Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Thailand

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 14.207.168.104
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 54476
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;14.207.168.104.			IN	A

;; AUTHORITY SECTION:
.			599	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022022700 1800 900 604800 86400

;; Query time: 21 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Feb 27 13:24:54 CST 2022
;; MSG SIZE  rcvd: 107
Host info
104.168.207.14.in-addr.arpa domain name pointer mx-ll-14.207.168-104.dynamic.3bb.in.th.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
104.168.207.14.in-addr.arpa	name = mx-ll-14.207.168-104.dynamic.3bb.in.th.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
211.159.186.152 attackspambots
Jun 23 22:31:40 lnxmysql61 sshd[9853]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=211.159.186.152
2020-06-24 07:55:18
189.68.22.239 attack
Unauthorized connection attempt from IP address 189.68.22.239 on Port 445(SMB)
2020-06-24 07:28:08
222.186.173.142 attackspambots
Jun 23 20:42:24 firewall sshd[28663]: Failed password for root from 222.186.173.142 port 5132 ssh2
Jun 23 20:42:27 firewall sshd[28663]: Failed password for root from 222.186.173.142 port 5132 ssh2
Jun 23 20:42:30 firewall sshd[28663]: Failed password for root from 222.186.173.142 port 5132 ssh2
...
2020-06-24 07:51:09
49.233.13.145 attackbotsspam
Invalid user b from 49.233.13.145 port 35900
2020-06-24 07:24:11
106.38.203.230 attackbots
Jun 24 00:25:35 nextcloud sshd\[13599\]: Invalid user amvx from 106.38.203.230
Jun 24 00:25:35 nextcloud sshd\[13599\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.38.203.230
Jun 24 00:25:37 nextcloud sshd\[13599\]: Failed password for invalid user amvx from 106.38.203.230 port 23588 ssh2
2020-06-24 07:30:42
189.86.195.42 attackspam
20/6/23@18:05:25: FAIL: Alarm-Network address from=189.86.195.42
20/6/23@18:05:25: FAIL: Alarm-Network address from=189.86.195.42
...
2020-06-24 07:38:17
150.109.57.43 attackspam
SSH Invalid Login
2020-06-24 07:44:13
39.115.113.146 attack
Jun 23 19:19:58 NPSTNNYC01T sshd[21489]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=39.115.113.146
Jun 23 19:20:00 NPSTNNYC01T sshd[21489]: Failed password for invalid user wangqi from 39.115.113.146 port 30035 ssh2
Jun 23 19:23:40 NPSTNNYC01T sshd[21759]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=39.115.113.146
...
2020-06-24 07:35:16
36.67.88.27 attack
Microsoft SQL Server User Authentication Brute Force Attempt , PTR: PTR record not found
2020-06-24 07:32:04
109.111.250.70 attack
Unauthorized connection attempt from IP address 109.111.250.70 on Port 445(SMB)
2020-06-24 07:24:31
103.210.237.124 attack
Jun 24 00:31:24 pve1 sshd[16530]: Failed password for root from 103.210.237.124 port 39833 ssh2
...
2020-06-24 07:23:19
112.64.33.38 attack
Failed password for invalid user dev from 112.64.33.38 port 51476 ssh2
Invalid user 4 from 112.64.33.38 port 35209
pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.64.33.38
Invalid user 4 from 112.64.33.38 port 35209
Failed password for invalid user 4 from 112.64.33.38 port 35209 ssh2
2020-06-24 07:18:24
187.188.197.81 attack
Unauthorized connection attempt from IP address 187.188.197.81 on Port 445(SMB)
2020-06-24 07:31:47
154.205.252.55 attack
firewall-block, port(s): 1698/tcp
2020-06-24 07:33:41
61.160.96.90 attackbotsspam
Jun 24 01:10:17 lnxweb61 sshd[13477]: Failed password for root from 61.160.96.90 port 19605 ssh2
Jun 24 01:10:17 lnxweb61 sshd[13477]: Failed password for root from 61.160.96.90 port 19605 ssh2
2020-06-24 07:19:37

Recently Reported IPs

14.207.168.101 14.207.168.133 14.207.168.102 14.207.168.16
14.207.168.15 14.207.168.13 14.207.168.157 14.207.168.164
14.207.168.139 14.207.168.180 14.207.168.198 14.207.168.218
14.207.168.184 14.207.168.214 14.207.168.22 14.207.168.197
165.114.41.228 14.207.168.222 14.207.17.104 14.207.17.140