必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): Viet Nam

运营商(isp): Vietnam Posts and Telecommunications Group

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
类型 评论内容 时间
attackbotsspam
Unauthorized connection attempt from IP address 14.161.49.80 on Port 445(SMB)
2019-06-29 21:53:21
相同子网IP讨论:
IP 类型 评论内容 时间
14.161.49.29 attackbotsspam
Unauthorized connection attempt from IP address 14.161.49.29 on port 993
2020-08-06 18:53:31
14.161.49.29 attackspambots
Dovecot Invalid User Login Attempt.
2020-05-08 04:21:01
14.161.49.22 attackspambots
Honeypot attack, port: 445, PTR: static.vnpt.vn.
2020-05-05 12:26:08
14.161.49.16 attack
445/tcp
[2020-03-28]1pkt
2020-03-29 07:47:22
14.161.49.16 attackspambots
Unauthorized connection attempt from IP address 14.161.49.16 on Port 445(SMB)
2020-03-17 14:01:47
14.161.49.22 attackspambots
unauthorized connection attempt
2020-02-19 20:49:28
14.161.49.22 attack
1576334540 - 12/14/2019 15:42:20 Host: 14.161.49.22/14.161.49.22 Port: 445 TCP Blocked
2019-12-15 03:14:39
14.161.49.111 attackspam
Sun, 21 Jul 2019 07:37:06 +0000 likely compromised host or open proxy. ddos rate spidering
2019-07-21 19:50:00
14.161.49.137 attackspambots
@LucianNitescu Personal Honeypot Network <<<>>> Donate at paypal.me/LNitescu <<<>>> 2019-07-02 02:57:46,404 INFO [amun_request_handler] PortScan Detected on Port: 445 (14.161.49.137)
2019-07-02 12:24:44
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 14.161.49.80
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 59232
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;14.161.49.80.			IN	A

;; AUTHORITY SECTION:
.			3600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019062900 1800 900 604800 86400

;; Query time: 4 msec
;; SERVER: 67.207.67.2#53(67.207.67.2)
;; WHEN: Sat Jun 29 21:53:12 CST 2019
;; MSG SIZE  rcvd: 116
HOST信息:
80.49.161.14.in-addr.arpa domain name pointer static.vnpt.vn.
NSLOOKUP信息:
Server:		67.207.67.2
Address:	67.207.67.2#53

Non-authoritative answer:
80.49.161.14.in-addr.arpa	name = static.vnpt.vn.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
122.232.223.14 attackspam
[Thu Aug 22 08:22:42.694672 2019] [access_compat:error] [pid 864] [client 122.232.223.14:63595] AH01797: client denied by server configuration: /var/www/html/josh/wp-login.php
...
2019-09-10 22:12:18
182.74.115.74 attackbotsspam
Unauthorized connection attempt from IP address 182.74.115.74 on Port 445(SMB)
2019-09-10 22:32:31
151.182.206.7 attackspam
Unauthorized connection attempt from IP address 151.182.206.7 on Port 445(SMB)
2019-09-10 22:28:28
122.232.201.86 attackspam
[Sun Jul 14 08:32:46.683796 2019] [access_compat:error] [pid 32235] [client 122.232.201.86:53020] AH01797: client denied by server configuration: /var/www/html/josh/wp-login.php
...
2019-09-10 22:24:25
95.0.185.19 attackbotsspam
Unauthorised access (Sep 10) SRC=95.0.185.19 LEN=52 TOS=0x10 PREC=0x40 TTL=108 ID=16292 DF TCP DPT=445 WINDOW=8192 SYN
2019-09-10 22:41:31
193.169.255.137 attackspam
@LucianNitescu Personal Honeypot Network <<<>>> Donate at paypal.me/LNitescu <<<>>> 2019-09-10 12:22:53,185 INFO [amun_request_handler] PortScan Detected on Port: 25 (193.169.255.137)
2019-09-10 23:04:39
122.232.201.47 attack
[Tue Jul 23 04:50:11.428967 2019] [access_compat:error] [pid 22645] [client 122.232.201.47:56187] AH01797: client denied by server configuration: /var/www/html/luke/wp-login.php
...
2019-09-10 22:50:33
103.48.192.48 attackspambots
Sep 10 17:33:12 server sshd\[2342\]: Invalid user 123456 from 103.48.192.48 port 52526
Sep 10 17:33:12 server sshd\[2342\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.48.192.48
Sep 10 17:33:14 server sshd\[2342\]: Failed password for invalid user 123456 from 103.48.192.48 port 52526 ssh2
Sep 10 17:39:25 server sshd\[643\]: Invalid user 1234 from 103.48.192.48 port 27365
Sep 10 17:39:25 server sshd\[643\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.48.192.48
2019-09-10 22:48:19
49.68.61.92 attackbots
Brute force SMTP login attempts.
2019-09-10 22:25:38
192.228.100.118 attack
CloudCIX Reconnaissance Scan Detected, PTR: PTR record not found
2019-09-10 22:26:17
49.88.112.80 attack
Sep 10 19:54:17 areeb-Workstation sshd[13488]: Failed password for root from 49.88.112.80 port 36393 ssh2
...
2019-09-10 22:28:51
146.88.240.46 attackbotsspam
Aug 31 02:11:39 mercury kernel: [UFW ALLOW] IN=eth0 OUT= MAC=f2:3c:91:bc:4d:f8:84:78:ac:0d:8f:41:08:00 SRC=146.88.240.46 DST=109.74.200.221 LEN=76 TOS=0x00 PREC=0x00 TTL=55 ID=56955 DF PROTO=UDP SPT=48267 DPT=123 LEN=56 
...
2019-09-10 22:46:27
90.150.129.38 attackspam
Unauthorized connection attempt from IP address 90.150.129.38 on Port 445(SMB)
2019-09-10 22:31:54
85.204.246.178 attack
Sep 10 10:07:11 plusreed sshd[24950]: Invalid user qwerty from 85.204.246.178
...
2019-09-10 22:10:38
1.9.25.210 attackbots
Unauthorized connection attempt from IP address 1.9.25.210 on Port 445(SMB)
2019-09-10 22:29:20

最近上报的IP列表

218.158.172.176 63.221.85.75 240.166.163.209 177.130.137.174
167.114.144.159 161.94.200.169 79.126.13.63 30.107.3.130
62.116.202.237 182.232.140.167 176.39.87.0 211.148.201.227
116.107.88.139 62.16.167.22 79.194.90.67 186.199.127.65
244.148.180.139 142.0.70.36 239.79.11.177 107.70.64.205