必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): Thailand

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
% [whois.apnic.net]
% Whois data copyright terms    http://www.apnic.net/db/dbcopyright.html

% Information related to '14.207.128.0 - 14.207.255.255'

% Abuse contact for '14.207.128.0 - 14.207.255.255' is 'ipadmin@3bbmail.com'

inetnum:        14.207.128.0 - 14.207.255.255
netname:        TTBP-TH
descr:          Triple T Broadband Public Company Limited
country:        TH
admin-c:        TTBP1-AP
tech-c:         TTBP1-AP
abuse-c:        AT1597-AP
status:         ALLOCATED NON-PORTABLE
mnt-by:         MAINT-TTBP-TH
mnt-irt:        IRT-TTBP-TH
last-modified:  2021-12-22T02:33:28Z
source:         APNIC

irt:            IRT-TTBP-TH
address:        89 , Cosmo Office Park Building , Popular Road Ban Mai Subdistrict , Pakkret 11120
e-mail:         ipadmin@3bbmail.com
abuse-mailbox:  ipadmin@3bbmail.com
admin-c:        TTBP1-AP
tech-c:         TTBP1-AP
auth:           # Filtered
remarks:        ipadmin@3bbmail.com was validated on 2025-09-11
mnt-by:         MAINT-TTBP-TH
last-modified:  2026-02-13T04:33:50Z
source:         APNIC

role:           ABUSE TTBPTH
country:        ZZ
address:        89 , Cosmo Office Park Building , Popular Road Ban Mai Subdistrict , Pakkret 11120
phone:          +000000000
e-mail:         ipadmin@3bbmail.com
admin-c:        TTBP1-AP
tech-c:         TTBP1-AP
nic-hdl:        AT1597-AP
remarks:        Generated from irt object IRT-TTBP-TH
remarks:        ipadmin@3bbmail.com was validated on 2025-09-11
abuse-mailbox:  ipadmin@3bbmail.com
mnt-by:         APNIC-ABUSE
last-modified:  2025-09-11T08:48:08Z
source:         APNIC

role:           Triple T Broadband PCL administrator
address:        Jasmine International Public Company Limited, Pakkret Nonthaburi 11120
country:        TH
phone:          +6621008552
e-mail:         wanchai.ti@jasmine.com
admin-c:        TTBP1-AP
tech-c:         TTBP1-AP
nic-hdl:        TTBP1-AP
mnt-by:         MAINT-TTBP-TH
last-modified:  2021-07-27T02:31:01Z
source:         APNIC

% Information related to '14.207.194.0/24AS138422'

route:          14.207.194.0/24
origin:         AS138422
descr:          Triple T Broadband Public Company Limited
                89 , Cosmo Office Park Building , Popular Road
                Ban Mai Subdistrict ,
mnt-by:         MAINT-TTBP-TH
last-modified:  2026-01-28T04:39:47Z
source:         APNIC

% Information related to '14.207.194.0/24AS45458'

route:          14.207.194.0/24
origin:         AS45458
descr:          Triple T Broadband Public Company Limited
                Jasmine International Tower   200 Moo 4 Chaengwattana Rd.
mnt-by:         MAINT-TTBP-TH
last-modified:  2025-08-14T06:46:16Z
source:         APNIC

% This query was served by the APNIC Whois Service version 1.88.36-SNAPSHOT (WHOIS-AU5)
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 14.207.194.197
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 22714
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;14.207.194.197.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2026033000 1800 900 604800 86400

