必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): Buôn Ma Thuột

省份(region): Dak Lak

国家(country): Vietnam

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 14.175.145.50
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 6436
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;14.175.145.50.			IN	A

;; AUTHORITY SECTION:
.			289	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022093000 1800 900 604800 86400

;; Query time: 66 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Sep 30 20:01:45 CST 2022
;; MSG SIZE  rcvd: 106
HOST信息:
50.145.175.14.in-addr.arpa domain name pointer static.vnpt.vn.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
50.145.175.14.in-addr.arpa	name = static.vnpt.vn.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
190.119.190.122 attackspam
Oct 14 06:02:29 hanapaa sshd\[7397\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=190.119.190.122  user=root
Oct 14 06:02:31 hanapaa sshd\[7397\]: Failed password for root from 190.119.190.122 port 51792 ssh2
Oct 14 06:07:00 hanapaa sshd\[7819\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=190.119.190.122  user=root
Oct 14 06:07:02 hanapaa sshd\[7819\]: Failed password for root from 190.119.190.122 port 34842 ssh2
Oct 14 06:11:33 hanapaa sshd\[8332\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=190.119.190.122  user=root
2019-10-15 01:16:03
51.15.58.201 attackbots
F2B jail: sshd. Time: 2019-10-14 14:01:35, Reported by: VKReport
2019-10-15 01:40:55
61.250.149.222 attackspam
Oct 14 15:38:11 jupiter sshd\[20293\]: Invalid user www from 61.250.149.222
Oct 14 15:38:11 jupiter sshd\[20293\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.250.149.222
Oct 14 15:38:14 jupiter sshd\[20293\]: Failed password for invalid user www from 61.250.149.222 port 11204 ssh2
...
2019-10-15 01:19:33
51.38.236.221 attackspambots
Oct 14 07:58:30 ny01 sshd[12091]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.38.236.221
Oct 14 07:58:32 ny01 sshd[12091]: Failed password for invalid user P4$$w0rd@2019 from 51.38.236.221 port 49218 ssh2
Oct 14 08:02:44 ny01 sshd[12447]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.38.236.221
2019-10-15 01:32:28
185.70.107.209 attackbotsspam
Oct 14 19:30:10 relay postfix/smtpd\[1411\]: warning: unknown\[185.70.107.209\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Oct 14 19:32:40 relay postfix/smtpd\[30678\]: warning: unknown\[185.70.107.209\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Oct 14 19:35:08 relay postfix/smtpd\[27394\]: warning: unknown\[185.70.107.209\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Oct 14 19:37:37 relay postfix/smtpd\[1411\]: warning: unknown\[185.70.107.209\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Oct 14 19:40:06 relay postfix/smtpd\[27394\]: warning: unknown\[185.70.107.209\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
...
2019-10-15 01:49:38
221.12.59.212 attack
" "
2019-10-15 01:47:38
197.248.10.108 attackspam
Oct 14 12:21:59 host sshd\[13218\]: Invalid user test from 197.248.10.108Oct 14 12:49:30 host sshd\[25592\]: Invalid user test from 197.248.10.108Oct 14 13:16:57 host sshd\[6224\]: Invalid user test from 197.248.10.108
...
2019-10-15 01:24:05
138.68.77.235 attackbotsspam
Automatic report - Banned IP Access
2019-10-15 01:06:57
121.15.11.13 attackbots
Oct 14 05:23:23 php1 sshd\[18900\]: Invalid user Salvador@321 from 121.15.11.13
Oct 14 05:23:23 php1 sshd\[18900\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.15.11.13
Oct 14 05:23:26 php1 sshd\[18900\]: Failed password for invalid user Salvador@321 from 121.15.11.13 port 17800 ssh2
Oct 14 05:30:22 php1 sshd\[19432\]: Invalid user 123WSXQAZ from 121.15.11.13
Oct 14 05:30:22 php1 sshd\[19432\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.15.11.13
2019-10-15 01:11:18
54.37.69.113 attack
Oct 14 14:30:52 firewall sshd[28010]: Invalid user aladdin from 54.37.69.113
Oct 14 14:30:54 firewall sshd[28010]: Failed password for invalid user aladdin from 54.37.69.113 port 53141 ssh2
Oct 14 14:34:28 firewall sshd[28158]: Invalid user lv from 54.37.69.113
...
2019-10-15 01:48:17
40.113.108.6 attack
PHP CGI Argument Injection: ?-dsafe_mode=Off -ddisable_functions=NULL -dallow_url_fopen=On -dallow_url_include=On -dauto_prepend_file
2019-10-15 01:34:10
51.75.195.25 attackbotsspam
Oct 14 14:17:31 firewall sshd[27559]: Invalid user racu326285 from 51.75.195.25
Oct 14 14:17:32 firewall sshd[27559]: Failed password for invalid user racu326285 from 51.75.195.25 port 40182 ssh2
Oct 14 14:21:10 firewall sshd[27649]: Invalid user 1234 from 51.75.195.25
...
2019-10-15 01:44:02
49.247.207.56 attackspambots
Oct 14 11:36:14 ip-172-31-62-245 sshd\[27982\]: Invalid user 123 from 49.247.207.56\
Oct 14 11:36:16 ip-172-31-62-245 sshd\[27982\]: Failed password for invalid user 123 from 49.247.207.56 port 42950 ssh2\
Oct 14 11:40:52 ip-172-31-62-245 sshd\[28083\]: Invalid user Ocean@2017 from 49.247.207.56\
Oct 14 11:40:54 ip-172-31-62-245 sshd\[28083\]: Failed password for invalid user Ocean@2017 from 49.247.207.56 port 54676 ssh2\
Oct 14 11:45:31 ip-172-31-62-245 sshd\[28128\]: Invalid user Abcd!234 from 49.247.207.56\
2019-10-15 01:48:37
49.235.242.253 attackspam
Oct 14 12:28:23 localhost sshd\[18683\]: Invalid user comforts from 49.235.242.253 port 36030
Oct 14 12:28:23 localhost sshd\[18683\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.235.242.253
Oct 14 12:28:25 localhost sshd\[18683\]: Failed password for invalid user comforts from 49.235.242.253 port 36030 ssh2
...
2019-10-15 01:18:25
84.45.251.243 attack
$f2bV_matches
2019-10-15 01:22:26

最近上报的IP列表

161.234.225.187 41.43.253.77 206.189.88.223 81.111.150.168
218.215.196.102 207.38.89.119 192.165.16.6 114.119.164.171
203.82.75.132 185.63.53.252 10.20.31.97 230.57.201.215
8.241.216.254 23.230.167.95 2001:1c06:1b13:800:559e:c603:9ea1:c47f 6.154.230.35
70.21.200.81 136.158.29.243 80.211.249.98 192.40.242.240