Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: None

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 103.14.14.164
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 44732
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;103.14.14.164.			IN	A

;; AUTHORITY SECTION:
.			570	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022051801 1800 900 604800 86400

;; Query time: 68 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu May 19 02:51:13 CST 2022
;; MSG SIZE  rcvd: 106
Host info
164.14.14.103.in-addr.arpa domain name pointer 103-14-14-164.c3.ptr.chiroro.ne.jp.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
164.14.14.103.in-addr.arpa	name = 103-14-14-164.c3.ptr.chiroro.ne.jp.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
222.142.232.249 attackspam
" "
2019-06-22 17:58:37
193.32.161.150 attackbots
Jun 22 05:39:24   TCP Attack: SRC=193.32.161.150 DST=[Masked] LEN=40 TOS=0x08 PREC=0x20 TTL=244  PROTO=TCP SPT=41826 DPT=33923 WINDOW=1024 RES=0x00 SYN URGP=0
2019-06-22 17:29:34
89.103.27.45 attack
Jun 22 02:11:48 plusreed sshd[32320]: Invalid user marketing from 89.103.27.45
...
2019-06-22 17:56:48
113.255.21.140 attackspambots
2019-06-22T07:49:43.479436centos sshd\[11512\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=113.255.21.140  user=root
2019-06-22T07:49:45.189453centos sshd\[11512\]: Failed password for root from 113.255.21.140 port 36287 ssh2
2019-06-22T07:49:49.024233centos sshd\[11512\]: Failed password for root from 113.255.21.140 port 36287 ssh2
2019-06-22 17:34:03
185.220.102.6 attack
Failed password for root from 185.220.102.6 port 34261 ssh2
Failed password for root from 185.220.102.6 port 34261 ssh2
error: maximum authentication attempts exceeded for root from 185.220.102.6 port 34261 ssh2 \[preauth\]
pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=185.220.102.6  user=root
Failed password for root from 185.220.102.6 port 45139 ssh2
2019-06-22 17:46:35
159.89.177.46 attackspambots
$f2bV_matches
2019-06-22 17:19:48
218.92.0.208 attackspambots
Jun 22 07:11:13 dev0-dcde-rnet sshd[4308]: Failed password for root from 218.92.0.208 port 35452 ssh2
Jun 22 07:15:15 dev0-dcde-rnet sshd[4311]: Failed password for root from 218.92.0.208 port 56969 ssh2
2019-06-22 17:18:07
185.100.86.128 attackbotsspam
pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=185.100.86.128  user=root
Failed password for root from 185.100.86.128 port 56826 ssh2
Failed password for root from 185.100.86.128 port 56826 ssh2
Failed password for root from 185.100.86.128 port 56826 ssh2
Failed password for root from 185.100.86.128 port 56826 ssh2
2019-06-22 17:24:36
218.92.1.135 attackspambots
Jun 22 05:15:28 TORMINT sshd\[11211\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.1.135  user=root
Jun 22 05:15:30 TORMINT sshd\[11211\]: Failed password for root from 218.92.1.135 port 42558 ssh2
Jun 22 05:16:49 TORMINT sshd\[11220\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.1.135  user=root
...
2019-06-22 17:35:57
143.208.249.21 attackbotsspam
Jun 21 23:27:02 mailman postfix/smtpd[30647]: warning: unknown[143.208.249.21]: SASL PLAIN authentication failed: authentication failure
2019-06-22 17:57:28
178.74.8.194 attackbotsspam
1561177589 - 06/22/2019 11:26:29 Host: 178.74.8.194/178.74.8.194 Port: 23 TCP Blocked
...
2019-06-22 18:10:27
153.92.0.20 attack
SQL Injection
2019-06-22 18:03:31
186.193.30.18 attack
Jun 18 09:10:25 our-server-hostname postfix/smtpd[18441]: connect from unknown[186.193.30.18]
Jun x@x
Jun x@x
Jun x@x
Jun x@x
Jun 18 09:10:29 our-server-hostname postfix/smtpd[18441]: lost connection after RCPT from unknown[186.193.30.18]
Jun 18 09:10:29 our-server-hostname postfix/smtpd[18441]: disconnect from unknown[186.193.30.18]
Jun 18 11:32:38 our-server-hostname postfix/smtpd[772]: connect from unknown[186.193.30.18]
Jun x@x
Jun x@x
Jun x@x
Jun x@x
Jun x@x
Jun x@x
Jun x@x
Jun x@x
Jun x@x
Jun x@x
Jun x@x
Jun x@x
Jun x@x
Jun x@x
Jun x@x
Jun 18 11:32:51 our-server-hostname postfix/smtpd[772]: lost connection after RCPT from unknown[186.193.30.18]
Jun 18 11:32:51 our-server-hostname postfix/smtpd[772]: disconnect from unknown[186.193.30.18]
Jun 18 12:08:06 our-server-hostname postfix/smtpd[11988]: connect from unknown[186.193.30.18]
Jun x@x
Jun x@x
Jun x@x
Jun x@x
Jun x@x
Jun x@x
Jun x@x
Jun x@x
Jun x@x
Jun x@x
Jun x@x
Jun x@x
Jun x@x
Jun x@x
Jun x@x
Jun x@x
Jun x@x
........
-------------------------------
2019-06-22 18:00:47
45.175.207.85 attackspam
MultiHost/MultiPort Probe, Scan, Hack -
2019-06-22 18:15:02
180.251.221.167 attackbots
TCP port 445 (SMB) attempt blocked by firewall. [2019-06-22 06:25:23]
2019-06-22 18:09:53

Recently Reported IPs

103.14.130.11 103.14.14.89 103.14.196.33 168.192.62.170
103.14.198.163 103.14.20.106 103.14.251.16 103.14.33.83
103.14.34.129 103.14.34.78 103.14.40.190 103.14.41.17
103.14.99.122 103.14.99.37 103.140.126.40 103.140.158.4
103.140.180.14 103.140.180.226 103.140.181.110 103.140.181.65