必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): Viet Nam

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
IP 类型 评论内容 时间
14.171.139.114 attack
Unauthorised access (May  3) SRC=14.171.139.114 LEN=52 TTL=109 ID=29811 DF TCP DPT=445 WINDOW=8192 SYN
2020-05-04 02:37:57
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 14.171.139.83
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 11444
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;14.171.139.83.			IN	A

;; AUTHORITY SECTION:
.			118	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022011000 1800 900 604800 86400

;; Query time: 50 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Jan 11 00:03:32 CST 2022
;; MSG SIZE  rcvd: 106
HOST信息:
83.139.171.14.in-addr.arpa domain name pointer static.vnpt.vn.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
83.139.171.14.in-addr.arpa	name = static.vnpt.vn.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
157.230.125.207 attackspam
Time:     Thu Aug 27 23:17:45 2020 +0200
IP:       157.230.125.207 (DE/Germany/dreamon.pk)
Failures: 5 (sshd)
Interval: 3600 seconds
Blocked:  Permanent Block [LF_SSHD]

Log entries:

Aug 27 23:05:17 ca-3-ams1 sshd[9798]: Invalid user binh from 157.230.125.207 port 32373
Aug 27 23:05:20 ca-3-ams1 sshd[9798]: Failed password for invalid user binh from 157.230.125.207 port 32373 ssh2
Aug 27 23:14:29 ca-3-ams1 sshd[10400]: Invalid user www-data from 157.230.125.207 port 46913
Aug 27 23:14:31 ca-3-ams1 sshd[10400]: Failed password for invalid user www-data from 157.230.125.207 port 46913 ssh2
Aug 27 23:17:44 ca-3-ams1 sshd[10652]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.230.125.207  user=root
2020-08-28 06:33:00
202.152.1.89 attack
Port scan: Attack repeated for 24 hours
2020-08-28 06:20:56
93.174.93.195 attackbotsspam
SmallBizIT.US 3 packets to udp(40792,40794,40795)
2020-08-28 06:10:30
190.128.239.146 attackbots
SSH Invalid Login
2020-08-28 06:17:39
45.55.145.31 attackbots
prod8
...
2020-08-28 06:28:06
176.98.158.224 attack
1598562489 - 08/27/2020 23:08:09 Host: 176.98.158.224/176.98.158.224 Port: 445 TCP Blocked
2020-08-28 06:16:04
115.187.39.141 attack
Aug 26 19:28:40 db01 sshd[9837]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=115.187.39.141  user=r.r
Aug 26 19:28:42 db01 sshd[9837]: Failed password for r.r from 115.187.39.141 port 53984 ssh2
Aug 26 19:28:42 db01 sshd[9837]: Received disconnect from 115.187.39.141: 11: Bye Bye [preauth]
Aug 26 19:30:41 db01 sshd[10101]: Invalid user amir from 115.187.39.141
Aug 26 19:30:41 db01 sshd[10101]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=115.187.39.141 
Aug 26 19:30:43 db01 sshd[10101]: Failed password for invalid user amir from 115.187.39.141 port 45250 ssh2
Aug 26 19:30:44 db01 sshd[10101]: Received disconnect from 115.187.39.141: 11: Bye Bye [preauth]
Aug 26 19:31:53 db01 sshd[10300]: Invalid user bsnl from 115.187.39.141
Aug 26 19:31:53 db01 sshd[10300]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=115.187.39.141 
Aug 26 19:31:56 db01 ssh........
-------------------------------
2020-08-28 06:24:23
51.77.41.246 attackbots
Aug 27 22:16:49 localhost sshd[34259]: Invalid user test from 51.77.41.246 port 45944
Aug 27 22:16:49 localhost sshd[34259]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.77.41.246
Aug 27 22:16:49 localhost sshd[34259]: Invalid user test from 51.77.41.246 port 45944
Aug 27 22:16:52 localhost sshd[34259]: Failed password for invalid user test from 51.77.41.246 port 45944 ssh2
Aug 27 22:20:47 localhost sshd[34637]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.77.41.246  user=root
Aug 27 22:20:49 localhost sshd[34637]: Failed password for root from 51.77.41.246 port 50814 ssh2
...
2020-08-28 06:42:34
106.12.122.138 attack
Aug 27 23:45:06 ip106 sshd[709]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.122.138 
Aug 27 23:45:08 ip106 sshd[709]: Failed password for invalid user db2fenc1 from 106.12.122.138 port 49722 ssh2
...
2020-08-28 06:39:35
58.191.82.187 attackbotsspam
Port Scan detected!
...
2020-08-28 06:30:19
201.211.79.224 attack
Port probing on unauthorized port 445
2020-08-28 06:15:34
93.108.242.140 attackspambots
Aug 28 00:22:49 abendstille sshd\[13400\]: Invalid user cloud from 93.108.242.140
Aug 28 00:22:49 abendstille sshd\[13400\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=93.108.242.140
Aug 28 00:22:51 abendstille sshd\[13400\]: Failed password for invalid user cloud from 93.108.242.140 port 26168 ssh2
Aug 28 00:26:37 abendstille sshd\[17191\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=93.108.242.140  user=root
Aug 28 00:26:39 abendstille sshd\[17191\]: Failed password for root from 93.108.242.140 port 16586 ssh2
...
2020-08-28 06:35:44
139.59.116.115 attack
Aug 27 23:01:13 sip sshd[1441771]: Invalid user admin from 139.59.116.115 port 49294
Aug 27 23:01:15 sip sshd[1441771]: Failed password for invalid user admin from 139.59.116.115 port 49294 ssh2
Aug 27 23:07:30 sip sshd[1441838]: Invalid user teste from 139.59.116.115 port 37416
...
2020-08-28 06:45:00
107.174.44.184 attackspam
Aug 28 00:06:27 vpn01 sshd[8312]: Failed password for root from 107.174.44.184 port 45896 ssh2
Aug 28 00:08:00 vpn01 sshd[8370]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=107.174.44.184
...
2020-08-28 06:11:50
190.14.57.130 attackspambots
1598562484 - 08/27/2020 23:08:04 Host: 190.14.57.130/190.14.57.130 Port: 445 TCP Blocked
2020-08-28 06:21:25

最近上报的IP列表

17.77.240.94 106.19.38.31 219.242.118.126 242.96.148.94
17.167.108.77 164.29.145.95 247.117.208.132 165.123.205.172
249.156.62.106 68.82.56.186 1.114.232.174 198.76.123.254
130.198.186.234 242.90.254.153 132.232.68.53 164.163.63.114
18.215.48.18 202.109.165.185 12.73.41.102 13.144.47.215