必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): Haiphong

省份(region): Hai Phong

国家(country): Vietnam

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 14.181.255.160
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 40391
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;14.181.255.160.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025062800 1800 900 604800 86400

;; Query time: 40 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Jun 28 18:38:42 CST 2025
;; MSG SIZE  rcvd: 107
HOST信息:
160.255.181.14.in-addr.arpa domain name pointer static.vnpt.vn.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
160.255.181.14.in-addr.arpa	name = static.vnpt.vn.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
221.211.53.249 attackbotsspam
belitungshipwreck.org 221.211.53.249 [29/Jul/2020:14:09:40 +0200] "POST /xmlrpc.php HTTP/1.1" 200 4304 "-" "Mozilla/5.0 (Windows NT 6.1; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/59.0.3071.109 Safari/537.36"
belitungshipwreck.org 221.211.53.249 [29/Jul/2020:14:09:44 +0200] "POST /xmlrpc.php HTTP/1.1" 200 4304 "-" "Mozilla/5.0 (Windows NT 6.1; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/59.0.3071.109 Safari/537.36"
2020-07-30 00:55:21
134.209.182.158 attack
scans 2 times in preceeding hours on the ports (in chronological order) 18083 18081
2020-07-30 00:30:18
106.13.119.163 attackspam
Jul 29 16:06:56 vps sshd[487130]: Failed password for invalid user justice from 106.13.119.163 port 50666 ssh2
Jul 29 16:12:33 vps sshd[513822]: Invalid user zhangle from 106.13.119.163 port 56120
Jul 29 16:12:33 vps sshd[513822]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.119.163
Jul 29 16:12:35 vps sshd[513822]: Failed password for invalid user zhangle from 106.13.119.163 port 56120 ssh2
Jul 29 16:18:17 vps sshd[540460]: Invalid user lky from 106.13.119.163 port 33642
...
2020-07-30 00:32:58
122.224.131.116 attack
Jul 29 14:10:08 mellenthin sshd[2674]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.224.131.116
Jul 29 14:10:10 mellenthin sshd[2674]: Failed password for invalid user autobacs from 122.224.131.116 port 50532 ssh2
2020-07-30 00:29:00
217.197.185.44 attackspam
Invalid user ziyuchen from 217.197.185.44 port 42995
2020-07-30 00:42:48
123.207.121.169 attackspambots
Invalid user yangjuan from 123.207.121.169 port 34240
2020-07-30 00:40:13
122.51.59.95 attackbotsspam
Lines containing failures of 122.51.59.95
Jul 28 02:33:46 smtp-out sshd[29709]: Invalid user sharad from 122.51.59.95 port 35342
Jul 28 02:33:46 smtp-out sshd[29709]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.51.59.95 
Jul 28 02:33:48 smtp-out sshd[29709]: Failed password for invalid user sharad from 122.51.59.95 port 35342 ssh2
Jul 28 02:33:50 smtp-out sshd[29709]: Received disconnect from 122.51.59.95 port 35342:11: Bye Bye [preauth]
Jul 28 02:33:50 smtp-out sshd[29709]: Disconnected from invalid user sharad 122.51.59.95 port 35342 [preauth]
Jul 28 02:47:41 smtp-out sshd[30228]: Invalid user jcma from 122.51.59.95 port 37450
Jul 28 02:47:41 smtp-out sshd[30228]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.51.59.95 
Jul 28 02:47:43 smtp-out sshd[30228]: Failed password for invalid user jcma from 122.51.59.95 port 37450 ssh2
