必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): Viet Nam

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
IP 类型 评论内容 时间
14.166.144.74 attack
20/8/24@23:59:20: FAIL: Alarm-Network address from=14.166.144.74
20/8/24@23:59:21: FAIL: Alarm-Network address from=14.166.144.74
...
2020-08-25 12:40:55
14.166.112.99 attackbots
2020-07-30T03:48:21.860Z CLOSE host=14.166.112.99 port=53267 fd=4 time=970.382 bytes=1817
...
2020-07-30 19:11:51
14.166.14.149 attack
07/25/2020-23:54:21.224421 14.166.14.149 Protocol: 6 ET SCAN Suspicious inbound to MSSQL port 1433
2020-07-26 16:44:04
14.166.123.214 attackspambots
Unauthorized connection attempt detected from IP address 14.166.123.214 to port 445
2020-07-22 18:45:16
14.166.109.156 attackspam
Unauthorized connection attempt detected from IP address 14.166.109.156 to port 445 [T]
2020-06-24 01:39:06
14.166.105.230 attackspambots
20/6/11@23:49:47: FAIL: Alarm-Network address from=14.166.105.230
...
2020-06-12 19:13:29
14.166.19.77 attack
1591093402 - 06/02/2020 12:23:22 Host: 14.166.19.77/14.166.19.77 Port: 445 TCP Blocked
2020-06-02 19:26:56
14.166.155.61 attackbots
Unauthorized connection attempt from IP address 14.166.155.61 on Port 445(SMB)
2020-05-24 21:07:28
14.166.144.94 attack
port scan and connect, tcp 22 (ssh)
2020-05-20 22:41:16
14.166.142.220 attackbotsspam
Automatic report - SSH Brute-Force Attack
2020-04-22 19:09:08
14.166.182.235 attackspam
Attempt to attack host OS, exploiting network vulnerabilities, on 06-04-2020 04:55:08.
2020-04-06 14:28:20
14.166.186.167 attackbots
445/tcp
[2020-04-01]1pkt
2020-04-01 21:50:51
14.166.191.86 attackspambots
[Wed Mar 11 02:53:04 2020] - Syn Flood From IP: 14.166.191.86 Port: 19570
2020-03-23 17:17:41
14.166.183.188 attack
Honeypot attack, port: 445, PTR: static.vnpt.vn.
2020-03-19 03:04:01
14.166.162.172 attack
Unauthorized connection attempt from IP address 14.166.162.172 on Port 445(SMB)
2020-03-18 10:03:14
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 14.166.1.109
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 51753
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;14.166.1.109.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025010602 1800 900 604800 86400

;; Query time: 14 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Jan 07 13:04:12 CST 2025
;; MSG SIZE  rcvd: 105
HOST信息:
109.1.166.14.in-addr.arpa domain name pointer static.vnpt.vn.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
109.1.166.14.in-addr.arpa	name = static.vnpt.vn.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
2.90.179.239 attackbotsspam
Hits on port : 445
2020-02-16 08:04:54
115.84.76.5 attackbots
Feb 16 00:31:10 andromeda sshd\[50485\]: Invalid user admin from 115.84.76.5 port 22792
Feb 16 00:31:10 andromeda sshd\[50485\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=115.84.76.5
Feb 16 00:31:11 andromeda sshd\[50485\]: Failed password for invalid user admin from 115.84.76.5 port 22792 ssh2
2020-02-16 07:32:45
51.15.87.74 attackbotsspam
Jan 16 21:39:14 pi sshd[6600]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.15.87.74 
Jan 16 21:39:16 pi sshd[6600]: Failed password for invalid user ftpuser from 51.15.87.74 port 48126 ssh2
2020-02-16 08:03:15
112.26.7.145 attackbots
Brute force attempt
2020-02-16 07:53:07
143.255.0.235 attackspam
MultiHost/MultiPort Probe, Scan, Hack -
2020-02-16 07:43:03
78.189.17.33 attack
Port probing on unauthorized port 23
2020-02-16 07:53:22
123.138.241.13 attackspambots
02/15/2020-17:19:27.995351 123.138.241.13 Protocol: 6 ET SCAN NMAP -sS window 1024
2020-02-16 07:48:50
59.92.54.157 attackbotsspam
Automatic report - Port Scan Attack
2020-02-16 07:36:59
45.227.253.62 attack
Automatic report - SQL Injection Attempts
2020-02-16 07:38:01
121.241.244.92 attackbotsspam
Feb 16 00:47:24 sd-53420 sshd\[26847\]: Invalid user git from 121.241.244.92
Feb 16 00:47:24 sd-53420 sshd\[26847\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.241.244.92
Feb 16 00:47:26 sd-53420 sshd\[26847\]: Failed password for invalid user git from 121.241.244.92 port 33647 ssh2
Feb 16 00:49:40 sd-53420 sshd\[27099\]: User root from 121.241.244.92 not allowed because none of user's groups are listed in AllowGroups
Feb 16 00:49:40 sd-53420 sshd\[27099\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.241.244.92  user=root
...
2020-02-16 07:51:57
106.52.19.71 attackbotsspam
Invalid user bty from 106.52.19.71 port 52790
2020-02-16 07:33:24
77.247.108.89 attackspambots
Port scan on 3 port(s): 8008 9000 9090
2020-02-16 08:02:51
143.208.184.157 attackbots
MultiHost/MultiPort Probe, Scan, Hack -
2020-02-16 08:08:19
93.176.182.65 attack
Automatic report - Port Scan Attack
2020-02-16 07:49:24
218.85.80.49 attackbotsspam
Feb 16 01:00:08 legacy sshd[26531]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.85.80.49
Feb 16 01:00:10 legacy sshd[26531]: Failed password for invalid user hadoop from 218.85.80.49 port 40746 ssh2
Feb 16 01:03:59 legacy sshd[26811]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.85.80.49
...
2020-02-16 08:06:06

最近上报的IP列表

137.100.10.216 179.82.153.6 87.218.237.154 219.21.95.138
168.110.162.144 69.61.138.224 147.172.125.208 246.216.240.4
67.79.89.164 108.187.147.235 159.203.7.33 211.60.193.239
24.201.180.234 245.251.59.134 149.44.181.238 254.80.213.42
231.79.19.78 61.187.215.138 45.110.25.9 61.161.148.0