Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Thailand

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
% [whois.apnic.net]
% Whois data copyright terms    http://www.apnic.net/db/dbcopyright.html

% Information related to '14.207.128.0 - 14.207.255.255'

% Abuse contact for '14.207.128.0 - 14.207.255.255' is 'ipadmin@3bbmail.com'

inetnum:        14.207.128.0 - 14.207.255.255
netname:        TTBP-TH
descr:          Triple T Broadband Public Company Limited
country:        TH
admin-c:        TTBP1-AP
tech-c:         TTBP1-AP
abuse-c:        AT1597-AP
status:         ALLOCATED NON-PORTABLE
mnt-by:         MAINT-TTBP-TH
mnt-irt:        IRT-TTBP-TH
last-modified:  2021-12-22T02:33:28Z
source:         APNIC

irt:            IRT-TTBP-TH
address:        89 , Cosmo Office Park Building , Popular Road Ban Mai Subdistrict , Pakkret 11120
e-mail:         ipadmin@3bbmail.com
abuse-mailbox:  ipadmin@3bbmail.com
admin-c:        TTBP1-AP
tech-c:         TTBP1-AP
auth:           # Filtered
remarks:        ipadmin@3bbmail.com was validated on 2025-09-11
mnt-by:         MAINT-TTBP-TH
last-modified:  2026-02-13T04:33:50Z
source:         APNIC

role:           ABUSE TTBPTH
country:        ZZ
address:        89 , Cosmo Office Park Building , Popular Road Ban Mai Subdistrict , Pakkret 11120
phone:          +000000000
e-mail:         ipadmin@3bbmail.com
admin-c:        TTBP1-AP
tech-c:         TTBP1-AP
nic-hdl:        AT1597-AP
remarks:        Generated from irt object IRT-TTBP-TH
remarks:        ipadmin@3bbmail.com was validated on 2025-09-11
abuse-mailbox:  ipadmin@3bbmail.com
mnt-by:         APNIC-ABUSE
last-modified:  2025-09-11T08:48:08Z
source:         APNIC

role:           Triple T Broadband PCL administrator
address:        Jasmine International Public Company Limited, Pakkret Nonthaburi 11120
country:        TH
phone:          +6621008552
e-mail:         wanchai.ti@jasmine.com
admin-c:        TTBP1-AP
tech-c:         TTBP1-AP
nic-hdl:        TTBP1-AP
mnt-by:         MAINT-TTBP-TH
last-modified:  2021-07-27T02:31:01Z
source:         APNIC

% Information related to '14.207.194.0/24AS138422'

route:          14.207.194.0/24
origin:         AS138422
descr:          Triple T Broadband Public Company Limited
                89 , Cosmo Office Park Building , Popular Road
                Ban Mai Subdistrict ,
mnt-by:         MAINT-TTBP-TH
last-modified:  2026-01-28T04:39:47Z
source:         APNIC

% Information related to '14.207.194.0/24AS45458'

route:          14.207.194.0/24
origin:         AS45458
descr:          Triple T Broadband Public Company Limited
                Jasmine International Tower   200 Moo 4 Chaengwattana Rd.
mnt-by:         MAINT-TTBP-TH
last-modified:  2025-08-14T06:46:16Z
source:         APNIC

% This query was served by the APNIC Whois Service version 1.88.36-SNAPSHOT (WHOIS-AU5)
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 14.207.194.51
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 61222
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;14.207.194.51.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2026032000 1800 900 604800 86400

