Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Chongqing

Region: Chongqìng

Country: China

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2025, American Registry for Internet Numbers, Ltd.
#


NetRange:       162.14.0.0 - 162.14.255.255
CIDR:           162.14.0.0/16
NetName:        APNIC
NetHandle:      NET-162-14-0-0-1
Parent:         NET162 (NET-162-0-0-0-0)
NetType:        Early Registrations, Transferred to APNIC
OriginAS:       
Organization:   Asia Pacific Network Information Centre (APNIC)
RegDate:        2018-01-16
Updated:        2018-01-16
Ref:            https://rdap.arin.net/registry/ip/162.14.0.0

ResourceLink:  https://apps.db.ripe.net/db-web-ui/query
ResourceLink:  whois://whois.apnic.net


OrgName:        Asia Pacific Network Information Centre
OrgId:          APNIC
Address:        PO Box 3646
City:           South Brisbane
StateProv:      QLD
PostalCode:     4101
Country:        AU
RegDate:        
Updated:        2012-01-24
Ref:            https://rdap.arin.net/registry/entity/APNIC

ReferralServer:  whois://whois.apnic.net
ResourceLink:  https://apps.db.ripe.net/db-web-ui/query

OrgTechHandle: AWC12-ARIN
OrgTechName:   APNIC Whois Contact
OrgTechPhone:  +61 7 3858 3188 
OrgTechEmail:  search-apnic-not-arin@apnic.net
OrgTechRef:    https://rdap.arin.net/registry/entity/AWC12-ARIN

OrgAbuseHandle: AWC12-ARIN
OrgAbuseName:   APNIC Whois Contact
OrgAbusePhone:  +61 7 3858 3188 
OrgAbuseEmail:  search-apnic-not-arin@apnic.net
OrgAbuseRef:    https://rdap.arin.net/registry/entity/AWC12-ARIN


#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2025, American Registry for Internet Numbers, Ltd.
#



Found a referral to whois.apnic.net.

% [whois.apnic.net]
% Whois data copyright terms    http://www.apnic.net/db/dbcopyright.html

% Information related to '162.14.0.0 - 162.14.255.255'

% Abuse contact for '162.14.0.0 - 162.14.255.255' is 'tencent_noc@tencent.com'

inetnum:        162.14.0.0 - 162.14.255.255
netname:        TENCENT-CN
descr:          Tencent Cloud Computing (Beijing) Co., Ltd
descr:          Floor 6, Yinke Building, 38 Haidian St, Haidian District
country:        CN
org:            ORG-TCCC1-AP
admin-c:        TCA15-AP
tech-c:         TCA15-AP
abuse-c:        AT992-AP
status:         ALLOCATED PORTABLE
remarks:        --------------------------------------------------------
remarks:        To report network abuse, please contact mnt-irt
remarks:        For troubleshooting, please contact tech-c and admin-c
remarks:        Report invalid contact via www.apnic.net/invalidcontact
remarks:        --------------------------------------------------------
mnt-by:         APNIC-HM
mnt-lower:      MAINT-TENCENT-CN
mnt-routes:     MAINT-TENCENT-CN
mnt-irt:        IRT-TENCENT-CN
last-modified:  2020-07-22T13:11:00Z
source:         APNIC

irt:            IRT-TENCENT-CN
address:        Floor 6, Yinke Building, 38 Haidian St, Haidian District, Beijing Beijing 100080
e-mail:         tencent_noc@tencent.com
abuse-mailbox:  tencent_noc@tencent.com
admin-c:        TCA15-AP
tech-c:         TCA15-AP
auth:           # Filtered
remarks:        tencent_noc@tencent.com was validated on 2025-03-07
mnt-by:         MAINT-COMSENZ1-CN
last-modified:  2025-09-04T07:03:34Z
source:         APNIC

organisation:   ORG-TCCC1-AP
org-name:       Tencent Cloud Computing (Beijing) Co., Ltd
org-type:       LIR
country:        CN
address:        309 West Zone, 3F. 49 Zhichun Road. Haidian District.
phone:          +86-10-62671299
fax-no:         +86-10-82602088-41299
e-mail:         tencent_idc@tencent.com
mnt-ref:        APNIC-HM
mnt-by:         APNIC-HM
last-modified:  2023-09-05T02:16:21Z
source:         APNIC

