Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Japan

Internet Service Provider: SoftBank

Hostname: unknown

Organization: Softbank BB Corp.

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:

; <<>> DiG 9.10.3-P4-Ubuntu <<>> 220.14.3.16
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 20521
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;220.14.3.16.			IN	A

;; AUTHORITY SECTION:
.			2448	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019060501 1800 900 604800 86400

;; Query time: 1 msec
;; SERVER: 67.207.67.2#53(67.207.67.2)
;; WHEN: Thu Jun 06 02:28:53 CST 2019
;; MSG SIZE  rcvd: 115

Host info
16.3.14.220.in-addr.arpa domain name pointer softbank220014003016.bbtec.net.
Nslookup info:
Server:		67.207.67.2
Address:	67.207.67.2#53

Non-authoritative answer:
16.3.14.220.in-addr.arpa	name = softbank220014003016.bbtec.net.

Authoritative answers can be found from:

Related IP info:
Related comments:
IP Type Details Datetime
145.239.29.61 attackbotsspam
Time:     Wed Apr  1 09:04:10 2020 -0300
IP:       145.239.29.61 (PL/Poland/ip-145-239-29.eu)
Failures: 5 (mod_security)
Interval: 3600 seconds
Blocked:  Permanent Block
2020-04-02 02:21:14
62.234.139.150 attack
5x Failed Password
2020-04-02 02:13:04
93.174.95.42 attackbotsspam
ET CINS Active Threat Intelligence Poor Reputation IP group 88 - port: 5060 proto: UDP cat: Misc Attack
2020-04-02 02:14:00
54.39.138.251 attackbots
fail2ban
2020-04-02 01:53:42
88.247.49.109 attackbotsspam
Attempted to steal my steam account
2020-04-02 01:58:04
175.176.162.178 attack
Unauthorized connection attempt from IP address 175.176.162.178 on Port 445(SMB)
2020-04-02 02:25:25
210.63.216.193 attackbotsspam
Unauthorized connection attempt from IP address 210.63.216.193 on Port 445(SMB)
2020-04-02 02:19:56
47.247.221.131 attack
Unauthorized connection attempt from IP address 47.247.221.131 on Port 445(SMB)
2020-04-02 02:29:41
62.241.148.26 attack
Unauthorized connection attempt from IP address 62.241.148.26 on Port 445(SMB)
2020-04-02 02:27:48
94.43.214.130 attack
Unauthorized connection attempt from IP address 94.43.214.130 on Port 445(SMB)
2020-04-02 02:12:31
188.163.104.67 attack
Time:     Wed Apr  1 09:10:49 2020 -0300
IP:       188.163.104.67 (UA/Ukraine/188-163-104-67.broadband.kyivstar.net)
Failures: 20 (WordPressBruteForcePOST)
Interval: 3600 seconds
Blocked:  Permanent Block
2020-04-02 02:34:03
179.197.50.160 attackspambots
1585758737 - 04/01/2020 18:32:17 Host: 179.197.50.160/179.197.50.160 Port: 445 TCP Blocked
2020-04-02 02:10:07
202.5.18.84 attack
2020-03-31 18:21:27 server sshd[22284]: Failed password for invalid user root from 202.5.18.84 port 40138 ssh2
2020-04-02 02:26:23
49.234.122.222 attackbotsspam
2020-04-01 05:16:05 server sshd[47268]: Failed password for invalid user root from 49.234.122.222 port 39692 ssh2
2020-04-02 01:54:37
223.227.52.137 attack
Unauthorized connection attempt detected from IP address 223.227.52.137 to port 445
2020-04-02 02:00:26

Recently Reported IPs

4.142.37.57 136.209.168.193 36.85.159.47 156.153.173.114
211.175.144.31 145.249.107.103 172.44.7.187 31.41.93.245
203.214.234.71 202.102.157.54 185.235.102.20 147.14.107.30
95.68.4.59 106.241.61.24 173.66.145.132 44.105.246.58
84.118.205.247 129.92.224.227 209.50.180.69 193.248.133.193