必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): Thailand

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
% [whois.apnic.net]
% Whois data copyright terms    http://www.apnic.net/db/dbcopyright.html

% Information related to '14.207.194.0 - 14.207.194.255'

% Abuse contact for '14.207.194.0 - 14.207.194.255' is 'abuseIPv4@ais.co.th'

inetnum:        14.207.194.0 - 14.207.194.255
netname:        AWN-Customer
descr:          OIC (Office of Insurance Commission) Headquarters- Corporate Internet # 1
country:        TH
admin-c:        SS1413-AP
tech-c:         NI36-AP
abuse-c:        AE626-AP
status:         ASSIGNED NON-PORTABLE
mnt-by:         MAINT-TTBP-TH
mnt-irt:        IRT-EDS-TTBP-TH
last-modified:  2026-04-16T08:18:27Z
source:         APNIC

irt:            IRT-EDS-TTBP-TH
address:        414 Phaholyothin Rd Samsen Nai Phayathai Thailand Bangkok 10400
e-mail:         abuseIPv4@ais.co.th
abuse-mailbox:  abuseIPv4@ais.co.th
admin-c:        TTBP1-AP
tech-c:         TTBP1-AP
auth:           # Filtered
remarks:        abuseipv4@ais.co.th was validated on 2026-02-27
mnt-by:         MAINT-TTBP-TH
last-modified:  2026-02-27T03:34:38Z
source:         APNIC

role:           ABUSE EDSTTBPTH
country:        ZZ
address:        414 Phaholyothin Rd Samsen Nai Phayathai Thailand Bangkok 10400
phone:          +000000000
e-mail:         abuseIPv4@ais.co.th
admin-c:        TTBP1-AP
tech-c:         TTBP1-AP
nic-hdl:        AE626-AP
remarks:        Generated from irt object IRT-EDS-TTBP-TH
remarks:        abuseipv4@ais.co.th was validated on 2026-02-27
abuse-mailbox:  abuseIPv4@ais.co.th
mnt-by:         APNIC-ABUSE
last-modified:  2026-02-27T03:34:54Z
source:         APNIC

role:           SBN Co Ltd IP Planning
address:        408/60 Phaholyothin Place Building 38th floor
address:        Phaholyothin Road, Samsennai,
address:        Phayathai, Bangkok 10400
country:        TH
phone:          +66-2-615-3964
fax-no:         +66-2-619-8777
e-mail:         sitthips@ais.co.th
abuse-mailbox:  abuseipv4@sbn.co.th
admin-c:        SS1413-AP
tech-c:         BS534-AP
nic-hdl:        SS1413-AP
mnt-by:         MAINT-AWN-CO-LTD-TH
last-modified:  2021-11-07T23:30:27Z
source:         APNIC

person:         Naruepon Intarayotha
nic-hdl:        NI36-AP
e-mail:         naruepoi@ais.co.th
address:        Advanced Info Service Public Company Limited
address:        1291/1 Phaholyothin Road, Phayathai, Bangkok 10400, THAILAND
phone:          +6622996000 Ext. 3803
fax-no:         +6622996076
country:        TH
mnt-by:         MAINT-TH-AIS
last-modified:  2008-09-04T07:46:11Z
source:         APNIC

% Information related to '14.207.194.0/24AS138422'

route:          14.207.194.0/24
origin:         AS138422
descr:          Triple T Broadband Public Company Limited
                89 , Cosmo Office Park Building , Popular Road
                Ban Mai Subdistrict ,
mnt-by:         MAINT-TTBP-TH
last-modified:  2026-01-28T04:39:47Z
source:         APNIC

% Information related to '14.207.194.0/24AS45458'

route:          14.207.194.0/24
origin:         AS45458
descr:          Triple T Broadband Public Company Limited
                Jasmine International Tower   200 Moo 4 Chaengwattana Rd.
mnt-by:         MAINT-TTBP-TH
last-modified:  2025-08-14T06:46:16Z
source:         APNIC

% This query was served by the APNIC Whois Service version 1.88.48 (WHOIS-AU4)
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 14.207.194.89
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 9784
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;14.207.194.89.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2026042902 1800 900 604800 86400

