Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Thailand

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
IP Type Details Datetime
14.207.27.1 attack
[Aegis] @ 2019-12-10 14:52:23  0000 -> SSH insecure connection attempt (scan).
2019-12-11 01:48:03
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 14.207.27.121
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 35177
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;14.207.27.121.			IN	A

;; AUTHORITY SECTION:
.			139	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022022700 1800 900 604800 86400

;; Query time: 60 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Feb 27 17:56:16 CST 2022
;; MSG SIZE  rcvd: 106
Host info
121.27.207.14.in-addr.arpa domain name pointer mx-ll-14.207.27-121.dynamic.3bb.co.th.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
121.27.207.14.in-addr.arpa	name = mx-ll-14.207.27-121.dynamic.3bb.co.th.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
218.61.5.68 attackspambots
2020-09-28T10:07:14.432680shield sshd\[18838\]: Invalid user user from 218.61.5.68 port 63846
2020-09-28T10:07:14.437461shield sshd\[18838\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.61.5.68
2020-09-28T10:07:15.825784shield sshd\[18838\]: Failed password for invalid user user from 218.61.5.68 port 63846 ssh2
2020-09-28T10:10:41.701165shield sshd\[19468\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.61.5.68  user=root
2020-09-28T10:10:44.167709shield sshd\[19468\]: Failed password for root from 218.61.5.68 port 12772 ssh2
2020-09-28 20:35:12
103.253.145.125 attackspambots
Connection to SSH Honeypot - Detected by HoneypotDB
2020-09-28 20:36:55
182.61.3.157 attack
Invalid user teste from 182.61.3.157 port 58650
2020-09-28 20:38:14
45.148.122.184 attackspambots
1601291557 - 09/28/2020 18:12:37 Host: 45.148.122.184/45.148.122.184 Port: 6379 TCP Blocked
...
2020-09-28 20:50:25
46.185.138.163 attackspambots
Invalid user test from 46.185.138.163 port 51782
2020-09-28 20:43:42
122.248.33.1 attackbotsspam
TCP port : 11256
2020-09-28 20:46:31
222.186.175.217 attackspambots
Failed password for root from 222.186.175.217 port 9678 ssh2
Failed password for root from 222.186.175.217 port 9678 ssh2
Failed password for root from 222.186.175.217 port 9678 ssh2
Failed password for root from 222.186.175.217 port 9678 ssh2
2020-09-28 20:42:25
106.12.12.84 attackbotsspam
leo_www
2020-09-28 20:48:12
222.186.180.223 attackbots
SSH login attempts.
2020-09-28 20:44:04
49.88.112.72 attack
Sep 28 15:37:41 pkdns2 sshd\[26022\]: Failed password for root from 49.88.112.72 port 42897 ssh2Sep 28 15:42:58 pkdns2 sshd\[26292\]: Failed password for root from 49.88.112.72 port 23656 ssh2Sep 28 15:43:01 pkdns2 sshd\[26292\]: Failed password for root from 49.88.112.72 port 23656 ssh2Sep 28 15:43:04 pkdns2 sshd\[26292\]: Failed password for root from 49.88.112.72 port 23656 ssh2Sep 28 15:44:00 pkdns2 sshd\[26323\]: Failed password for root from 49.88.112.72 port 30666 ssh2Sep 28 15:44:02 pkdns2 sshd\[26323\]: Failed password for root from 49.88.112.72 port 30666 ssh2
...
2020-09-28 20:45:31
173.208.130.202 attackbots
20 attempts against mh-misbehave-ban on ice
2020-09-28 20:21:09
92.207.86.210 attackbotsspam
Automatic report - Port Scan Attack
2020-09-28 20:49:59
116.85.71.133 attack
prod6
...
2020-09-28 20:27:57
222.186.173.154 attack
$f2bV_matches
2020-09-28 20:33:18
59.50.31.11 attack
E-Mail Spam (RBL) [REJECTED]
2020-09-28 20:52:40

Recently Reported IPs

14.207.27.118 14.207.27.12 14.207.27.104 14.207.27.116
14.207.27.123 14.207.27.130 14.207.27.127 14.207.27.124
14.207.27.133 14.207.27.136 14.207.27.134 14.207.27.147
14.207.27.150 14.207.27.142 14.207.27.14 14.207.27.155
14.207.27.161 14.207.27.162 14.207.27.165 14.207.27.160