Jul 28 02:47:45 smtp-out sshd[30228]: Received dis........
------------------------------
2020-07-30 00:45:08
91.121.162.198 attack
Jul 29 16:11:03 vlre-nyc-1 sshd\[11384\]: Invalid user pengteng from 91.121.162.198
Jul 29 16:11:03 vlre-nyc-1 sshd\[11384\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=91.121.162.198
Jul 29 16:11:05 vlre-nyc-1 sshd\[11384\]: Failed password for invalid user pengteng from 91.121.162.198 port 34220 ssh2
Jul 29 16:17:31 vlre-nyc-1 sshd\[11550\]: Invalid user zhangzl from 91.121.162.198
Jul 29 16:17:31 vlre-nyc-1 sshd\[11550\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=91.121.162.198
...
2020-07-30 00:20:06
139.59.32.156 attack
Jul 29 16:33:49 *hidden* sshd[38444]: Failed password for invalid user lixiangpeng from 139.59.32.156 port 38066 ssh2 Jul 29 16:38:30 *hidden* sshd[49726]: Invalid user yuchen from 139.59.32.156 port 39184 Jul 29 16:38:31 *hidden* sshd[49726]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.32.156 Jul 29 16:38:33 *hidden* sshd[49726]: Failed password for invalid user yuchen from 139.59.32.156 port 39184 ssh2 Jul 29 16:41:14 *hidden* sshd[56187]: Invalid user zhanghuimin from 139.59.32.156 port 46468
2020-07-30 00:22:07
46.229.168.140 attackspambots
Automatic report - Banned IP Access
2020-07-30 00:54:09
192.35.169.32 attack
Jul 29 18:09:27 debian-2gb-nbg1-2 kernel: \[18297462.076196\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=192.35.169.32 DST=195.201.40.59 LEN=44 TOS=0x00 PREC=0x00 TTL=33 ID=57008 PROTO=TCP SPT=58416 DPT=7445 WINDOW=1024 RES=0x00 SYN URGP=0
2020-07-30 00:20:52
198.27.66.37 attackspambots
2020-07-29T06:30:41.666574suse-nuc sshd[13863]: Invalid user openmeetings from 198.27.66.37 port 52656
...
2020-07-30 00:27:53
218.75.77.92 attack
Jul 29 18:43:56 vps sshd[131387]: Failed password for invalid user test1 from 218.75.77.92 port 64452 ssh2
Jul 29 18:47:45 vps sshd[148864]: Invalid user mayunshan from 218.75.77.92 port 19245
Jul 29 18:47:45 vps sshd[148864]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.75.77.92
Jul 29 18:47:47 vps sshd[148864]: Failed password for invalid user mayunshan from 218.75.77.92 port 19245 ssh2
Jul 29 18:51:43 vps sshd[166698]: Invalid user xianxinfeng from 218.75.77.92 port 38527
...
2020-07-30 00:51:45
77.28.74.166 attackbotsspam
ddosing on local network
2020-07-30 00:51:18
198.100.146.67 attackbots
Jul 29 11:22:35 Tower sshd[15290]: Connection from 198.100.146.67 port 49021 on 192.168.10.220 port 22 rdomain ""
Jul 29 11:22:35 Tower sshd[15290]: Invalid user dky from 198.100.146.67 port 49021
Jul 29 11:22:35 Tower sshd[15290]: error: Could not get shadow information for NOUSER
Jul 29 11:22:35 Tower sshd[15290]: Failed password for invalid user dky from 198.100.146.67 port 49021 ssh2
Jul 29 11:22:35 Tower sshd[15290]: Received disconnect from 198.100.146.67 port 49021:11: Bye Bye [preauth]
Jul 29 11:22:35 Tower sshd[15290]: Disconnected from invalid user dky 198.100.146.67 port 49021 [preauth]
2020-07-30 00:38:35

最近上报的IP列表

183.225.90.253 11.170.98.136 65.130.52.120 29.57.22.106
164.89.54.182 81.157.30.82 48.102.205.50 25.39.187.130
42.214.115.172 36.215.210.151 60.132.108.100 153.67.246.90
131.23.123.88 152.199.46.21 4.205.152.42 153.67.192.148
48.169.119.152 132.158.107.174 110.43.204.41 107.128.92.219