城市(city): unknown
省份(region): unknown
国家(country): Vietnam
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
% [whois.apnic.net]
% Whois data copyright terms http://www.apnic.net/db/dbcopyright.html
% Information related to '14.224.0.0 - 14.255.255.255'
% Abuse contact for '14.224.0.0 - 14.255.255.255' is 'hm-changed@vnnic.vn'
inetnum: 14.224.0.0 - 14.255.255.255
netname: VNPT-VN
descr: Vietnam Posts and Telecommunications Group
descr: No 57, Huynh Thuc Khang Street, Lang Ha ward, Dong Da district, Ha Noi City
country: VN
admin-c: PTH13-AP
tech-c: PTH13-AP
remarks: for admin contact mail to Nguyen Xuan Cuong -->NXC1-AP
remarks: for Tech contact mail to Nguyen Hien Khanh --> KNH1-AP
status: ALLOCATED PORTABLE
mnt-by: MAINT-VN-VNNIC
mnt-lower: MAINT-VN-VNPT
mnt-routes: MAINT-VN-VNPT
last-modified: 2018-01-25T03:55:18Z
mnt-irt: IRT-VNNIC-AP
source: APNIC
irt: IRT-VNNIC-AP
address: Ha Noi, VietNam
phone: +84-24-35564944
fax-no: +84-24-37821462
e-mail: hm-changed@vnnic.vn
abuse-mailbox: hm-changed@vnnic.vn
admin-c: NTTT1-AP
tech-c: NTTT1-AP
auth: # Filtered
mnt-by: MAINT-VN-VNNIC
last-modified: 2026-04-21T02:07:47Z
source: APNIC
person: Pham Tien Huy
address: VNPT-VN
country: VN
phone: +84-24-37741604
e-mail: huypt@vnpt.vn
nic-hdl: PTH13-AP
mnt-by: MAINT-VN-VNPT
last-modified: 2017-11-19T07:06:20Z
source: APNIC
% Information related to '14.225.80.0/24AS135905'
route: 14.225.80.0/24
descr: VNPT
origin: AS135905
mnt-by: MAINT-VN-VNPT
last-modified: 2022-07-29T16:14:06Z
source: APNIC
% This query was served by the APNIC Whois Service version 1.88.48 (WHOIS-AU5)
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 14.225.80.128
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 35897
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;14.225.80.128. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2026043000 1800 900 604800 86400
;; Query time: 5 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Apr 30 16:13:22 CST 2026
;; MSG SIZE rcvd: 106
128.80.225.14.in-addr.arpa domain name pointer static.vnpt.vn.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
128.80.225.14.in-addr.arpa name = static.vnpt.vn.
Authoritative answers can be found from:
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 78.186.118.47 | attackspam | firewall-block, port(s): 23/tcp |
2019-07-29 12:50:48 |
| 203.98.96.180 | attack | SMB Server BruteForce Attack |
2019-07-29 12:49:24 |
| 129.226.61.209 | attack | DATE:2019-07-29 05:37:43, IP:129.226.61.209, PORT:ssh SSH brute force auth (thor) |
2019-07-29 12:46:19 |
| 123.7.178.136 | attackbots | Automatic report - Banned IP Access |
2019-07-29 12:45:35 |
| 190.4.184.84 | attackspambots | RDP Bruteforce |
2019-07-29 13:07:14 |
| 185.122.200.114 | attackbots | 19/7/28@22:33:06: FAIL: Alarm-Intrusion address from=185.122.200.114 ... |
2019-07-29 12:38:55 |
| 50.207.12.103 | attackspam | Jul 29 04:43:15 h2177944 sshd\[9394\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=50.207.12.103 user=root Jul 29 04:43:16 h2177944 sshd\[9394\]: Failed password for root from 50.207.12.103 port 38798 ssh2 Jul 29 04:47:45 h2177944 sshd\[9473\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=50.207.12.103 user=root Jul 29 04:47:47 h2177944 sshd\[9473\]: Failed password for root from 50.207.12.103 port 34184 ssh2 ... |
2019-07-29 12:31:08 |
| 134.73.161.149 | attack | Jul 28 23:16:43 xeon sshd[11624]: Failed password for root from 134.73.161.149 port 45354 ssh2 |
2019-07-29 12:48:15 |
| 123.206.178.65 | attackbotsspam | 2019-07-29T04:19:17.191511abusebot-7.cloudsearch.cf sshd\[19290\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=123.206.178.65 user=root |
2019-07-29 13:20:23 |
| 94.191.64.101 | attackbots | SSH/22 MH Probe, BF, Hack - |
2019-07-29 13:22:40 |
| 54.38.65.227 | attackspambots | Rude login attack (6 tries in 1d) |
2019-07-29 13:13:20 |
| 206.189.134.83 | attackbots | Triggered by Fail2Ban |
2019-07-29 13:05:39 |
| 93.103.64.187 | attackspam | 20 attempts against mh-ssh on cell.magehost.pro |
2019-07-29 12:50:14 |
| 167.71.201.123 | attack | Jul 29 06:55:54 tux-35-217 sshd\[23133\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.71.201.123 user=root Jul 29 06:55:56 tux-35-217 sshd\[23133\]: Failed password for root from 167.71.201.123 port 35762 ssh2 Jul 29 07:02:55 tux-35-217 sshd\[23137\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.71.201.123 user=root Jul 29 07:02:56 tux-35-217 sshd\[23137\]: Failed password for root from 167.71.201.123 port 48824 ssh2 ... |
2019-07-29 13:11:57 |
| 223.99.192.25 | attackbotsspam | Jul 29 03:42:52 localhost sshd\[1969\]: Invalid user honda from 223.99.192.25 port 16026 Jul 29 03:42:52 localhost sshd\[1969\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=223.99.192.25 Jul 29 03:42:54 localhost sshd\[1969\]: Failed password for invalid user honda from 223.99.192.25 port 16026 ssh2 |
2019-07-29 13:22:10 |