必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): Thailand

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
% [whois.apnic.net]
% Whois data copyright terms    http://www.apnic.net/db/dbcopyright.html

% Information related to '14.207.128.0 - 14.207.255.255'

% Abuse contact for '14.207.128.0 - 14.207.255.255' is 'ipadmin@3bbmail.com'

inetnum:        14.207.128.0 - 14.207.255.255
netname:        TTBP-TH
descr:          Triple T Broadband Public Company Limited
country:        TH
admin-c:        TTBP1-AP
tech-c:         TTBP1-AP
abuse-c:        AT1597-AP
status:         ALLOCATED NON-PORTABLE
mnt-by:         MAINT-TTBP-TH
mnt-irt:        IRT-TTBP-TH
last-modified:  2021-12-22T02:33:28Z
source:         APNIC

irt:            IRT-TTBP-TH
address:        89 , Cosmo Office Park Building , Popular Road Ban Mai Subdistrict , Pakkret 11120
e-mail:         ipadmin@3bbmail.com
abuse-mailbox:  ipadmin@3bbmail.com
admin-c:        TTBP1-AP
tech-c:         TTBP1-AP
auth:           # Filtered
remarks:        ipadmin@3bbmail.com was validated on 2025-09-11
mnt-by:         MAINT-TTBP-TH
last-modified:  2026-02-13T04:33:50Z
source:         APNIC

role:           ABUSE TTBPTH
country:        ZZ
address:        89 , Cosmo Office Park Building , Popular Road Ban Mai Subdistrict , Pakkret 11120
phone:          +000000000
e-mail:         ipadmin@3bbmail.com
admin-c:        TTBP1-AP
tech-c:         TTBP1-AP
nic-hdl:        AT1597-AP
remarks:        Generated from irt object IRT-TTBP-TH
remarks:        ipadmin@3bbmail.com was validated on 2025-09-11
abuse-mailbox:  ipadmin@3bbmail.com
mnt-by:         APNIC-ABUSE
last-modified:  2025-09-11T08:48:08Z
source:         APNIC

role:           Triple T Broadband PCL administrator
address:        Jasmine International Public Company Limited, Pakkret Nonthaburi 11120
country:        TH
phone:          +6621008552
e-mail:         wanchai.ti@jasmine.com
admin-c:        TTBP1-AP
tech-c:         TTBP1-AP
nic-hdl:        TTBP1-AP
mnt-by:         MAINT-TTBP-TH
last-modified:  2021-07-27T02:31:01Z
source:         APNIC

% Information related to '14.207.194.0/24AS138422'

route:          14.207.194.0/24
origin:         AS138422
descr:          Triple T Broadband Public Company Limited
                89 , Cosmo Office Park Building , Popular Road
                Ban Mai Subdistrict ,
mnt-by:         MAINT-TTBP-TH
last-modified:  2026-01-28T04:39:47Z
source:         APNIC

% Information related to '14.207.194.0/24AS45458'

route:          14.207.194.0/24
origin:         AS45458
descr:          Triple T Broadband Public Company Limited
                Jasmine International Tower   200 Moo 4 Chaengwattana Rd.
mnt-by:         MAINT-TTBP-TH
last-modified:  2025-08-14T06:46:16Z
source:         APNIC

% This query was served by the APNIC Whois Service version 1.88.36-SNAPSHOT (WHOIS-AU5)
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 14.207.194.157
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 33992
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;14.207.194.157.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2026032002 1800 900 604800 86400

