必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): Ho Chi Minh City

省份(region): Ho Chi Minh

国家(country): Vietnam

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
IP 类型 评论内容 时间
14.161.12.119 attackbotsspam
Tried sshing with brute force.
2020-09-08 14:14:23
14.161.12.119 attackspambots
Sep  7 20:51:54 abendstille sshd\[27160\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=14.161.12.119  user=root
Sep  7 20:51:56 abendstille sshd\[27160\]: Failed password for root from 14.161.12.119 port 59697 ssh2
Sep  7 20:55:25 abendstille sshd\[30570\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=14.161.12.119  user=root
Sep  7 20:55:26 abendstille sshd\[30570\]: Failed password for root from 14.161.12.119 port 52367 ssh2
Sep  7 20:58:55 abendstille sshd\[1398\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=14.161.12.119  user=root
...
2020-09-08 06:45:01
14.161.12.119 attackbots
Sep  4 15:33:47 MainVPS sshd[32498]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=14.161.12.119  user=root
Sep  4 15:33:50 MainVPS sshd[32498]: Failed password for root from 14.161.12.119 port 54309 ssh2
Sep  4 15:37:50 MainVPS sshd[9040]: Invalid user whc from 14.161.12.119 port 43505
Sep  4 15:37:50 MainVPS sshd[9040]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=14.161.12.119
Sep  4 15:37:50 MainVPS sshd[9040]: Invalid user whc from 14.161.12.119 port 43505
Sep  4 15:37:52 MainVPS sshd[9040]: Failed password for invalid user whc from 14.161.12.119 port 43505 ssh2
...
2020-09-05 02:36:21
14.161.12.119 attackspam
Sep  4 12:15:24 itv-usvr-02 sshd[30676]: Invalid user admin from 14.161.12.119 port 43725
Sep  4 12:15:24 itv-usvr-02 sshd[30676]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=14.161.12.119
Sep  4 12:15:24 itv-usvr-02 sshd[30676]: Invalid user admin from 14.161.12.119 port 43725
Sep  4 12:15:26 itv-usvr-02 sshd[30676]: Failed password for invalid user admin from 14.161.12.119 port 43725 ssh2
Sep  4 12:19:52 itv-usvr-02 sshd[30860]: Invalid user vinci from 14.161.12.119 port 43991
2020-09-04 18:03:45
14.161.12.249 attackspam
Unauthorized connection attempt from IP address 14.161.12.249 on Port 445(SMB)
2020-08-22 01:44:11
14.161.12.119 attackbots
SSH login attempts.
2020-05-28 13:09:07
14.161.12.119 attackbotsspam
Invalid user jose from 14.161.12.119 port 55977
2020-05-16 23:13:01
14.161.12.119 attackbotsspam
May 14 11:27:37 legacy sshd[14797]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=14.161.12.119
May 14 11:27:39 legacy sshd[14797]: Failed password for invalid user diep from 14.161.12.119 port 59235 ssh2
May 14 11:32:53 legacy sshd[15116]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=14.161.12.119
...
2020-05-14 17:41:07
14.161.12.119 attackbotsspam
May 13 16:27:41 PorscheCustomer sshd[22447]: Failed password for invalid user rookie from 14.161.12.119 port 35919 ssh2
May 13 16:32:24 PorscheCustomer sshd[22557]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=14.161.12.119
May 13 16:32:26 PorscheCustomer sshd[22557]: Failed password for invalid user taiwan from 14.161.12.119 port 36989 ssh2
