必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): None

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 14.162.149.161
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 19952
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;14.162.149.161.			IN	A

;; AUTHORITY SECTION:
.			598	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022022701 1800 900 604800 86400

;; Query time: 18 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Feb 28 04:10:37 CST 2022
;; MSG SIZE  rcvd: 107
HOST信息:
161.149.162.14.in-addr.arpa domain name pointer static.vnpt.vn.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
161.149.162.14.in-addr.arpa	name = static.vnpt.vn.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
118.25.182.118 attackspambots
Invalid user jessie from 118.25.182.118 port 37898
2020-08-25 23:11:29
103.56.205.226 attackbots
" "
2020-08-25 23:20:14
52.188.69.174 attackspam
Invalid user ralf from 52.188.69.174 port 37420
2020-08-25 23:26:59
212.51.148.162 attackbotsspam
Invalid user teamspeak from 212.51.148.162 port 56720
2020-08-25 22:55:24
121.46.244.194 attackbotsspam
Invalid user wim from 121.46.244.194 port 34586
2020-08-25 23:10:37
219.239.47.66 attackbotsspam
Aug 25 13:57:27 srv-ubuntu-dev3 sshd[17955]: Invalid user asteriskuser from 219.239.47.66
Aug 25 13:57:27 srv-ubuntu-dev3 sshd[17955]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=219.239.47.66
Aug 25 13:57:27 srv-ubuntu-dev3 sshd[17955]: Invalid user asteriskuser from 219.239.47.66
Aug 25 13:57:29 srv-ubuntu-dev3 sshd[17955]: Failed password for invalid user asteriskuser from 219.239.47.66 port 46452 ssh2
Aug 25 14:01:50 srv-ubuntu-dev3 sshd[18499]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=219.239.47.66  user=root
Aug 25 14:01:52 srv-ubuntu-dev3 sshd[18499]: Failed password for root from 219.239.47.66 port 44018 ssh2
Aug 25 14:06:28 srv-ubuntu-dev3 sshd[19046]: Invalid user bikegate from 219.239.47.66
Aug 25 14:06:28 srv-ubuntu-dev3 sshd[19046]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=219.239.47.66
Aug 25 14:06:28 srv-ubuntu-dev3 sshd[19046]: Invali
...
2020-08-25 22:54:30
111.231.89.140 attackbotsspam
Aug 25 15:12:38 vps639187 sshd\[32547\]: Invalid user xiaolei from 111.231.89.140 port 38545
Aug 25 15:12:38 vps639187 sshd\[32547\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.231.89.140
Aug 25 15:12:41 vps639187 sshd\[32547\]: Failed password for invalid user xiaolei from 111.231.89.140 port 38545 ssh2
...
2020-08-25 23:14:52
106.13.233.186 attackbotsspam
Invalid user reginaldo from 106.13.233.186 port 58407
2020-08-25 23:17:57
41.93.48.72 attack
41.93.48.72 - - [25/Aug/2020:14:40:28 +0100] "POST /wp-login.php HTTP/1.1" 200 2254 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
41.93.48.72 - - [25/Aug/2020:14:40:31 +0100] "POST /wp-login.php HTTP/1.1" 200 2229 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
41.93.48.72 - - [25/Aug/2020:14:40:32 +0100] "POST /xmlrpc.php HTTP/1.1" 200 247 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
...
2020-08-25 23:29:15
59.108.53.146 attack
k+ssh-bruteforce
2020-08-25 23:26:06
132.232.112.96 attackspambots
Invalid user test from 132.232.112.96 port 43726
2020-08-25 23:09:20
187.163.83.134 attackbots
Invalid user nagesh from 187.163.83.134 port 57520
2020-08-25 22:59:05
118.98.96.184 attackspambots
Invalid user lxc from 118.98.96.184 port 48535
2020-08-25 23:11:11
206.189.225.85 attackspambots
Aug 25 16:44:40 jane sshd[449]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=206.189.225.85 
Aug 25 16:44:41 jane sshd[449]: Failed password for invalid user admin from 206.189.225.85 port 34854 ssh2
...
2020-08-25 22:55:40
49.233.37.15 attackspam
Bruteforce detected by fail2ban
2020-08-25 23:28:32

最近上报的IP列表

14.162.147.158 14.162.166.110 14.162.181.136 14.162.185.145
14.162.218.38 14.162.230.120 14.162.238.14 14.162.64.124
14.163.188.226 14.163.190.177 14.163.21.251 14.163.220.12
14.163.211.111 14.163.228.7 14.163.233.72 14.163.241.7
14.163.244.182 14.163.36.38 14.163.251.236 14.163.40.207