Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Thailand

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 14.207.194.194
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 37872
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;14.207.194.194.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2026021501 1800 900 604800 86400

;; Query time: 8 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Feb 16 10:06:39 CST 2026
;; MSG SIZE  rcvd: 107
Host info
b'Host 194.194.207.14.in-addr.arpa not found: 2(SERVFAIL)
'
Nslookup info:
server can't find 14.207.194.194.in-addr.arpa: SERVFAIL
Related IP info:
Related comments:
IP Type Details Datetime
109.184.20.16 attack
1589404080 - 05/13/2020 23:08:00 Host: 109.184.20.16/109.184.20.16 Port: 445 TCP Blocked
2020-05-14 06:29:25
194.135.166.225 attackspam
[Wed May 13 21:45:11 2020] - Syn Flood From IP: 194.135.166.225 Port: 25922
2020-05-14 06:15:42
86.111.95.131 attackspam
SSH Invalid Login
2020-05-14 06:11:34
223.71.167.165 attackspam
223.71.167.165 was recorded 19 times by 4 hosts attempting to connect to the following ports: 1777,4567,10554,500,23023,311,631,4840,1471,1967,1194,161,28015,11300,2086,2002,51106,9100,8069. Incident counter (4h, 24h, all-time): 19, 92, 17875
2020-05-14 06:22:58
61.177.172.128 attackbots
[ssh] SSH attack
2020-05-14 06:14:45
222.186.175.167 attackbots
$f2bV_matches
2020-05-14 06:32:48
104.236.32.106 attackspambots
2020-05-13T22:06:49.264104shield sshd\[26976\]: Invalid user mongo from 104.236.32.106 port 57272
2020-05-13T22:06:49.273014shield sshd\[26976\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.236.32.106
2020-05-13T22:06:51.800060shield sshd\[26976\]: Failed password for invalid user mongo from 104.236.32.106 port 57272 ssh2
2020-05-13T22:10:15.661040shield sshd\[27897\]: Invalid user admin from 104.236.32.106 port 36464
2020-05-13T22:10:15.670129shield sshd\[27897\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.236.32.106
2020-05-14 06:38:11
54.39.133.91 attackbots
Invalid user ruben from 54.39.133.91 port 45650
2020-05-14 06:20:21
152.67.47.139 attackbotsspam
May 14 00:11:16 jane sshd[3053]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=152.67.47.139 
May 14 00:11:18 jane sshd[3053]: Failed password for invalid user vegeta from 152.67.47.139 port 49084 ssh2
...
2020-05-14 06:31:53
49.88.112.55 attack
web-1 [ssh] SSH Attack
2020-05-14 06:25:54
94.102.51.28 attackspambots
SmallBizIT.US 5 packets to tcp(11833,30133,39633,43333,55733)
2020-05-14 06:34:19
51.137.145.162 attackbotsspam
May 14 00:06:25 PorscheCustomer sshd[3820]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.137.145.162
May 14 00:06:27 PorscheCustomer sshd[3820]: Failed password for invalid user user5 from 51.137.145.162 port 51898 ssh2
May 14 00:10:09 PorscheCustomer sshd[3997]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.137.145.162
...
2020-05-14 06:12:59
35.198.119.117 attackspam
Invalid user spring from 35.198.119.117 port 39180
2020-05-14 06:13:26
89.36.210.121 attack
Invalid user kappa from 89.36.210.121 port 37734
2020-05-14 06:19:40
106.13.230.219 attackbots
SSH Invalid Login
2020-05-14 06:22:27

Recently Reported IPs

121.40.45.87 158.101.217.27 109.162.246.217 121.8.28.46
2606:4700:10::ac43:1250 2606:4700:10::6814:9226 2606:4700:10::6816:4113 2606:4700:10::6814:7973
2606:4700:10::6816:2506 2606:4700:10::6816:1983 2606:4700:10::6814:8956 2606:4700:10::6814:6924
2606:4700:10::6814:7696 2606:4700:10::6814:7443 2606:4700:10::6816:2442 122.192.203.10
2606:4700:10::6816:3191 134.35.157.93 2606:4700:10::6814:9932 110.78.158.162