from 104.248.205.67 port 50976
Oct 18 15:16:19 localhost sshd\[25194\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.248.205.67
Oct 18 15:16:22 localhost sshd\[25194\]: Failed password for invalid user mafalda from 104.248.205.67 port 50976 ssh2
2019-10-18 22:13:03
196.216.206.2 attackspambots
$f2bV_matches
2019-10-18 21:41:21
89.211.249.227 attack
Oct 18 13:53:24 sticky sshd\[5495\]: Invalid user jh from 89.211.249.227 port 47913
Oct 18 13:53:24 sticky sshd\[5495\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=89.211.249.227
Oct 18 13:53:26 sticky sshd\[5495\]: Failed password for invalid user jh from 89.211.249.227 port 47913 ssh2
Oct 18 13:57:14 sticky sshd\[5502\]: Invalid user jubuwzkcseo1 from 89.211.249.227 port 38795
Oct 18 13:57:14 sticky sshd\[5502\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=89.211.249.227
...
2019-10-18 22:12:27

Recently Reported IPs

100.102.152.13 68.95.185.27 75.110.136.127 51.20.214.162
37.114.146.179 43.253.246.192 80.213.191.22 157.135.251.153
46.166.167.16 135.10.83.159 3.1.5.229 139.52.19.28
46.166.167.125 135.239.67.69 38.113.213.241 168.228.0.131
173.0.87.153 37.97.245.224 214.72.240.197 151.66.46.104