role:           ABUSE TENCENTCN
country:        ZZ
address:        Floor 6, Yinke Building, 38 Haidian St, Haidian District, Beijing Beijing 100080
phone:          +000000000
e-mail:         tencent_noc@tencent.com
admin-c:        TCA15-AP
tech-c:         TCA15-AP
nic-hdl:        AT992-AP
remarks:        Generated from irt object IRT-TENCENT-CN
remarks:        tencent_noc@tencent.com was validated on 2025-03-07
abuse-mailbox:  tencent_noc@tencent.com
mnt-by:         APNIC-ABUSE
last-modified:  2025-03-07T07:43:37Z
source:         APNIC

role:           Tencent Cloud administrator
address:        Floor 6, Yinke Building, 38 Haidian St, Haidian District, Beijing Beijing 100080
country:        CN
phone:          +86-10-62671299
e-mail:         tencent_idc@tencent.com
admin-c:        TCA15-AP
tech-c:         TCA15-AP
nic-hdl:        TCA15-AP
mnt-by:         MAINT-AP-DIALPAD
fax-no:         +86-10-62671299
last-modified:  2017-04-04T10:34:03Z
source:         APNIC

% Information related to '162.14.0.0/16AS45090'

route:          162.14.0.0/16
origin:         AS45090
descr:          Tencent Cloud Computing (Beijing) Co., Ltd
                309 West Zone, 3F. 49 Zhichun Road. Haidian District.
mnt-by:         MAINT-TENCENT-CN
last-modified:  2018-01-17T08:23:45Z
source:         APNIC

% This query was served by the APNIC Whois Service version 1.88.36-SNAPSHOT (WHOIS-AU5)
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 162.14.210.15
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 45256
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;162.14.210.15.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025091800 1800 900 604800 86400

;; Query time: 32 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Sep 18 22:30:59 CST 2025
;; MSG SIZE  rcvd: 106
Host info
Host 15.210.14.162.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 15.210.14.162.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
20.48.1.164 attack
Unauthorized connection attempt detected from IP address 20.48.1.164 to port 1433 [T]
2020-07-22 03:47:06
113.161.44.87 attackspam
Unauthorized connection attempt detected from IP address 113.161.44.87 to port 3389 [T]
2020-07-22 03:56:55
101.96.113.50 attack
2020-07-21T18:01:02.843599ks3355764 sshd[31539]: Invalid user denis from 101.96.113.50 port 46362
2020-07-21T18:01:04.292142ks3355764 sshd[31539]: Failed password for invalid user denis from 101.96.113.50 port 46362 ssh2
...
2020-07-22 03:59:04
192.35.168.248 attack
Unauthorized connection attempt detected from IP address 192.35.168.248 to port 80 [T]
2020-07-22 03:52:04
185.141.76.184 attack
Unauthorized connection attempt detected from IP address 185.141.76.184 to port 5555 [T]
2020-07-22 04:08:58
222.186.42.7 attack
Connection to SSH Honeypot - Detected by HoneypotDB
2020-07-22 03:49:10
49.49.241.67 attackbots
Unauthorized connection attempt from IP address 49.49.241.67 on Port 445(SMB)
2020-07-22 03:46:05
194.87.139.48 attackspam
Unauthorized connection attempt detected from IP address 194.87.139.48 to port 8080 [T]
2020-07-22 03:51:05
40.83.100.166 attackspam
 TCP (SYN) 40.83.100.166:50078 -> port 60001, len 60
2020-07-22 04:03:57
93.170.192.4 attackbots
Unauthorized connection attempt detected from IP address 93.170.192.4 to port 8080 [T]
2020-07-22 03:59:25
52.240.54.41 attack
Unauthorized connection attempt detected from IP address 52.240.54.41 to port 1433
2020-07-22 03:44:19
103.134.92.146 attackspambots
Unauthorized connection attempt detected from IP address 103.134.92.146 to port 8080 [T]
2020-07-22 04:14:23
104.211.204.150 attackbots
Unauthorized connection attempt detected from IP address 104.211.204.150 to port 1433 [T]
2020-07-22 04:13:40
13.70.20.99 attack
Unauthorized connection attempt detected from IP address 13.70.20.99 to port 1433 [T]
2020-07-22 04:06:49
104.211.223.20 attack
Unauthorized connection attempt detected from IP address 104.211.223.20 to port 1433 [T]
2020-07-22 03:57:48

Recently Reported IPs

74.222.3.142 58.212.237.38 117.131.166.122 116.52.141.40
182.40.213.244 91.245.252.8 109.235.1.30 199.45.155.76
23.197.208.148 130.35.228.35 38.45.71.3 183.222.254.161
43.249.50.155 204.76.203.18 192.168.2.119 195.178.110.155
42.236.17.43 202.158.54.161 42.236.17.45 213.209.143.52