必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): Viet Nam

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 14.189.218.244
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 9257
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;14.189.218.244.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025022001 1800 900 604800 86400

;; Query time: 12 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 21 07:29:35 CST 2025
;; MSG SIZE  rcvd: 107
HOST信息:
244.218.189.14.in-addr.arpa domain name pointer static.vnpt.vn.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
244.218.189.14.in-addr.arpa	name = static.vnpt.vn.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
89.139.162.98 attackbots
Attempts to probe for or exploit a Drupal site on url: /wp-login.php. Reported by the module https://www.drupal.org/project/abuseipdb.
2019-09-10 15:15:57
86.44.58.191 attack
Sep  9 21:00:20 lcprod sshd\[26072\]: Invalid user ftp123 from 86.44.58.191
Sep  9 21:00:20 lcprod sshd\[26072\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=86-44-58-191-dynamic.agg2.rsl.rsl-rtd.eircom.net
Sep  9 21:00:21 lcprod sshd\[26072\]: Failed password for invalid user ftp123 from 86.44.58.191 port 41622 ssh2
Sep  9 21:05:58 lcprod sshd\[26574\]: Invalid user system from 86.44.58.191
Sep  9 21:05:58 lcprod sshd\[26574\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=86-44-58-191-dynamic.agg2.rsl.rsl-rtd.eircom.net
2019-09-10 15:13:12
51.38.125.51 attack
Sep 10 06:35:41 MK-Soft-VM3 sshd\[28890\]: Invalid user q1w2e3r4t5 from 51.38.125.51 port 37096
Sep 10 06:35:41 MK-Soft-VM3 sshd\[28890\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.38.125.51
Sep 10 06:35:43 MK-Soft-VM3 sshd\[28890\]: Failed password for invalid user q1w2e3r4t5 from 51.38.125.51 port 37096 ssh2
...
2019-09-10 14:57:31
129.204.139.206 attackbotsspam
Sep 10 06:51:19 taivassalofi sshd[117672]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.204.139.206
Sep 10 06:51:21 taivassalofi sshd[117672]: Failed password for invalid user cloud from 129.204.139.206 port 51376 ssh2
...
2019-09-10 15:40:01
86.188.246.2 attack
Sep  9 21:34:43 hanapaa sshd\[2638\]: Invalid user 1 from 86.188.246.2
Sep  9 21:34:43 hanapaa sshd\[2638\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=86.188.246.2
Sep  9 21:34:45 hanapaa sshd\[2638\]: Failed password for invalid user 1 from 86.188.246.2 port 48678 ssh2
Sep  9 21:41:12 hanapaa sshd\[3279\]: Invalid user a from 86.188.246.2
Sep  9 21:41:12 hanapaa sshd\[3279\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=86.188.246.2
2019-09-10 15:46:58
45.55.15.134 attack
Sep 10 06:08:31 vmd17057 sshd\[20416\]: Invalid user test from 45.55.15.134 port 42308
Sep 10 06:08:31 vmd17057 sshd\[20416\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.55.15.134
Sep 10 06:08:33 vmd17057 sshd\[20416\]: Failed password for invalid user test from 45.55.15.134 port 42308 ssh2
...
2019-09-10 15:05:13
5.196.88.110 attackspam
Sep 10 09:18:18 SilenceServices sshd[16766]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=5.196.88.110
Sep 10 09:18:21 SilenceServices sshd[16766]: Failed password for invalid user ClepSi from 5.196.88.110 port 46596 ssh2
Sep 10 09:24:49 SilenceServices sshd[19269]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=5.196.88.110
2019-09-10 15:28:25
159.89.238.247 attackspambots
Sep 10 06:35:47 MK-Soft-VM6 sshd\[17645\]: Invalid user ts3srv from 159.89.238.247 port 36524
Sep 10 06:35:47 MK-Soft-VM6 sshd\[17645\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.89.238.247
Sep 10 06:35:49 MK-Soft-VM6 sshd\[17645\]: Failed password for invalid user ts3srv from 159.89.238.247 port 36524 ssh2
...
2019-09-10 15:10:50
181.39.37.101 attack
Invalid user tester from 181.39.37.101 port 35278
2019-09-10 15:27:31
91.121.226.109 attackspam
Scanning random ports - tries to find possible vulnerable services
2019-09-10 15:14:05
112.85.42.186 attackbotsspam
Sep 10 11:07:29 areeb-Workstation sshd[12607]: Failed password for root from 112.85.42.186 port 11580 ssh2
...
2019-09-10 15:10:30
104.248.116.140 attackspambots
Sep 10 05:24:00 taivassalofi sshd[114154]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.248.116.140
Sep 10 05:24:02 taivassalofi sshd[114154]: Failed password for invalid user admin from 104.248.116.140 port 60396 ssh2
...
2019-09-10 15:08:33
159.203.199.89 attackbotsspam
Honeypot hit.
2019-09-10 15:02:31
218.98.40.131 attackbotsspam
Sep  9 20:35:38 auw2 sshd\[12714\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.98.40.131  user=root
Sep  9 20:35:40 auw2 sshd\[12714\]: Failed password for root from 218.98.40.131 port 34402 ssh2
Sep  9 20:35:47 auw2 sshd\[12727\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.98.40.131  user=root
Sep  9 20:35:49 auw2 sshd\[12727\]: Failed password for root from 218.98.40.131 port 55592 ssh2
Sep  9 20:35:52 auw2 sshd\[12727\]: Failed password for root from 218.98.40.131 port 55592 ssh2
2019-09-10 15:01:22
95.79.28.168 attack
Sep 10 03:17:25 smtp postfix/smtpd[66611]: NOQUEUE: reject: RCPT from unknown[95.79.28.168]: 554 5.7.1 Service unavailable; Client host [95.79.28.168] blocked using bl.spamcop.net; Blocked - see https://www.spamcop.net/bl.shtml?95.79.28.168; from= to= proto=ESMTP helo=
...
2019-09-10 15:34:32

最近上报的IP列表

228.230.209.168 170.189.229.86 181.48.10.39 70.125.73.151
70.242.146.77 173.33.40.126 43.56.236.255 203.242.223.42
201.81.52.22 128.107.182.109 205.92.242.154 182.120.50.47
22.145.56.246 29.150.21.48 240.115.153.173 224.107.157.197
150.97.66.188 26.92.141.152 75.79.172.68 50.158.227.51