;; Query time: 8 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Apr 30 10:03:25 CST 2026
;; MSG SIZE  rcvd: 106
HOST信息:
Host 89.194.207.14.in-addr.arpa not found: 2(SERVFAIL)
NSLOOKUP信息:
server can't find 14.207.194.89.in-addr.arpa: SERVFAIL
相关IP信息:
最新评论:
IP 类型 评论内容 时间
2.187.37.193 attackspambots
Honeypot attack, port: 81, PTR: PTR record not found
2020-01-18 06:25:26
123.207.161.37 attackbotsspam
Unauthorized connection attempt detected from IP address 123.207.161.37 to port 1433 [J]
2020-01-18 07:14:24
185.53.88.111 attackbots
" "
2020-01-18 07:06:04
78.100.194.80 attackspambots
Unauthorized connection attempt detected from IP address 78.100.194.80 to port 80 [J]
2020-01-18 06:54:16
128.199.171.89 attackspam
AbusiveCrawling
2020-01-18 06:52:46
139.59.33.100 attack
2020-01-17 23:11:31,185 ncomp.co.za proftpd[23812] mail.ncomp.co.za (139.59.33.100[139.59.33.100]): USER enforms.co: no such user found from 139.59.33.100 [139.59.33.100] to ::ffff:172.31.1.100:21
2020-01-17 23:11:34,449 ncomp.co.za proftpd[23813] mail.ncomp.co.za (139.59.33.100[139.59.33.100]): USER enforms.co: no such user found from 139.59.33.100 [139.59.33.100] to ::ffff:172.31.1.100:21
2020-01-17 23:11:38,771 ncomp.co.za proftpd[23814] mail.ncomp.co.za (139.59.33.100[139.59.33.100]): USER enforms.co: no such user found from 139.59.33.100 [139.59.33.100] to ::ffff:172.31.1.100:21
2020-01-18 06:33:51
201.49.110.210 attackspam
2020-01-17T22:06:44.833464shield sshd\[19048\]: Invalid user admin from 201.49.110.210 port 34670
2020-01-17T22:06:44.839437shield sshd\[19048\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=201.49.110.210
2020-01-17T22:06:46.501535shield sshd\[19048\]: Failed password for invalid user admin from 201.49.110.210 port 34670 ssh2
2020-01-17T22:09:39.026838shield sshd\[19792\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=201.49.110.210  user=root
2020-01-17T22:09:41.052508shield sshd\[19792\]: Failed password for root from 201.49.110.210 port 58034 ssh2
2020-01-18 06:22:10
185.209.0.92 attackspambots
Multiport scan : 14 ports scanned 3394 3398 4040 5665 5705 5750 5757 5775 5800 5808 5899 5900 5908 5910
2020-01-18 07:03:56
36.80.84.70 attack
Honeypot attack, port: 445, PTR: PTR record not found
2020-01-18 06:44:39
129.211.20.61 attackspambots
Jan 17 22:04:17 server sshd[27077]: Failed password for invalid user demo from 129.211.20.61 port 35906 ssh2
Jan 17 22:10:11 server sshd[27243]: Failed password for root from 129.211.20.61 port 42396 ssh2
Jan 17 22:11:49 server sshd[27269]: Failed password for root from 129.211.20.61 port 57912 ssh2
2020-01-18 06:22:25
183.17.231.64 attackspam
Honeypot attack, port: 445, PTR: PTR record not found
2020-01-18 06:29:32
121.129.124.242 attackspambots
TCP src-port=39012   dst-port=25   Listed on   dnsbl-sorbs abuseat-org barracuda         (634)
2020-01-18 06:56:12
94.102.49.65 attackspam
Multiport scan : 22 ports scanned 2331 2332 2333 2334 2336 2337 2338 2339 2340 2341 2342 2343 2344 2345 2346 2347 2348 2349 3851 3853 3856 22121
2020-01-18 07:17:34
185.209.0.89 attack
Multiport scan : 15 ports scanned 4155 4200 4250 4503 4506 4508 4510 4555 4600 5501 5504 5505 5506 5508 5510
2020-01-18 07:04:45
46.228.199.111 attackbots
1579297725 - 01/17/2020 22:48:45 Host: 46.228.199.111/46.228.199.111 Port: 21 TCP Blocked
2020-01-18 06:39:04

最近上报的IP列表

185.226.197.8 176.65.132.43 162.216.150.105 80.96.113.206
14.207.194.26 2606:4700:10::6814:9345 2606:4700:10::6814:8168 51.102.248.238
148.224.25.43 66.132.195.74 2606:4700:10::6814:6266 2606:4700:10::6814:6386
172.237.117.141 43.164.131.148 2606:4700:10::6816:4335 2606:4700:10::6816:2015
103.215.140.39 149.119.134.111 165.254.151.169 2606:4700:10::6816:4795