Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: None

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 14.207.104.55
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 40873
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;14.207.104.55.			IN	A

;; AUTHORITY SECTION:
.			574	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022022601 1800 900 604800 86400

;; Query time: 64 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Feb 27 13:17:56 CST 2022
;; MSG SIZE  rcvd: 106
Host info
55.104.207.14.in-addr.arpa domain name pointer mx-ll-14.207.104-55.dynamic.3bb.in.th.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
55.104.207.14.in-addr.arpa	name = mx-ll-14.207.104-55.dynamic.3bb.in.th.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
104.243.25.75 attack
Invalid user hermes from 104.243.25.75 port 59326
2020-08-22 13:20:16
196.52.43.125 attackspam
srv02 Mass scanning activity detected Target: 6002(x11-2) ..
2020-08-22 13:45:25
206.189.128.158 attack
206.189.128.158 - - \[22/Aug/2020:05:59:25 +0200\] "POST /wp-login.php HTTP/1.0" 200 5983 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0"
206.189.128.158 - - \[22/Aug/2020:05:59:32 +0200\] "POST /wp-login.php HTTP/1.0" 200 5815 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0"
206.189.128.158 - - \[22/Aug/2020:05:59:33 +0200\] "POST /xmlrpc.php HTTP/1.0" 200 736 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0"
2020-08-22 13:44:37
118.89.153.180 attack
2020-08-22T04:26:03.624965shield sshd\[29415\]: Invalid user cid from 118.89.153.180 port 59500
2020-08-22T04:26:03.633741shield sshd\[29415\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.89.153.180
2020-08-22T04:26:06.077648shield sshd\[29415\]: Failed password for invalid user cid from 118.89.153.180 port 59500 ssh2
2020-08-22T04:30:32.498994shield sshd\[30966\]: Invalid user www from 118.89.153.180 port 59712
2020-08-22T04:30:32.510107shield sshd\[30966\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.89.153.180
2020-08-22 13:14:00
212.70.149.68 attack
2020-08-21T23:24:52.751137linuxbox-skyline auth[43961]: pam_unix(dovecot:auth): authentication failure; logname= uid=0 euid=0 tty=dovecot ruser=rest rhost=212.70.149.68
...
2020-08-22 13:26:33
122.51.223.155 attackbots
Aug 22 06:08:06 srv-ubuntu-dev3 sshd[27368]: Invalid user oracle from 122.51.223.155
Aug 22 06:08:06 srv-ubuntu-dev3 sshd[27368]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.51.223.155
Aug 22 06:08:06 srv-ubuntu-dev3 sshd[27368]: Invalid user oracle from 122.51.223.155
Aug 22 06:08:07 srv-ubuntu-dev3 sshd[27368]: Failed password for invalid user oracle from 122.51.223.155 port 41246 ssh2
Aug 22 06:12:35 srv-ubuntu-dev3 sshd[27909]: Invalid user paris from 122.51.223.155
Aug 22 06:12:35 srv-ubuntu-dev3 sshd[27909]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.51.223.155
Aug 22 06:12:35 srv-ubuntu-dev3 sshd[27909]: Invalid user paris from 122.51.223.155
Aug 22 06:12:37 srv-ubuntu-dev3 sshd[27909]: Failed password for invalid user paris from 122.51.223.155 port 33714 ssh2
Aug 22 06:17:07 srv-ubuntu-dev3 sshd[28470]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser
...
2020-08-22 13:24:24
207.250.96.211 attack
SMB Server BruteForce Attack
2020-08-22 13:14:32
61.133.232.253 attack
Aug 22 06:32:14 mellenthin sshd[23606]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.133.232.253  user=root
Aug 22 06:32:16 mellenthin sshd[23606]: Failed password for invalid user root from 61.133.232.253 port 34348 ssh2
2020-08-22 13:30:03
106.54.127.159 attack
Aug 22 05:37:26 havingfunrightnow sshd[7408]: Failed password for root from 106.54.127.159 port 46268 ssh2
Aug 22 05:55:06 havingfunrightnow sshd[7925]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.54.127.159 
Aug 22 05:55:08 havingfunrightnow sshd[7925]: Failed password for invalid user cym from 106.54.127.159 port 47812 ssh2
...
2020-08-22 12:58:19
183.111.206.111 attack
Aug 22 01:16:16 ny01 sshd[29414]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=183.111.206.111
Aug 22 01:16:18 ny01 sshd[29414]: Failed password for invalid user 2 from 183.111.206.111 port 23150 ssh2
Aug 22 01:22:13 ny01 sshd[30107]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=183.111.206.111
2020-08-22 13:25:39
188.166.217.55 attackspambots
$f2bV_matches
2020-08-22 13:45:03
118.68.136.81 attackbots
Automatic report - Port Scan Attack
2020-08-22 13:27:41
216.144.228.130 attackbots
Dovecot Invalid User Login Attempt.
2020-08-22 13:43:58
178.175.131.194 attackspam
failed_logins
2020-08-22 13:17:25
42.115.215.222 attackspam
20/8/21@23:54:41: FAIL: Alarm-Network address from=42.115.215.222
20/8/21@23:54:41: FAIL: Alarm-Network address from=42.115.215.222
...
2020-08-22 13:19:03

Recently Reported IPs

14.207.105.254 14.207.106.223 14.207.103.95 14.207.105.65
14.207.106.250 14.207.11.102 14.207.106.8 14.207.105.54
14.207.11.11 14.207.11.104 14.207.11.124 14.207.11.114
14.207.11.128 14.207.11.110 14.207.11.135 14.207.11.149
14.207.11.126 14.207.11.150 14.207.11.132 14.207.11.160