必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): Indonesia

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
IP 类型 评论内容 时间
116.206.14.24 attackspambots
20/8/2@16:22:11: FAIL: Alarm-Network address from=116.206.14.24
...
2020-08-03 07:36:00
116.206.14.51 attack
Unauthorized connection attempt from IP address 116.206.14.51 on Port 445(SMB)
2020-07-25 23:50:18
116.206.14.41 attack
Unauthorized connection attempt from IP address 116.206.14.41 on Port 445(SMB)
2020-06-10 02:30:40
116.206.14.15 attackbots
$f2bV_matches
2020-02-11 15:42:29
116.206.14.30 attackbotsspam
Honeypot attack, port: 445, PTR: subs30-116-206-14-30.three.co.id.
2020-02-03 01:47:45
116.206.14.61 attack
2019-10-0114:12:111iFH0l-0006hB-0s\<=info@imsuisse-sa.chH=194.162.229.201.l.sta.codetel.net.do\(imsuisse-sa.ch\)[201.229.162.194]:27326P=esmtpsaX=TLSv1.2:ECDHE-RSA-AES256-GCM-SHA384:256CV=noA=dovecot_plain:info@imsuisse-sa.chS=2384id=E85A1A6D-E132-4E6C-B8F6-F2C3643B4D53@imsuisse-sa.chT=""forjeffb@glenview.il.usjeffrey.ladd@klgates.comjeffrey.sriver@cityofchicago.orgjennifer.mcneil@urs.comJennifer.Tammen@cityofchicago.orgJessica-Leigh.Arends@meetingsfocus.com2019-10-0114:12:121iFH0l-0006dW-Ag\<=info@imsuisse-sa.chH=\(imsuisse-sa.ch\)[41.223.160.156]:8575P=esmtpsaX=TLSv1.2:ECDHE-RSA-AES256-GCM-SHA384:256CV=noA=dovecot_plain:info@imsuisse-sa.chS=2559id=7E657D39-0F36-4649-BC67-ED80260DEF78@imsuisse-sa.chT=""forggunther@Asplundh.comginger@techinsurance.comglaitman@Asplundh.comGloria.Pierce@BellSouth.comgmccaw@alcogare.comgpaulsson@comcast.netgrowell@summitsti.comgspence1@juno.comgthomas97@yahoo.com2019-10-0114:12:061iFH0g-0006hj-9j\<=info@imsuisse-sa.chH=\(imsuisse-sa.ch\)[46.53.72.52]:11830P=esmtpsaX=TLSv1.2:
2019-10-02 03:17:55
116.206.148.30 attack
Postfix SMTP rejection
...
2019-09-12 22:35:06
116.206.14.54 attack
[SMB remote code execution attempt: port tcp/445]
*(RWIN=8192)(08041230)
2019-08-05 01:22:36
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 116.206.14.42
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 39697
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;116.206.14.42.			IN	A

;; AUTHORITY SECTION:
.			169	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022021301 1800 900 604800 86400

;; Query time: 70 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Feb 14 06:47:44 CST 2022
;; MSG SIZE  rcvd: 106
HOST信息:
42.14.206.116.in-addr.arpa domain name pointer subs30-116-206-14-42.three.co.id.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
42.14.206.116.in-addr.arpa	name = subs30-116-206-14-42.three.co.id.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
121.164.224.52 attackspam
$f2bV_matches
2019-12-24 22:37:26
106.13.17.8 attack
Dec 24 09:06:35 plusreed sshd[11540]: Invalid user zjidc!@ from 106.13.17.8
...
2019-12-24 22:22:22
204.101.47.115 attack
MultiHost/MultiPort Probe, Scan, Hack -
2019-12-24 22:38:17
64.50.186.5 attackbots
64.50.186.5 - - [24/Dec/2019:07:41:43 +0000] "POST /wp-login.php HTTP/1.1" 200 6393 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
64.50.186.5 - - [24/Dec/2019:07:41:45 +0000] "POST /xmlrpc.php HTTP/1.1" 200 403 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
...
2019-12-24 22:24:02
106.52.24.64 attack
Dec 24 07:00:21 raspberrypi sshd\[20154\]: Failed password for root from 106.52.24.64 port 60780 ssh2Dec 24 07:12:49 raspberrypi sshd\[20916\]: Invalid user kurki from 106.52.24.64Dec 24 07:12:51 raspberrypi sshd\[20916\]: Failed password for invalid user kurki from 106.52.24.64 port 57534 ssh2
...
2019-12-24 22:34:13
185.253.250.173 attack
CloudCIX Reconnaissance Scan Detected, PTR: host-good.com.
2019-12-24 22:19:15
197.57.63.152 attackspambots
DLink DSL Remote OS Command Injection Vulnerability, PTR: host-197.57.63.152.tedata.net.
2019-12-24 22:45:02
31.9.180.151 attack
1577171575 - 12/24/2019 08:12:55 Host: 31.9.180.151/31.9.180.151 Port: 445 TCP Blocked
2019-12-24 22:35:02
124.123.71.104 attackspam
Unauthorized connection attempt detected from IP address 124.123.71.104 to port 445
2019-12-24 22:13:31
118.69.174.108 attack
Automatic report - Banned IP Access
2019-12-24 22:28:19
94.142.140.219 attack
SSH/22 MH Probe, BF, Hack -
2019-12-24 22:45:15
223.247.129.84 attack
Dec 24 06:21:43 vps46666688 sshd[31899]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=223.247.129.84
Dec 24 06:21:46 vps46666688 sshd[31899]: Failed password for invalid user 2wsx3edc from 223.247.129.84 port 41758 ssh2
...
2019-12-24 22:30:13
51.38.93.221 attackspambots
SIP/5060 Probe, BF, Hack -
2019-12-24 22:25:20
103.81.156.10 attack
SSH/22 MH Probe, BF, Hack -
2019-12-24 22:32:59
121.164.117.201 attackbotsspam
$f2bV_matches
2019-12-24 22:39:59

最近上报的IP列表

116.204.154.160 116.206.15.4 116.206.35.22 116.209.140.228
116.206.9.3 116.209.141.113 116.21.15.5 116.206.149.62
116.21.158.138 116.21.252.130 116.210.95.151 116.206.59.26
116.206.91.203 116.212.151.246 116.22.149.60 116.22.163.170
116.22.199.44 116.22.166.173 116.220.222.244 116.220.98.182