...
2020-05-14 01:47:50
14.161.12.119 attackbots
Invalid user jose from 14.161.12.119 port 55977
2020-05-12 16:53:29
14.161.12.119 attackspam
2020-05-08T14:07:28.427546shield sshd\[27478\]: Invalid user ping from 14.161.12.119 port 63181
2020-05-08T14:07:28.432081shield sshd\[27478\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=14.161.12.119
2020-05-08T14:07:30.498698shield sshd\[27478\]: Failed password for invalid user ping from 14.161.12.119 port 63181 ssh2
2020-05-08T14:12:43.980402shield sshd\[28961\]: Invalid user testuser from 14.161.12.119 port 39297
2020-05-08T14:12:43.990364shield sshd\[28961\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=14.161.12.119
2020-05-08 22:12:58
14.161.12.119 attackspambots
May  2 14:38:24 amit sshd\[4061\]: Invalid user vue from 14.161.12.119
May  2 14:38:24 amit sshd\[4061\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=14.161.12.119
May  2 14:38:27 amit sshd\[4061\]: Failed password for invalid user vue from 14.161.12.119 port 50381 ssh2
...
2020-05-03 01:55:28
14.161.12.238 attack
Mar 11 06:39:00 josie sshd[16415]: Did not receive identification string from 14.161.12.238
Mar 11 06:39:00 josie sshd[16417]: Did not receive identification string from 14.161.12.238
Mar 11 06:39:00 josie sshd[16419]: Did not receive identification string from 14.161.12.238
Mar 11 06:39:00 josie sshd[16418]: Did not receive identification string from 14.161.12.238
Mar 11 06:39:05 josie sshd[16459]: Invalid user system from 14.161.12.238
Mar 11 06:39:05 josie sshd[16460]: Invalid user system from 14.161.12.238
Mar 11 06:39:05 josie sshd[16464]: Invalid user system from 14.161.12.238
Mar 11 06:39:05 josie sshd[16463]: Invalid user system from 14.161.12.238
Mar 11 06:39:05 josie sshd[16459]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=14.161.12.238 
Mar 11 06:39:05 josie sshd[16460]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=14.161.12.238 
Mar 11 06:39:05 josie sshd[16464]: pam_unix(........
-------------------------------
2020-03-12 02:16:21
14.161.12.154 attack
Unauthorized connection attempt detected from IP address 14.161.12.154 to port 445
2019-12-18 00:36:59
14.161.123.103 attackbotsspam
Nov 24 15:31:46 mxgate1 postfix/postscreen[31810]: CONNECT from [14.161.123.103]:34604 to [176.31.12.44]:25
Nov 24 15:31:47 mxgate1 postfix/dnsblog[31995]: addr 14.161.123.103 listed by domain cbl.abuseat.org as 127.0.0.2
Nov 24 15:31:47 mxgate1 postfix/dnsblog[31994]: addr 14.161.123.103 listed by domain zen.spamhaus.org as 127.0.0.11
Nov 24 15:31:47 mxgate1 postfix/dnsblog[31994]: addr 14.161.123.103 listed by domain zen.spamhaus.org as 127.0.0.4
Nov 24 15:31:47 mxgate1 postfix/dnsblog[31996]: addr 14.161.123.103 listed by domain b.barracudacentral.org as 127.0.0.2
Nov 24 15:31:52 mxgate1 postfix/postscreen[31810]: DNSBL rank 4 for [14.161.123.103]:34604
Nov x@x
Nov 24 15:31:53 mxgate1 postfix/postscreen[31810]: HANGUP after 1.3 from [14.161.123.103]:34604 in tests after SMTP handshake
Nov 24 15:31:53 mxgate1 postfix/postscreen[31810]: DISCONNECT [14.161.123.103]:34604