;; Query time: 7 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Mar 21 00:06:32 CST 2026
;; MSG SIZE  rcvd: 106
Host info
b'Host 51.194.207.14.in-addr.arpa not found: 2(SERVFAIL)
'
Nslookup info:
server can't find 14.207.194.51.in-addr.arpa: SERVFAIL
Related IP info:
Related comments:
IP Type Details Datetime
138.197.189.136 attack
Apr 15 22:25:53 * sshd[21925]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.197.189.136
Apr 15 22:25:54 * sshd[21925]: Failed password for invalid user donna from 138.197.189.136 port 57818 ssh2
2020-04-16 04:47:42
5.135.253.172 attackspam
ET CINS Active Threat Intelligence Poor Reputation IP group 4 - port: 28274 proto: TCP cat: Misc Attack
2020-04-16 04:48:47
49.234.212.15 attack
Apr 15 18:52:35 ns382633 sshd\[26275\]: Invalid user ake from 49.234.212.15 port 57490
Apr 15 18:52:35 ns382633 sshd\[26275\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.234.212.15
Apr 15 18:52:36 ns382633 sshd\[26275\]: Failed password for invalid user ake from 49.234.212.15 port 57490 ssh2
Apr 15 19:00:59 ns382633 sshd\[27975\]: Invalid user celinepc from 49.234.212.15 port 47560
Apr 15 19:00:59 ns382633 sshd\[27975\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.234.212.15
2020-04-16 04:24:57
129.204.147.84 attack
(sshd) Failed SSH login from 129.204.147.84 (CN/China/-): 5 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: Apr 15 22:02:21 srv sshd[18564]: Invalid user gfs1 from 129.204.147.84 port 34600
Apr 15 22:02:23 srv sshd[18564]: Failed password for invalid user gfs1 from 129.204.147.84 port 34600 ssh2
Apr 15 22:08:48 srv sshd[18781]: Invalid user bmp from 129.204.147.84 port 52600
Apr 15 22:08:50 srv sshd[18781]: Failed password for invalid user bmp from 129.204.147.84 port 52600 ssh2
Apr 15 22:11:44 srv sshd[18895]: Invalid user kuhis from 129.204.147.84 port 54456
2020-04-16 04:18:38
192.119.77.253 attackspambots
"HTTP protocol version is not allowed by policy - HTTP/0.9"
2020-04-16 04:28:19
167.99.41.242 attackbotsspam
Apr 15 20:08:07 srv01 sshd[13772]: Invalid user bos from 167.99.41.242 port 40356
Apr 15 20:08:07 srv01 sshd[13772]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.99.41.242
Apr 15 20:08:07 srv01 sshd[13772]: Invalid user bos from 167.99.41.242 port 40356
Apr 15 20:08:09 srv01 sshd[13772]: Failed password for invalid user bos from 167.99.41.242 port 40356 ssh2
Apr 15 20:12:07 srv01 sshd[14118]: Invalid user wkuser from 167.99.41.242 port 47020
...
2020-04-16 04:20:58
111.229.57.21 attackspam
frenzy
2020-04-16 04:17:43
106.51.86.204 attackspambots
Apr 15 20:37:50 pornomens sshd\[29312\]: Invalid user customer from 106.51.86.204 port 52940
Apr 15 20:37:50 pornomens sshd\[29312\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.51.86.204
Apr 15 20:37:52 pornomens sshd\[29312\]: Failed password for invalid user customer from 106.51.86.204 port 52940 ssh2
...
2020-04-16 04:15:38
222.186.169.194 attackspam
Apr 15 22:15:37 vps sshd[283057]: Failed password for root from 222.186.169.194 port 8598 ssh2
Apr 15 22:15:41 vps sshd[283057]: Failed password for root from 222.186.169.194 port 8598 ssh2
Apr 15 22:15:45 vps sshd[283057]: Failed password for root from 222.186.169.194 port 8598 ssh2
Apr 15 22:15:48 vps sshd[283057]: Failed password for root from 222.186.169.194 port 8598 ssh2
Apr 15 22:15:52 vps sshd[283057]: Failed password for root from 222.186.169.194 port 8598 ssh2
...
2020-04-16 04:27:57
168.196.132.152 attackspambots
Honeypot attack, port: 81, PTR: PTR record not found
2020-04-16 04:25:44
194.180.224.130 attackbotsspam
SSH Brute Force
2020-04-16 04:49:02
92.118.160.57 attackspam
Port Scan: Events[1] countPorts[1]: 2161 ..
2020-04-16 04:34:12
183.62.170.245 attack
2020-04-15T20:36:32.755838shield sshd\[24746\]: Invalid user john from 183.62.170.245 port 35138
2020-04-15T20:36:32.761154shield sshd\[24746\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=183.62.170.245
2020-04-15T20:36:35.269253shield sshd\[24746\]: Failed password for invalid user john from 183.62.170.245 port 35138 ssh2
2020-04-15T20:38:35.637724shield sshd\[25062\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=183.62.170.245  user=root
2020-04-15T20:38:37.701735shield sshd\[25062\]: Failed password for root from 183.62.170.245 port 53730 ssh2
2020-04-16 04:49:32
93.64.5.34 attackspambots
(sshd) Failed SSH login from 93.64.5.34 (IT/Italy/net-93-64-5-34.cust.vodafonedsl.it): 5 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: Apr 15 22:08:10 amsweb01 sshd[16206]: Invalid user user from 93.64.5.34 port 55512
Apr 15 22:08:12 amsweb01 sshd[16206]: Failed password for invalid user user from 93.64.5.34 port 55512 ssh2
Apr 15 22:22:17 amsweb01 sshd[18295]: Invalid user postgres from 93.64.5.34 port 52150
Apr 15 22:22:20 amsweb01 sshd[18295]: Failed password for invalid user postgres from 93.64.5.34 port 52150 ssh2
Apr 15 22:25:47 amsweb01 sshd[18625]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=93.64.5.34  user=root
2020-04-16 04:54:32
114.67.226.63 attackspambots
Apr 15 16:21:25 ny01 sshd[22393]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=114.67.226.63
Apr 15 16:21:27 ny01 sshd[22393]: Failed password for invalid user hadoop from 114.67.226.63 port 43792 ssh2
Apr 15 16:25:59 ny01 sshd[23263]: Failed password for root from 114.67.226.63 port 38030 ssh2
2020-04-16 04:44:00

Recently Reported IPs

2606:4700:10::6814:4423 10.242.32.126 79.92.232.95 173.249.38.195
222.168.237.156 228.93.66.48 142.87.249.209 126.87.114.240
10.244.225.176 2606:4700:10::6814:5509 2606:4700:10::6814:8023 2606:4700:10::6816:1886
2606:4700:10::6816:4828 2606:4700:10::6814:6895 2606:4700:10::6814:5807 2606:4700:10::6816:363
2606:4700:10::6816:2277 2606:4700:10::6816:2405 2606:4700:10::6814:6498 2606:4700:10::6816:4056