必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): Viet Nam

运营商(isp): Vietnam Posts and Telecommunications Group

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
类型 评论内容 时间
attackspambots
Jul  5 19:58:10 riskplan-s sshd[6977]: Address 14.186.214.52 maps to static.vnpt.vn, but this does not map back to the address - POSSIBLE BREAK-IN ATTEMPT!
Jul  5 19:58:10 riskplan-s sshd[6977]: Invalid user admin from 14.186.214.52
Jul  5 19:58:10 riskplan-s sshd[6977]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=14.186.214.52 
Jul  5 19:58:12 riskplan-s sshd[6977]: Failed password for invalid user admin from 14.186.214.52 port 55363 ssh2
Jul  5 19:58:12 riskplan-s sshd[6977]: Connection closed by 14.186.214.52 [preauth]


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=14.186.214.52
2019-07-06 05:12:31
相同子网IP讨论:
IP 类型 评论内容 时间
14.186.214.174 attackbots
(smtpauth) Failed SMTP AUTH login from 14.186.214.174 (VN/Vietnam/static.vnpt.vn): 5 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SMTPAUTH; Logs: 2020-07-12 05:55:53 dovecot_plain authenticator failed for (mail.monstertravel.co.uk) [14.186.214.174]:48321: 535 Incorrect authentication data (set_id=tony.dunn@monstertravel.co.uk)
2020-07-12 05:55:59 dovecot_plain authenticator failed for (mail.monstertravel.co.uk) [14.186.214.174]:48321: 535 Incorrect authentication data (set_id=tony.dunn@monstertravel.co.uk)
2020-07-12 05:56:05 dovecot_plain authenticator failed for (mail.monstertravel.co.uk) [14.186.214.174]:48321: 535 Incorrect authentication data (set_id=painted03)
2020-07-12 05:56:18 dovecot_plain authenticator failed for (mail.monstertravel.co.uk) [14.186.214.174]:48459: 535 Incorrect authentication data (set_id=tony.dunn)
2020-07-12 05:56:35 dovecot_plain authenticator failed for (mail.monstertravel.co.uk) [14.186.214.174]:48459: 535 Incorrect authentication data (set_id=tony.dunn)
2020-07-12 12:12:43
14.186.214.152 attackspambots
TCP src-port=33750   dst-port=25   Listed on   abuseat-org barracuda spamcop         (478)
2020-03-19 10:23:15
14.186.214.22 attackspambots
Attempt to attack host OS, exploiting network vulnerabilities, on 14-02-2020 04:55:09.
2020-02-14 16:39:14
14.186.214.78 attackbots
Invalid user admin from 14.186.214.78 port 35461
2020-01-19 02:53:13
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 14.186.214.52
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 20185
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;14.186.214.52.			IN	A

;; AUTHORITY SECTION:
.			3600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019070501 1800 900 604800 86400

;; Query time: 3 msec
;; SERVER: 67.207.67.2#53(67.207.67.2)
;; WHEN: Sat Jul 06 05:12:26 CST 2019
;; MSG SIZE  rcvd: 117
HOST信息:
52.214.186.14.in-addr.arpa domain name pointer static.vnpt.vn.
NSLOOKUP信息:
Server:		67.207.67.2
Address:	67.207.67.2#53

Non-authoritative answer:
52.214.186.14.in-addr.arpa	name = static.vnpt.vn.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
1.192.218.179 attackspambots
firewall-block, port(s): 445/tcp
2020-07-25 17:41:09
80.241.44.238 attackspambots
SSH brute force attempt
2020-07-25 17:45:09
206.72.198.20 attackbots
Invalid user contactus from 206.72.198.20 port 34070
2020-07-25 18:00:36
110.145.140.210 attackspam
2020-07-24 UTC: (44x) - admin(2x),alex,boss,checker,chenlu,chick,cloud,cristi,david,deploy,ed,gxm,iam,jean,joan,joshua,ksi,lost,marketing,minecraft,nadege,news,ochsner,peter,pmc2,postgres,pwrchute,qq,reinaldo,reports,shop,sogo,support,test,user(2x),vu,webmaster,xm,yangningxin,yangyi,ys,zbl
2020-07-25 18:06:54
78.137.5.245 attack
Automatic report - Port Scan Attack
2020-07-25 17:54:00
191.8.164.172 attackspambots
2020-07-25T00:55:56.205064server.mjenks.net sshd[3493973]: Invalid user jun from 191.8.164.172 port 41550
2020-07-25T00:55:56.210820server.mjenks.net sshd[3493973]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=191.8.164.172
2020-07-25T00:55:56.205064server.mjenks.net sshd[3493973]: Invalid user jun from 191.8.164.172 port 41550
2020-07-25T00:55:58.323450server.mjenks.net sshd[3493973]: Failed password for invalid user jun from 191.8.164.172 port 41550 ssh2
2020-07-25T00:59:38.628686server.mjenks.net sshd[3494312]: Invalid user www from 191.8.164.172 port 52198
...
2020-07-25 18:21:23
98.127.7.121 attackspambots
Ddos my friend and mep
2020-07-25 18:14:06
96.54.228.119 attackspam
2020-07-24 UTC: (24x) - Michael,admin(3x),anand,cmb,dama,debra,emese,error,fs,ftpuser1,gregoire,master,mzh,ncs,nxf,sa,simon,test1,tester,tomcat,ts3bot1,versa
2020-07-25 17:58:01
104.248.138.221 attackbots
Invalid user cp from 104.248.138.221 port 53760
2020-07-25 18:10:11
129.28.154.240 attack
Invalid user max from 129.28.154.240 port 52504
2020-07-25 18:02:37
208.181.41.155 attackbotsspam
Failed password for invalid user zhangxd from 208.181.41.155 port 51402 ssh2
2020-07-25 17:51:41
111.93.235.74 attackbots
Jul 25 11:38:03 amit sshd\[16137\]: Invalid user admin from 111.93.235.74
Jul 25 11:38:03 amit sshd\[16137\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.93.235.74
Jul 25 11:38:05 amit sshd\[16137\]: Failed password for invalid user admin from 111.93.235.74 port 55699 ssh2
...
2020-07-25 17:55:10
201.13.109.79 attackspambots
trying to access non-authorized port
2020-07-25 17:42:07
54.38.242.206 attack
2020-07-25T08:45:49.329092+02:00  sshd[30356]: Failed password for invalid user pvv from 54.38.242.206 port 50548 ssh2
2020-07-25 17:51:13
64.225.14.3 attackspam
Invalid user penis from 64.225.14.3 port 49002
2020-07-25 17:50:43

最近上报的IP列表

195.182.15.86 89.46.192.76 62.173.140.193 200.71.67.48
178.128.2.104 192.3.198.222 122.248.38.28 178.93.12.90
113.172.143.16 95.179.132.95 15.188.150.255 123.20.152.37
116.0.2.94 41.235.43.52 36.233.235.83 176.107.52.164
171.234.115.136 114.80.118.59 179.127.146.150 168.228.150.167