Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Thailand

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 14.207.48.145
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 42276
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;14.207.48.145.			IN	A

;; AUTHORITY SECTION:
.			548	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022022700 1800 900 604800 86400

;; Query time: 63 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Feb 27 13:38:33 CST 2022
;; MSG SIZE  rcvd: 106
Host info
145.48.207.14.in-addr.arpa domain name pointer mx-ll-14.207.48-145.dynamic.3bb.in.th.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
145.48.207.14.in-addr.arpa	name = mx-ll-14.207.48-145.dynamic.3bb.in.th.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
109.169.61.83 attackbotsspam
Brute forcing email accounts
2020-07-26 19:22:22
206.130.141.76 attack
SSH break in attempt
...
2020-07-26 19:25:54
14.21.36.84 attackspam
Jul 26 10:40:50 localhost sshd\[11958\]: Invalid user gmodserver from 14.21.36.84 port 51120
Jul 26 10:40:50 localhost sshd\[11958\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=14.21.36.84
Jul 26 10:40:52 localhost sshd\[11958\]: Failed password for invalid user gmodserver from 14.21.36.84 port 51120 ssh2
...
2020-07-26 19:13:15
129.28.154.240 attackspam
Jul 26 07:55:25 firewall sshd[3586]: Invalid user admin from 129.28.154.240
Jul 26 07:55:27 firewall sshd[3586]: Failed password for invalid user admin from 129.28.154.240 port 56760 ssh2
Jul 26 08:00:36 firewall sshd[3730]: Invalid user alma from 129.28.154.240
...
2020-07-26 19:05:27
213.202.101.114 attackbotsspam
Invalid user test from 213.202.101.114 port 49116
2020-07-26 19:04:08
157.7.233.185 attackspam
Invalid user emilia from 157.7.233.185 port 22089
2020-07-26 19:31:12
218.92.0.165 attackbots
Jul 26 11:06:07 scw-6657dc sshd[26584]: Failed password for root from 218.92.0.165 port 44209 ssh2
Jul 26 11:06:07 scw-6657dc sshd[26584]: Failed password for root from 218.92.0.165 port 44209 ssh2
Jul 26 11:06:10 scw-6657dc sshd[26584]: Failed password for root from 218.92.0.165 port 44209 ssh2
...
2020-07-26 19:08:12
122.51.206.41 attackbotsspam
Invalid user sinus from 122.51.206.41 port 38756
2020-07-26 19:28:42
113.160.54.78 attackspambots
Detected by ModSecurity. Request URI: /wp-login.php/ip-redirect/
2020-07-26 19:05:43
60.169.211.200 attackspam
Fail2Ban Ban Triggered
HTTP Fake Web Crawler
2020-07-26 19:25:23
60.167.180.68 attack
Jul 26 08:07:11 PorscheCustomer sshd[3603]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=60.167.180.68
Jul 26 08:07:13 PorscheCustomer sshd[3603]: Failed password for invalid user apache from 60.167.180.68 port 45082 ssh2
Jul 26 08:11:25 PorscheCustomer sshd[3658]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=60.167.180.68
...
2020-07-26 19:03:51
186.123.55.201 attackspambots
Attempts against non-existent wp-login
2020-07-26 19:18:04
206.174.214.90 attack
Invalid user adminuser from 206.174.214.90 port 34068
2020-07-26 19:27:52
210.16.187.206 attackspam
Invalid user jh from 210.16.187.206 port 51670
2020-07-26 19:30:13
104.248.149.130 attackspambots
Invalid user angelo from 104.248.149.130 port 38496
2020-07-26 19:02:31

Recently Reported IPs

14.207.48.146 14.207.47.9 14.207.47.90 14.207.48.111
14.207.48.133 14.207.48.200 14.207.48.68 14.207.48.35
14.207.48.211 14.207.48.250 14.207.49.155 14.207.48.252
14.207.48.220 14.207.49.109 14.207.49.166 14.207.49.21
14.207.49.232 14.207.49.247 14.207.49.63 14.207.49.68