Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Guangzhou

Region: Guangdong

Country: China

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
% [whois.apnic.net]
% Whois data copyright terms    http://www.apnic.net/db/dbcopyright.html

% Information related to '14.208.0.0 - 14.223.255.255'

% Abuse contact for '14.208.0.0 - 14.223.255.255' is 'anti-spam@chinatelecom.cn'

inetnum:        14.208.0.0 - 14.223.255.255
netname:        CHINANET-GD
descr:          CHINANET Guangdong province network
descr:          Data Communication Division
descr:          China Telecom
country:        CN
admin-c:        CH93-AP
tech-c:         IC83-AP
abuse-c:        AC1573-AP
status:         ALLOCATED PORTABLE
remarks:        service provider
remarks:        --------------------------------------------------------
remarks:        To report network abuse, please contact mnt-irt
remarks:        For troubleshooting, please contact tech-c and admin-c
remarks:        Report invalid contact via www.apnic.net/invalidcontact
remarks:        --------------------------------------------------------
notify:         abuse_gdnoc@189.cn
mnt-by:         APNIC-HM
mnt-lower:      MAINT-CHINANET-GD
mnt-irt:        IRT-CHINANET-CN
last-modified:  2021-06-15T08:06:06Z
source:         APNIC

irt:            IRT-CHINANET-CN
address:        No.31 ,jingrong street,beijing
address:        100032
e-mail:         anti-spam@chinatelecom.cn
abuse-mailbox:  anti-spam@chinatelecom.cn
admin-c:        CH93-AP
tech-c:         CH93-AP
auth:           # Filtered
remarks:        anti-spam@chinatelecom.cn was validated on 2025-04-24
mnt-by:         MAINT-CHINANET
last-modified:  2025-09-04T00:59:42Z
source:         APNIC

role:           ABUSE CHINANETCN
country:        ZZ
address:        No.31 ,jingrong street,beijing
address:        100032
phone:          +000000000
e-mail:         anti-spam@chinatelecom.cn
admin-c:        CH93-AP
tech-c:         CH93-AP
nic-hdl:        AC1573-AP
remarks:        Generated from irt object IRT-CHINANET-CN
remarks:        anti-spam@chinatelecom.cn was validated on 2025-04-24
abuse-mailbox:  anti-spam@chinatelecom.cn
mnt-by:         APNIC-ABUSE
last-modified:  2025-04-24T03:21:54Z
source:         APNIC

person:         Chinanet Hostmaster
nic-hdl:        CH93-AP
e-mail:         anti-spam@chinatelecom.cn
address:        No.31 ,jingrong street,beijing
address:        100032
phone:          +86-10-58501724
fax-no:         +86-10-58501724
country:        CN
mnt-by:         MAINT-CHINANET
last-modified:  2022-02-28T06:53:44Z
source:         APNIC

person:         IPMASTER CHINANET-GD
nic-hdl:        IC83-AP
e-mail:         abuse_gdicnoc@163.com
address:        NO.18,RO. ZHONGSHANER,YUEXIU DISTRIC,GUANGZHOU
phone:          +86-20-87189274
fax-no:         +86-20-87189274
country:        CN
mnt-by:         MAINT-CHINANET-GD
remarks:        IPMASTER is not for spam complaint,please send spam complaint to abuse_gdicnoc@163.com
abuse-mailbox:  abuse_gdicnoc@163.com
last-modified:  2021-05-12T09:06:58Z
source:         APNIC

% This query was served by the APNIC Whois Service version 1.88.36-SNAPSHOT (WHOIS-AU5)
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 14.212.75.71
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 27861
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;14.212.75.71.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025110300 1800 900 604800 86400