;; Query time: 7 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Mar 21 06:06:04 CST 2026
;; MSG SIZE  rcvd: 107
HOST信息:
b'Host 157.194.207.14.in-addr.arpa not found: 2(SERVFAIL)
'
NSLOOKUP信息:
server can't find 14.207.194.157.in-addr.arpa: SERVFAIL
相关IP信息:
最新评论:
IP 类型 评论内容 时间
85.239.35.130 attackspam
Cowrie Honeypot: Unauthorised SSH/Telnet login attempt with user "root" at 2020-10-04T18:21:52Z
2020-10-05 02:28:36
5.141.178.251 attackbots
Oct  4 01:36:48 gw1 sshd[21116]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=5.141.178.251
Oct  4 01:36:50 gw1 sshd[21116]: Failed password for invalid user nagesh from 5.141.178.251 port 58035 ssh2
...
2020-10-05 02:33:48
139.155.79.35 attackspambots
2020-10-04T19:54:12.380718vps773228.ovh.net sshd[19463]: Failed password for root from 139.155.79.35 port 54378 ssh2
2020-10-04T19:57:28.106664vps773228.ovh.net sshd[19511]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.155.79.35  user=root
2020-10-04T19:57:30.076225vps773228.ovh.net sshd[19511]: Failed password for root from 139.155.79.35 port 39154 ssh2
2020-10-04T20:00:42.965380vps773228.ovh.net sshd[19547]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.155.79.35  user=root
2020-10-04T20:00:44.897186vps773228.ovh.net sshd[19547]: Failed password for root from 139.155.79.35 port 52160 ssh2
...
2020-10-05 02:06:14
157.245.178.61 attack
Cowrie Honeypot: 3 unauthorised SSH/Telnet login attempts between 2020-10-04T08:15:12Z and 2020-10-04T08:19:46Z
2020-10-05 02:32:02
172.254.156.19 attackspam
DATE:2020-10-04 13:32:32, IP:172.254.156.19, PORT:telnet Telnet brute force auth on honeypot server (epe-honey1-hq)
2020-10-05 02:38:47
23.101.156.218 attackspambots
Oct  4 09:33:17 propaganda sshd[38386]: Connection from 23.101.156.218 port 50090 on 10.0.0.161 port 22 rdomain ""
Oct  4 09:33:18 propaganda sshd[38386]: Connection closed by 23.101.156.218 port 50090 [preauth]
2020-10-05 02:24:22
110.153.77.192 attack
 TCP (SYN) 110.153.77.192:3775 -> port 8080, len 60
2020-10-05 02:28:49
64.227.54.171 attackbotsspam
SSH/22 MH Probe, BF, Hack -
2020-10-05 02:07:09
74.120.14.38 attack
Oct  3 23:37:01 baraca inetd[61588]: refused connection from scanner-06.ch1.censys-scanner.com, service sshd (tcp)
Oct  3 23:37:02 baraca inetd[61589]: refused connection from scanner-06.ch1.censys-scanner.com, service sshd (tcp)
Oct  3 23:37:04 baraca inetd[61590]: refused connection from scanner-06.ch1.censys-scanner.com, service sshd (tcp)
...
2020-10-05 02:20:47
74.120.14.37 attackbotsspam
Oct  3 23:37:01 baraca inetd[61588]: refused connection from scanner-06.ch1.censys-scanner.com, service sshd (tcp)
Oct  3 23:37:02 baraca inetd[61589]: refused connection from scanner-06.ch1.censys-scanner.com, service sshd (tcp)
Oct  3 23:37:04 baraca inetd[61590]: refused connection from scanner-06.ch1.censys-scanner.com, service sshd (tcp)
...
2020-10-05 02:17:24
166.175.56.125 attackbotsspam
Brute forcing email accounts
2020-10-05 02:03:03
74.120.14.34 attackbots
Honeypot hit.
2020-10-05 02:06:40
119.45.198.117 attack
prod8
...
2020-10-05 02:03:21
180.96.63.162 attackbots
Oct  4 16:20:30 rancher-0 sshd[456102]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.96.63.162  user=root
Oct  4 16:20:32 rancher-0 sshd[456102]: Failed password for root from 180.96.63.162 port 59921 ssh2
...
2020-10-05 02:04:11
74.120.14.41 attack
Oct  3 23:37:01 baraca inetd[61588]: refused connection from scanner-06.ch1.censys-scanner.com, service sshd (tcp)
Oct  3 23:37:02 baraca inetd[61589]: refused connection from scanner-06.ch1.censys-scanner.com, service sshd (tcp)
Oct  3 23:37:04 baraca inetd[61590]: refused connection from scanner-06.ch1.censys-scanner.com, service sshd (tcp)
...
2020-10-05 02:15:39

最近上报的IP列表

2606:4700:10::6816:1318 2606:4700:10::6816:1161 2606:4700:10::6816:1360 2606:4700:10::6814:6326
236.247.175.39 106.75.133.245 14.212.68.169 101.34.215.105
68.237.134.66 47.91.238.135 216.180.246.237 34.38.252.90
147.185.133.218 52.212.187.55 121.230.89.139 2606:4700:10::6814:9765
2606:4700:10::6816:820 2606:4700:10::6814:9022 2606:4700:10::6816:2245 2606:4700:10::6814:9970