Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Thailand

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 14.207.99.13
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 22716
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;14.207.99.13.			IN	A

;; AUTHORITY SECTION:
.			550	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022022701 1800 900 604800 86400

;; Query time: 16 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Feb 28 05:32:58 CST 2022
;; MSG SIZE  rcvd: 105
Host info
13.99.207.14.in-addr.arpa domain name pointer mx-ll-14.207.99-13.dynamic.3bb.in.th.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
13.99.207.14.in-addr.arpa	name = mx-ll-14.207.99-13.dynamic.3bb.in.th.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
132.232.2.184 attack
Jun 26 00:12:20 mail sshd\[5735\]: Invalid user filter from 132.232.2.184
Jun 26 00:12:20 mail sshd\[5735\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=132.232.2.184
Jun 26 00:12:22 mail sshd\[5735\]: Failed password for invalid user filter from 132.232.2.184 port 13816 ssh2
...
2019-06-26 08:37:46
96.1.72.4 attackbots
Jun 25 20:09:18 srv-4 sshd\[863\]: Invalid user testuser from 96.1.72.4
Jun 25 20:09:18 srv-4 sshd\[863\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=96.1.72.4
Jun 25 20:09:21 srv-4 sshd\[863\]: Failed password for invalid user testuser from 96.1.72.4 port 48940 ssh2
...
2019-06-26 09:09:23
221.127.9.106 attackspam
60001/tcp
[2019-06-25]1pkt
2019-06-26 08:39:22
190.37.203.74 attackbots
445/tcp
[2019-06-25]1pkt
2019-06-26 08:41:08
139.59.44.60 attackspam
SSH Server BruteForce Attack
2019-06-26 08:42:00
175.101.137.244 attack
60001/tcp
[2019-06-25]1pkt
2019-06-26 08:35:47
111.85.191.131 attack
SSH Brute-Forcing (ownc)
2019-06-26 09:10:57
190.103.182.158 attackbots
@LucianNitescu Personal Honeypot Network <<<>>> Donate at paypal.me/LNitescu <<<>>> 2019-06-25 17:10:39,843 INFO [amun_request_handler] PortScan Detected on Port: 445 (190.103.182.158)
2019-06-26 08:36:12
207.148.120.58 attackspam
Invalid user tor from 207.148.120.58 port 43313
2019-06-26 09:05:18
216.244.66.229 attackspam
20 attempts against mh-misbehave-ban on comet.magehost.pro
2019-06-26 09:08:54
191.53.221.65 attackspambots
SASL PLAIN auth failed: ruser=...
2019-06-26 08:34:34
118.25.55.87 attackspambots
Invalid user gang from 118.25.55.87 port 34946
2019-06-26 09:13:21
103.90.224.226 attackbotsspam
445/tcp 445/tcp 445/tcp
[2019-06-12/25]3pkt
2019-06-26 09:21:14
46.36.105.19 attackspam
Trying to deliver email spam, but blocked by RBL
2019-06-26 09:05:44
88.255.251.92 attackbotsspam
Unauthorized connection attempt from IP address 88.255.251.92 on Port 445(SMB)
2019-06-26 09:24:04

Recently Reported IPs

14.207.99.129 14.207.99.138 14.207.99.146 14.207.99.148
14.207.99.15 14.207.99.154 14.207.99.164 14.207.99.156
14.207.99.166 14.207.99.177 14.207.99.18 14.207.99.181
14.207.99.182 14.209.39.162 14.21.81.47 14.21.7.14
14.21.84.222 14.210.17.82 14.210.17.20 14.210.175.181