Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Thailand

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
% [whois.apnic.net]
% Whois data copyright terms    http://www.apnic.net/db/dbcopyright.html

% Information related to '103.14.164.0 - 103.14.164.255'

% Abuse contact for '103.14.164.0 - 103.14.164.255' is 'abuse@siam-ns.net'

inetnum:        103.14.164.0 - 103.14.164.255
netname:        TRUE-Corporate
descr:          TRUE INTERNET CO.,LTD.
country:        TH
admin-c:        BW1011-AP
tech-c:         BW1011-AP
abuse-c:        BW1011-AP
status:         ASSIGNED NON-PORTABLE
mnt-by:         MAINT-SIAM-NET-TH
mnt-irt:        IRT-SIAM-NET-TH
last-modified:  2025-05-06T21:49:27Z
remarks:        Geofeed http://bunnycommunications.com/geofeed.csv
source:         APNIC

irt:            IRT-SIAM-NET-TH
address:        94/99(Room No.709),Floor7,Ratchada City,Condo,Pratcharachbumpen,Huay-kwang,Bangkok,10310,Thailand
e-mail:         info@siam-ns.net
abuse-mailbox:  abuse@siam-ns.net
admin-c:        SNSC1-AP
tech-c:         SNSC1-AP
auth:           # Filtered
remarks:        info@siam-ns.net was validated on 2026-02-17
remarks:        abuse@siam-ns.net was validated on 2026-02-17
mnt-by:         MAINT-SIAM-NET-TH
last-modified:  2026-02-17T21:46:59Z
source:         APNIC

person:         Bunny Wu
address:        5 Brewster Street, #2039, Glen Cove, NY 11542
country:        US
phone:          +1-4246668389
e-mail:         wu@bunnycommunications.com
nic-hdl:        BW1011-AP
mnt-by:         MAINT-DIL-JP
last-modified:  2025-04-13T10:10:52Z
source:         APNIC

% Information related to '103.14.164.0/24AS38082'

route:          103.14.164.0/24
origin:         AS38082
descr:          SIAM NETWORK SERVICE CO., LTD.
                94/99(Room No.709),Floor7,
                Ratchada City,Condo,
                Pratcharachbumpen
mnt-by:         MAINT-SIAM-NET-TH
last-modified:  2024-11-06T23:34:23Z
source:         APNIC

% This query was served by the APNIC Whois Service version 1.88.36-SNAPSHOT (WHOIS-AU5)
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 103.14.164.114
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 50624
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;103.14.164.114.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2026030201 1800 900 604800 86400

;; Query time: 32 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Mar 03 12:26:23 CST 2026
;; MSG SIZE  rcvd: 107
Host info
Host 114.164.14.103.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 114.164.14.103.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
157.55.39.29 attackbots
Automatic report - Banned IP Access
2020-05-02 22:06:56
69.28.234.137 attackspam
May  2 15:31:34 server sshd[32517]: Failed password for invalid user user from 69.28.234.137 port 34749 ssh2
May  2 15:45:44 server sshd[1144]: Failed password for invalid user mai from 69.28.234.137 port 51066 ssh2
May  2 15:59:50 server sshd[1719]: Failed password for invalid user mn from 69.28.234.137 port 39247 ssh2
2020-05-02 22:17:32
141.98.9.137 attackspam
Brute-force attempt banned
2020-05-02 22:21:53
106.12.55.112 attackbots
May  2 17:13:35 gw1 sshd[15945]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.55.112
May  2 17:13:37 gw1 sshd[15945]: Failed password for invalid user ofsaa from 106.12.55.112 port 48764 ssh2
...
2020-05-02 22:27:54
106.38.241.145 attackbots
Automatic report - Banned IP Access
2020-05-02 22:45:12
195.154.133.163 attackspambots
195.154.133.163 - - [02/May/2020:18:07:35 +0400] "POST /GponForm/diag_Form?style/ HTTP/1.1" 502 157 "-" "curl/7.3.2"
...
2020-05-02 22:11:27
64.227.37.54 attackspam
SSH-bruteforce attempts
2020-05-02 22:29:09
118.27.24.127 attackbotsspam
leo_www
2020-05-02 22:47:16
139.59.17.33 attack
May  2 14:45:16 [host] sshd[22168]: Invalid user a
May  2 14:45:16 [host] sshd[22168]: pam_unix(sshd:
May  2 14:45:18 [host] sshd[22168]: Failed passwor
2020-05-02 22:46:22
190.85.54.158 attackbots
May  2 14:27:24 inter-technics sshd[20464]: Invalid user test from 190.85.54.158 port 41169
May  2 14:27:24 inter-technics sshd[20464]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=190.85.54.158
May  2 14:27:24 inter-technics sshd[20464]: Invalid user test from 190.85.54.158 port 41169
May  2 14:27:26 inter-technics sshd[20464]: Failed password for invalid user test from 190.85.54.158 port 41169 ssh2
May  2 14:31:58 inter-technics sshd[21446]: Invalid user teapot from 190.85.54.158 port 46098
...
2020-05-02 22:26:22
5.39.75.36 attack
May  2 13:53:36 *** sshd[8292]: Invalid user sistema from 5.39.75.36
2020-05-02 22:48:29
104.236.112.52 attack
2020-05-02T14:08:10.015291randservbullet-proofcloud-66.localdomain sshd[16075]: Invalid user ijc from 104.236.112.52 port 48216
2020-05-02T14:08:10.019643randservbullet-proofcloud-66.localdomain sshd[16075]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.236.112.52
2020-05-02T14:08:10.015291randservbullet-proofcloud-66.localdomain sshd[16075]: Invalid user ijc from 104.236.112.52 port 48216
2020-05-02T14:08:11.893954randservbullet-proofcloud-66.localdomain sshd[16075]: Failed password for invalid user ijc from 104.236.112.52 port 48216 ssh2
...
2020-05-02 22:41:47
106.13.162.168 attackspambots
MultiHost/MultiPort Probe, Scan, Hack -
2020-05-02 22:32:14
89.39.208.21 attack
xmlrpc attack
2020-05-02 22:44:25
151.177.154.199 attackbots
Port probing on unauthorized port 23
2020-05-02 22:32:47

Recently Reported IPs

144.56.43.161 2606:4700:10::ac43:2219 2606:4700:10::6816:4507 2606:4700:10::6816:581
110.78.156.136 2606:4700:10::6816:754 2606:4700:10::6814:8729 2606:4700:10::6816:3198
2606:4700:10::6814:4443 2606:4700:10::6814:7555 2606:4700:10::6816:2883 2606:4700:10::6814:4515
2606:4700:10::ac43:2222 2606:4700:10::6814:7093 2606:4700:10::6814:9475 20.63.41.168
20.64.105.82 121.234.219.102 2606:4700:10::6816:1308 2606:4700:10::6816:1041