;; Query time: 11 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Nov 03 17:31:46 CST 2025
;; MSG SIZE  rcvd: 105
Host info
Host 71.75.212.14.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 71.75.212.14.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
106.240.131.5 attackbotsspam
Autoban   106.240.131.5 AUTH/CONNECT
2019-11-18 17:06:28
105.226.117.188 attack
Autoban   105.226.117.188 AUTH/CONNECT
2019-11-18 17:22:26
106.208.32.126 attackbotsspam
Autoban   106.208.32.126 AUTH/CONNECT
2019-11-18 17:09:02
101.108.109.199 attack
SSH/22 MH Probe, BF, Hack -
2019-11-18 17:09:23
109.107.237.234 attackspam
Autoban   109.107.237.234 AUTH/CONNECT
2019-11-18 16:57:11
107.6.183.162 attackbots
Honeypot hit.
2019-11-18 17:02:04
107.6.169.250 attackspam
Automatic report - Banned IP Access
2019-11-18 17:02:48
45.125.65.87 attack
\[2019-11-18 03:56:34\] SECURITY\[2634\] res_security_log.c: SecurityEvent="FailedACL",EventTV="2019-11-18T03:56:34.074-0500",Severity="Error",Service="SIP",EventVersion="1",AccountID="111110790901148833566011",SessionID="0x7fdf2cd0daf8",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/45.125.65.87/49782",ACLName="no_extension_match"
\[2019-11-18 03:56:58\] SECURITY\[2634\] res_security_log.c: SecurityEvent="FailedACL",EventTV="2019-11-18T03:56:58.524-0500",Severity="Error",Service="SIP",EventVersion="1",AccountID="7777770790901148833566011",SessionID="0x7fdf2c3f5928",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/45.125.65.87/51286",ACLName="no_extension_match"
\[2019-11-18 03:57:26\] SECURITY\[2634\] res_security_log.c: SecurityEvent="FailedACL",EventTV="2019-11-18T03:57:26.121-0500",Severity="Error",Service="SIP",EventVersion="1",AccountID="6666660790901148833566011",SessionID="0x7fdf2cd1cd48",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/45.125.65
2019-11-18 17:04:26
109.169.65.145 attackbotsspam
Autoban   109.169.65.145 AUTH/CONNECT
2019-11-18 16:50:59
105.247.244.235 attackspambots
Autoban   105.247.244.235 AUTH/CONNECT
2019-11-18 17:17:53
105.178.116.151 attackspambots
Autoban   105.178.116.151 AUTH/CONNECT
2019-11-18 17:24:33
83.171.150.237 attackspambots
Nov 18 07:28:26 serwer sshd\[5102\]: Invalid user pi from 83.171.150.237 port 53024
Nov 18 07:28:26 serwer sshd\[5101\]: Invalid user pi from 83.171.150.237 port 53022
Nov 18 07:28:26 serwer sshd\[5102\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=83.171.150.237
Nov 18 07:28:26 serwer sshd\[5101\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=83.171.150.237
...
2019-11-18 17:29:16
139.59.92.2 attackbots
Automatic report - XMLRPC Attack
2019-11-18 16:52:21
188.166.34.129 attack
Nov 18 09:52:17 SilenceServices sshd[25102]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.166.34.129
Nov 18 09:52:18 SilenceServices sshd[25102]: Failed password for invalid user quelch from 188.166.34.129 port 58408 ssh2
Nov 18 09:56:09 SilenceServices sshd[26145]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.166.34.129
2019-11-18 17:28:06
106.248.143.198 attackspam
Triggered: repeated knocking on closed ports.
2019-11-18 17:04:02

Recently Reported IPs

20.64.104.89 119.249.100.22 119.249.100.217 10.10.3.20
165.154.201.201 2001:da8:801d:7f1c:4177:be70:bc9b:4549 62.141.44.236 103.164.81.118
154.83.92.9 196.171.125.40 101.36.108.175 185.135.180.173
64.225.17.183 54.225.14.76 37.49.148.105 103.211.222.98
50.7.250.164 240e:40d:9f00:4b03:a142:90fb:50da:f95d 66.249.75.236 66.249.69.12