必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): Hong Kong

运营商(isp): Hong Kong Broadband Network Ltd

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 14.199.244.213
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 28377
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;14.199.244.213.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025020602 1800 900 604800 86400

;; Query time: 17 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 07 08:08:33 CST 2025
;; MSG SIZE  rcvd: 107
HOST信息:
213.244.199.14.in-addr.arpa domain name pointer 014199244213.ctinets.com.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
213.244.199.14.in-addr.arpa	name = 014199244213.ctinets.com.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
193.169.212.140 attack
Aug 15 05:54:08 server postfix/smtpd[20027]: NOQUEUE: reject: RCPT from srv140.ypclistmanager.com[193.169.212.140]: 554 5.7.1 Service unavailable; Client host [193.169.212.140] blocked using zen.spamhaus.org; https://www.spamhaus.org/sbl/query/SBLCSS / https://www.spamhaus.org/sbl/query/SBL487106; from= to= proto=ESMTP helo=
2020-08-15 15:30:47
67.205.138.198 attack
31326/tcp 8978/tcp 19959/tcp...
[2020-06-23/08-15]73pkt,28pt.(tcp)
2020-08-15 15:30:08
192.162.98.111 attackbotsspam
Aug 15 01:18:26 mail.srvfarm.net postfix/smtpd[928504]: warning: plechac.bartanet.cz[192.162.98.111]: SASL PLAIN authentication failed: 
Aug 15 01:18:26 mail.srvfarm.net postfix/smtpd[928504]: lost connection after AUTH from plechac.bartanet.cz[192.162.98.111]
Aug 15 01:19:25 mail.srvfarm.net postfix/smtps/smtpd[928606]: warning: plechac.bartanet.cz[192.162.98.111]: SASL PLAIN authentication failed: 
Aug 15 01:19:25 mail.srvfarm.net postfix/smtps/smtpd[928606]: lost connection after AUTH from plechac.bartanet.cz[192.162.98.111]
Aug 15 01:19:30 mail.srvfarm.net postfix/smtpd[928780]: warning: plechac.bartanet.cz[192.162.98.111]: SASL PLAIN authentication failed:
2020-08-15 15:53:04
178.128.221.85 attackbotsspam
detected by Fail2Ban
2020-08-15 15:39:42
82.141.160.134 attackbots
Aug 15 01:08:31 mail.srvfarm.net postfix/smtpd[928329]: warning: unknown[82.141.160.134]: SASL PLAIN authentication failed: 
Aug 15 01:08:31 mail.srvfarm.net postfix/smtpd[928329]: lost connection after AUTH from unknown[82.141.160.134]
Aug 15 01:10:28 mail.srvfarm.net postfix/smtps/smtpd[913607]: warning: unknown[82.141.160.134]: SASL PLAIN authentication failed: 
Aug 15 01:10:28 mail.srvfarm.net postfix/smtps/smtpd[913607]: lost connection after AUTH from unknown[82.141.160.134]
Aug 15 01:15:27 mail.srvfarm.net postfix/smtps/smtpd[927776]: warning: unknown[82.141.160.134]: SASL PLAIN authentication failed:
2020-08-15 16:00:25
23.94.20.155 attack
Registration form abuse
2020-08-15 15:51:42
107.189.10.42 attack
Brute-force attempt banned
2020-08-15 15:40:35
65.182.224.40 attackspam
[N10.H1.VM1] Port Scanner Detected Blocked by UFW
2020-08-15 15:46:14
142.44.161.132 attackbots
Aug 14 21:01:24 php1 sshd\[13526\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.44.161.132  user=root
Aug 14 21:01:27 php1 sshd\[13526\]: Failed password for root from 142.44.161.132 port 45916 ssh2
Aug 14 21:05:36 php1 sshd\[13887\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.44.161.132  user=root
Aug 14 21:05:38 php1 sshd\[13887\]: Failed password for root from 142.44.161.132 port 56376 ssh2
Aug 14 21:09:48 php1 sshd\[14417\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.44.161.132  user=root
2020-08-15 15:39:26
139.59.85.41 attackspam
Trolling for resource vulnerabilities
2020-08-15 15:23:33
112.85.42.200 attackspambots
Aug 14 21:31:27 php1 sshd\[16272\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.85.42.200  user=root
Aug 14 21:31:29 php1 sshd\[16272\]: Failed password for root from 112.85.42.200 port 55744 ssh2
Aug 14 21:31:39 php1 sshd\[16272\]: Failed password for root from 112.85.42.200 port 55744 ssh2
Aug 14 21:31:42 php1 sshd\[16272\]: Failed password for root from 112.85.42.200 port 55744 ssh2
Aug 14 21:31:46 php1 sshd\[16292\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.85.42.200  user=root
2020-08-15 15:46:49
106.13.123.29 attack
Aug 14 20:51:24 pixelmemory sshd[1543103]: Failed password for root from 106.13.123.29 port 36652 ssh2
Aug 14 20:52:34 pixelmemory sshd[1545591]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.123.29  user=root
Aug 14 20:52:37 pixelmemory sshd[1545591]: Failed password for root from 106.13.123.29 port 50332 ssh2
Aug 14 20:53:47 pixelmemory sshd[1547207]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.123.29  user=root
Aug 14 20:53:50 pixelmemory sshd[1547207]: Failed password for root from 106.13.123.29 port 35792 ssh2
...
2020-08-15 15:41:19
103.25.132.56 attackspam
Aug 15 01:18:01 mail.srvfarm.net postfix/smtps/smtpd[927775]: warning: unknown[103.25.132.56]: SASL PLAIN authentication failed: 
Aug 15 01:18:02 mail.srvfarm.net postfix/smtps/smtpd[927775]: lost connection after AUTH from unknown[103.25.132.56]
Aug 15 01:19:20 mail.srvfarm.net postfix/smtps/smtpd[927774]: warning: unknown[103.25.132.56]: SASL PLAIN authentication failed: 
Aug 15 01:19:20 mail.srvfarm.net postfix/smtps/smtpd[927774]: lost connection after AUTH from unknown[103.25.132.56]
Aug 15 01:26:04 mail.srvfarm.net postfix/smtpd[929430]: warning: unknown[103.25.132.56]: SASL PLAIN authentication failed:
2020-08-15 15:59:16
106.51.113.15 attackspambots
$f2bV_matches
2020-08-15 15:38:30
121.52.154.36 attackspambots
Aug 14 21:26:59 sachi sshd\[9133\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.52.154.36  user=root
Aug 14 21:27:01 sachi sshd\[9133\]: Failed password for root from 121.52.154.36 port 41220 ssh2
Aug 14 21:28:19 sachi sshd\[9225\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.52.154.36  user=root
Aug 14 21:28:21 sachi sshd\[9225\]: Failed password for root from 121.52.154.36 port 55624 ssh2
Aug 14 21:29:37 sachi sshd\[9292\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.52.154.36  user=root
2020-08-15 15:49:12

最近上报的IP列表

116.139.171.141 90.78.104.119 192.62.128.244 116.228.50.6
67.217.199.135 149.119.124.62 69.160.99.109 241.110.210.4
168.212.11.197 8.1.49.33 180.237.157.20 38.206.55.97
212.190.66.65 59.173.241.84 79.5.160.20 13.177.21.102
4.95.113.13 149.95.185.116 91.135.222.85 160.246.108.37