Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Thailand

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
% [whois.apnic.net]
% Whois data copyright terms    http://www.apnic.net/db/dbcopyright.html

% Information related to '14.207.194.0 - 14.207.194.255'

% Abuse contact for '14.207.194.0 - 14.207.194.255' is 'abuseIPv4@ais.co.th'

inetnum:        14.207.194.0 - 14.207.194.255
netname:        AWN-Customer
descr:          OIC (Office of Insurance Commission) Headquarters- Corporate Internet # 1
country:        TH
admin-c:        SS1413-AP
tech-c:         NI36-AP
abuse-c:        AE626-AP
status:         ASSIGNED NON-PORTABLE
mnt-by:         MAINT-TTBP-TH
mnt-irt:        IRT-EDS-TTBP-TH
last-modified:  2026-04-16T08:18:27Z
source:         APNIC

irt:            IRT-EDS-TTBP-TH
address:        414 Phaholyothin Rd Samsen Nai Phayathai Thailand Bangkok 10400
e-mail:         abuseIPv4@ais.co.th
abuse-mailbox:  abuseIPv4@ais.co.th
admin-c:        TTBP1-AP
tech-c:         TTBP1-AP
auth:           # Filtered
remarks:        abuseipv4@ais.co.th was validated on 2026-02-27
mnt-by:         MAINT-TTBP-TH
last-modified:  2026-02-27T03:34:38Z
source:         APNIC

role:           ABUSE EDSTTBPTH
country:        ZZ
address:        414 Phaholyothin Rd Samsen Nai Phayathai Thailand Bangkok 10400
phone:          +000000000
e-mail:         abuseIPv4@ais.co.th
admin-c:        TTBP1-AP
tech-c:         TTBP1-AP
nic-hdl:        AE626-AP
remarks:        Generated from irt object IRT-EDS-TTBP-TH
remarks:        abuseipv4@ais.co.th was validated on 2026-02-27
abuse-mailbox:  abuseIPv4@ais.co.th
mnt-by:         APNIC-ABUSE
last-modified:  2026-02-27T03:34:54Z
source:         APNIC

role:           SBN Co Ltd IP Planning
address:        408/60 Phaholyothin Place Building 38th floor
address:        Phaholyothin Road, Samsennai,
address:        Phayathai, Bangkok 10400
country:        TH
phone:          +66-2-615-3964
fax-no:         +66-2-619-8777
e-mail:         sitthips@ais.co.th
abuse-mailbox:  abuseipv4@sbn.co.th
admin-c:        SS1413-AP
tech-c:         BS534-AP
nic-hdl:        SS1413-AP
mnt-by:         MAINT-AWN-CO-LTD-TH
last-modified:  2021-11-07T23:30:27Z
source:         APNIC

person:         Naruepon Intarayotha
nic-hdl:        NI36-AP
e-mail:         naruepoi@ais.co.th
address:        Advanced Info Service Public Company Limited
address:        1291/1 Phaholyothin Road, Phayathai, Bangkok 10400, THAILAND
phone:          +6622996000 Ext. 3803
fax-no:         +6622996076
country:        TH
mnt-by:         MAINT-TH-AIS
last-modified:  2008-09-04T07:46:11Z
source:         APNIC

% Information related to '14.207.194.0/24AS138422'

route:          14.207.194.0/24
origin:         AS138422
descr:          Triple T Broadband Public Company Limited
                89 , Cosmo Office Park Building , Popular Road
                Ban Mai Subdistrict ,
mnt-by:         MAINT-TTBP-TH
last-modified:  2026-01-28T04:39:47Z
source:         APNIC

% Information related to '14.207.194.0/24AS45458'

route:          14.207.194.0/24
origin:         AS45458
descr:          Triple T Broadband Public Company Limited
                Jasmine International Tower   200 Moo 4 Chaengwattana Rd.
mnt-by:         MAINT-TTBP-TH
last-modified:  2025-08-14T06:46:16Z
source:         APNIC

% This query was served by the APNIC Whois Service version 1.88.36-SNAPSHOT (WHOIS-AU5)
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 14.207.194.148
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 52614
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;14.207.194.148.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2026041601 1800 900 604800 86400