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=14.161.123.103
2019-11-25 05:57:11
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 14.161.12.117
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 17495
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;14.161.12.117.			IN	A

;; AUTHORITY SECTION:
.			177	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2021091001 1800 900 604800 86400

;; Query time: 58 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Sep 11 12:11:42 CST 2021
;; MSG SIZE  rcvd: 106
HOST信息:
117.12.161.14.in-addr.arpa domain name pointer static.vnpt.vn.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
117.12.161.14.in-addr.arpa	name = static.vnpt.vn.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
14.254.71.17 attackspam
11/01/2019-23:43:31.277410 14.254.71.17 Protocol: 6 ET SCAN Suspicious inbound to MSSQL port 1433
2019-11-02 18:53:11
118.24.158.42 attackbots
Nov  2 10:58:39 legacy sshd[20585]: Failed password for root from 118.24.158.42 port 53604 ssh2
Nov  2 11:03:30 legacy sshd[20670]: Failed password for root from 118.24.158.42 port 33098 ssh2
...
2019-11-02 19:05:06
209.17.97.90 attackspambots
Connection by 209.17.97.90 on port: 8443 got caught by honeypot at 11/2/2019 11:05:43 AM
2019-11-02 19:06:45
106.13.48.20 attack
Invalid user murai1 from 106.13.48.20 port 57416
2019-11-02 18:30:49
106.3.135.27 attackbotsspam
Nov  2 06:20:29 MK-Soft-VM3 sshd[14048]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.3.135.27 
Nov  2 06:20:31 MK-Soft-VM3 sshd[14048]: Failed password for invalid user er from 106.3.135.27 port 42017 ssh2
...
2019-11-02 19:04:22
172.68.58.50 attack
172.68.58.50 - - [02/Nov/2019:03:44:23 +0000] "POST /wp-login.php HTTP/1.1" 200 1449 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
2019-11-02 18:30:16
80.211.116.102 attackbotsspam
Automatic report - Banned IP Access
2019-11-02 18:55:12
218.219.246.124 attackspambots
Nov  2 10:00:03 v22018076622670303 sshd\[18890\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.219.246.124  user=root
Nov  2 10:00:05 v22018076622670303 sshd\[18890\]: Failed password for root from 218.219.246.124 port 57620 ssh2
Nov  2 10:03:53 v22018076622670303 sshd\[18904\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.219.246.124  user=root
...
2019-11-02 18:31:03
37.203.208.3 attack
Nov  2 06:52:38 tux-35-217 sshd\[32464\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=37.203.208.3  user=root
Nov  2 06:52:39 tux-35-217 sshd\[32464\]: Failed password for root from 37.203.208.3 port 37318 ssh2
Nov  2 06:56:46 tux-35-217 sshd\[32471\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=37.203.208.3  user=root
Nov  2 06:56:48 tux-35-217 sshd\[32471\]: Failed password for root from 37.203.208.3 port 48482 ssh2
...
2019-11-02 19:06:11
160.179.61.241 attack
/editBlackAndWhiteList
2019-11-02 18:46:43
203.229.246.118 attack
Nov  1 21:35:22 server sshd\[25428\]: Failed password for invalid user ubuntu from 203.229.246.118 port 32986 ssh2
Nov  2 04:00:48 server sshd\[19968\]: Invalid user applmgr from 203.229.246.118
Nov  2 04:00:48 server sshd\[19968\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=203.229.246.118 
Nov  2 04:00:50 server sshd\[19968\]: Failed password for invalid user applmgr from 203.229.246.118 port 31496 ssh2
Nov  2 13:13:48 server sshd\[19739\]: Invalid user usuario from 203.229.246.118
Nov  2 13:13:48 server sshd\[19739\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=203.229.246.118 
...
2019-11-02 18:51:06
81.22.45.253 attack
Nov  2 09:48:35   TCP Attack: SRC=81.22.45.253 DST=[Masked] LEN=40 TOS=0x08 PREC=0x20 TTL=240  PROTO=TCP SPT=56079 DPT=41446 WINDOW=1024 RES=0x00 SYN URGP=0
2019-11-02 18:49:33
186.182.233.228 attackspambots
ssh failed login
2019-11-02 19:00:50
77.42.111.132 attackbots
Automatic report - Port Scan Attack
2019-11-02 18:46:59
117.139.166.20 attackspambots
2019-11-02T17:22:02.256911luisaranguren sshd[2114860]: Connection from 117.139.166.20 port 36076 on 10.10.10.6 port 22
2019-11-02T17:22:04.980653luisaranguren sshd[2114860]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=117.139.166.20  user=root
2019-11-02T17:22:07.109563luisaranguren sshd[2114860]: Failed password for root from 117.139.166.20 port 36076 ssh2
2019-11-02T17:52:05.425153luisaranguren sshd[2120888]: Connection from 117.139.166.20 port 40395 on 10.10.10.6 port 22
2019-11-02T17:52:08.818078luisaranguren sshd[2120888]: Invalid user 70 from 117.139.166.20 port 40395
...
2019-11-02 18:40:40

最近上报的IP列表

115.75.188.228 113.160.198.37 113.190.242.228 113.169.91.147
118.70.28.233 113.160.225.42 113.161.144.115 14.161.2.49
115.79.219.111 113.190.44.50 45.122.251.74 101.53.38.68
14.238.82.10 113.161.162.93 118.69.109.78 27.74.253.123
27.74.250.209 118.70.67.118 113.161.41.224 27.72.103.208