;; Query time: 31 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Mar 30 18:35:19 CST 2026
;; MSG SIZE  rcvd: 107
HOST信息:
Host 197.194.207.14.in-addr.arpa not found: 2(SERVFAIL)
NSLOOKUP信息:
server can't find 14.207.194.197.in-addr.arpa: SERVFAIL
相关IP信息:
最新评论:
IP 类型 评论内容 时间
134.19.231.200 attackbotsspam
fell into ViewStateTrap:wien2018
2020-01-14 23:22:52
72.93.255.245 attackspam
Jan 14 17:06:19 www sshd\[80270\]: Invalid user tun from 72.93.255.245
Jan 14 17:06:19 www sshd\[80270\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=72.93.255.245
Jan 14 17:06:21 www sshd\[80270\]: Failed password for invalid user tun from 72.93.255.245 port 35636 ssh2
...
2020-01-14 23:18:34
115.59.242.24 attack
MultiHost/MultiPort Probe, Scan, Hack -
2020-01-14 23:50:37
173.210.1.162 attack
Mar 21 01:57:17 vtv3 sshd[21109]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=173.210.1.162
Apr 10 01:22:03 vtv3 sshd[24987]: Invalid user testing from 173.210.1.162 port 35230
Apr 10 01:22:03 vtv3 sshd[24987]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=173.210.1.162
Apr 10 01:22:05 vtv3 sshd[24987]: Failed password for invalid user testing from 173.210.1.162 port 35230 ssh2
Apr 10 01:28:32 vtv3 sshd[27543]: Invalid user felix from 173.210.1.162 port 59886
Apr 10 01:28:32 vtv3 sshd[27543]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=173.210.1.162
Apr 16 20:57:17 vtv3 sshd[10543]: Invalid user test from 173.210.1.162 port 9537
Apr 16 20:57:17 vtv3 sshd[10543]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=173.210.1.162
Apr 16 20:57:19 vtv3 sshd[10543]: Failed password for invalid user test from 173.210.1.162 port 9537 ssh2
Apr 16 21:02:48
2020-01-14 23:26:44
185.233.187.186 attackbotsspam
Ein möglicherweise gefährlicher Request.Form-Wert wurde vom Client (mp$ContentZone$TxtMessage="
2020-01-14 23:21:48
103.52.216.156 attack
ICMP MH Probe, Scan /Distributed -
2020-01-14 23:22:02
176.113.70.60 attack
Portscan or hack attempt detected by psad/fwsnort
2020-01-14 23:35:11
213.219.77.130 attackspambots
Lines containing failures of 213.219.77.130
Jan 14 14:01:16 shared07 sshd[9328]: Invalid user manager from 213.219.77.130 port 26395
Jan 14 14:01:16 shared07 sshd[9328]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=213.219.77.130
Jan 14 14:01:18 shared07 sshd[9328]: Failed password for invalid user manager from 213.219.77.130 port 26395 ssh2
Jan 14 14:01:18 shared07 sshd[9328]: Connection closed by invalid user manager 213.219.77.130 port 26395 [preauth]


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=213.219.77.130
2020-01-14 23:47:49
156.215.211.25 attack
1579006949 - 01/14/2020 14:02:29 Host: 156.215.211.25/156.215.211.25 Port: 445 TCP Blocked
2020-01-14 23:51:49
177.25.130.223 attack
Used for scripting attack on checkout to test stolen cards
2020-01-14 23:49:55
111.230.247.243 attack
Jan 14 15:04:21 lnxweb61 sshd[23183]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.230.247.243
2020-01-14 23:09:55
181.30.28.247 attackbots
Unauthorized connection attempt detected from IP address 181.30.28.247 to port 2220 [J]
2020-01-14 23:11:52
222.186.175.182 attackspambots
Jan 14 05:07:20 hanapaa sshd\[5652\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.175.182  user=root
Jan 14 05:07:21 hanapaa sshd\[5652\]: Failed password for root from 222.186.175.182 port 18024 ssh2
Jan 14 05:07:39 hanapaa sshd\[5661\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.175.182  user=root
Jan 14 05:07:40 hanapaa sshd\[5661\]: Failed password for root from 222.186.175.182 port 59282 ssh2
Jan 14 05:08:01 hanapaa sshd\[5704\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.175.182  user=root
2020-01-14 23:08:44
112.78.178.213 attackbots
Automatic report - SSH Brute-Force Attack
2020-01-14 23:28:39
46.38.144.146 attackspam
Jan 14 14:53:11 blackbee postfix/smtpd\[21352\]: warning: unknown\[46.38.144.146\]: SASL LOGIN authentication failed: authentication failure
Jan 14 14:53:22 blackbee postfix/smtpd\[21354\]: warning: unknown\[46.38.144.146\]: SASL LOGIN authentication failed: authentication failure
Jan 14 14:54:22 blackbee postfix/smtpd\[21352\]: warning: unknown\[46.38.144.146\]: SASL LOGIN authentication failed: authentication failure
Jan 14 14:54:35 blackbee postfix/smtpd\[21355\]: warning: unknown\[46.38.144.146\]: SASL LOGIN authentication failed: authentication failure
Jan 14 14:55:33 blackbee postfix/smtpd\[21355\]: warning: unknown\[46.38.144.146\]: SASL LOGIN authentication failed: authentication failure
...
2020-01-14 23:07:47

最近上报的IP列表

110.78.158.157 110.77.248.53 110.77.248.83 2606:4700:10::6816:1419
109.167.82.70 109.162.246.151 2606:4700:10::6814:6544 2606:4700:10::ac43:1159
2606:4700:10::6814:7695 2606:4700:10::6816:4219 2606:4700:10::ac43:2881 93.81.87.208
164.102.58.199 51.77.114.100 8.77.135.154 93.236.24.49
226.41.4.177 221.157.2.151 232.6.248.67 121.21.193.215