;; Query time: 8 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Apr 17 00:04:26 CST 2026
;; MSG SIZE  rcvd: 107
Host info
Host 148.194.207.14.in-addr.arpa not found: 2(SERVFAIL)
Nslookup info:
server can't find 14.207.194.148.in-addr.arpa: SERVFAIL
Related IP info:
Related comments:
IP Type Details Datetime
141.255.162.35 attackbots
REQUESTED PAGE: /imaspammer/
2019-11-01 20:09:12
192.144.130.62 attack
Nov  1 10:32:25 v22018086721571380 sshd[31199]: Failed password for invalid user rf from 192.144.130.62 port 23451 ssh2
2019-11-01 19:56:11
103.81.85.21 attackspambots
103.81.85.21 - - [01/Nov/2019:12:54:56 +0100] "GET /wp-login.php HTTP/1.1" 200 1238 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
103.81.85.21 - - [01/Nov/2019:12:54:57 +0100] "POST /wp-login.php HTTP/1.1" 200 1632 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
103.81.85.21 - - [01/Nov/2019:12:54:57 +0100] "GET /wp-login.php HTTP/1.1" 200 1238 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
103.81.85.21 - - [01/Nov/2019:12:54:59 +0100] "POST /wp-login.php HTTP/1.1" 200 1608 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
103.81.85.21 - - [01/Nov/2019:12:54:59 +0100] "GET /wp-login.php HTTP/1.1" 200 1238 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
103.81.85.21 - - [01/Nov/2019:12:55:00 +0100] "POST /wp-login.php HTTP/1.1" 200 1608 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
...
2019-11-01 20:00:56
45.252.248.138 attackbotsspam
xmlrpc attack
2019-11-01 20:07:48
190.214.21.185 attackspam
Scanning random ports - tries to find possible vulnerable services
2019-11-01 19:44:21
61.94.142.183 attack
Unauthorized connection attempt from IP address 61.94.142.183 on Port 445(SMB)
2019-11-01 19:53:39
185.233.105.176 attack
Nov  1 04:46:33 srv1-bit sshd[6788]: User root from v22018076621370291.bestsrv.de not allowed because not listed in AllowUsers
Nov  1 04:46:33 srv1-bit sshd[6787]: User root from v22018076621370291.bestsrv.de not allowed because not listed in AllowUsers
Nov  1 04:46:33 srv1-bit sshd[6790]: User root from v22018076621370291.bestsrv.de not allowed because not listed in AllowUsers
Nov  1 04:46:33 srv1-bit sshd[6768]: User root from v22018076621370291.bestsrv.de not allowed because not listed in AllowUsers
Nov  1 04:46:33 srv1-bit sshd[6785]: User root from v22018076621370291.bestsrv.de not allowed because not listed in AllowUsers
Nov  1 04:46:33 srv1-bit sshd[6751]: User root from v22018076621370291.bestsrv.de not allowed because not listed in AllowUsers
Nov  1 04:46:33 srv1-bit sshd[6791]: User root from v22018076621370291.bestsrv.de not allowed because not listed in AllowUsers
Nov  1 04:46:33 srv1-bit sshd[6763]: User root from v22018076621370291.bestsrv.de not allowed because not listed in AllowUsers
Nov  1 0
2019-11-01 19:48:07
185.132.53.28 attackspam
firewall-block, port(s): 3702/udp
2019-11-01 19:57:36
36.76.181.192 attackbots
Unauthorized connection attempt from IP address 36.76.181.192 on Port 445(SMB)
2019-11-01 19:43:59
75.31.93.181 attackbotsspam
*Port Scan* detected from 75.31.93.181 (US/United States/-). 4 hits in the last 120 seconds
2019-11-01 19:59:58
101.255.52.171 attackspambots
Nov  1 12:54:39 bouncer sshd\[10488\]: Invalid user zjyu from 101.255.52.171 port 43760
Nov  1 12:54:39 bouncer sshd\[10488\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=101.255.52.171 
Nov  1 12:54:41 bouncer sshd\[10488\]: Failed password for invalid user zjyu from 101.255.52.171 port 43760 ssh2
...
2019-11-01 20:13:46
211.114.176.34 attackspambots
2019-11-01T11:54:22.626623abusebot-5.cloudsearch.cf sshd\[12300\]: Invalid user hp from 211.114.176.34 port 40628
2019-11-01T11:54:22.631646abusebot-5.cloudsearch.cf sshd\[12300\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=211.114.176.34
2019-11-01 20:25:49
161.117.0.23 attackspambots
ssh failed login
2019-11-01 19:42:11
125.160.221.195 attackspambots
Unauthorized connection attempt from IP address 125.160.221.195 on Port 445(SMB)
2019-11-01 19:52:28
1.10.175.183 attackspam
Unauthorized connection attempt from IP address 1.10.175.183 on Port 445(SMB)
2019-11-01 19:57:02

Recently Reported IPs

35.171.161.71 45.86.16.16 18.214.100.181 18.118.211.228
143.137.165.96 132.255.135.119 47.92.224.179 95.85.244.183
45.78.34.88 2606:4700:10::6814:8542 2606:4700:10::6816:393 2606:4700:10::6814:7352
110.77.248.3 110.78.153.141 110.77.187.37 2606:4700:10::6814:8745
2606:4700:10::6814:5126 2606:4700:10::6814:6991 14.207.194.112 2606:4700:10::ac43:1187