必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): unknown

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 14.207.120.3
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 18240
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;14.207.120.3.			IN	A

;; AUTHORITY SECTION:
.			595	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022030803 1800 900 604800 86400

;; Query time: 98 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Mar 09 08:52:15 CST 2022
;; MSG SIZE  rcvd: 105
HOST信息:
3.120.207.14.in-addr.arpa domain name pointer mx-ll-14.207.120-3.dynamic.3bb.in.th.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
3.120.207.14.in-addr.arpa	name = mx-ll-14.207.120-3.dynamic.3bb.in.th.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
84.54.201.18 attack
@LucianNitescu Personal Honeypot Network <<<>>> Donate at paypal.me/LNitescu <<<>>> 2019-07-02 00:05:40,973 INFO [shellcode_manager] (84.54.201.18) no match, writing hexdump (4260aa52032b0c53124fa2de41347fa8 :2168721) - MS17010 (EternalBlue)
2019-07-02 14:56:42
192.157.230.122 attackspambots
445/tcp 445/tcp 445/tcp...
[2019-06-10/07-02]5pkt,1pt.(tcp)
2019-07-02 15:14:56
61.0.34.237 attackbotsspam
@LucianNitescu Personal Honeypot Network <<<>>> Donate at paypal.me/LNitescu <<<>>> 2019-07-02 00:05:53,640 INFO [shellcode_manager] (61.0.34.237) no match, writing hexdump (231c2026033dccfcdbe8a741331a9708 :2149627) - MS17010 (EternalBlue)
2019-07-02 14:48:02
117.69.24.16 attack
Multiple failed FTP logins
2019-07-02 15:19:36
202.147.193.2 attackbots
445/tcp 445/tcp
[2019-05-24/07-02]2pkt
2019-07-02 15:09:10
78.111.97.4 attack
445/tcp 445/tcp 445/tcp...
[2019-06-14/07-02]7pkt,1pt.(tcp)
2019-07-02 15:20:30
118.25.128.19 attack
Jan 15 09:47:36 motanud sshd\[31827\]: Invalid user gernst from 118.25.128.19 port 45120
Jan 15 09:47:36 motanud sshd\[31827\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.25.128.19
Jan 15 09:47:38 motanud sshd\[31827\]: Failed password for invalid user gernst from 118.25.128.19 port 45120 ssh2
2019-07-02 15:10:41
193.56.29.115 attack
@LucianNitescu Personal Honeypot Network <<<>>> Donate at paypal.me/LNitescu <<<>>> 2019-07-02 02:28:33,911 INFO [amun_request_handler] PortScan Detected on Port: 445 (193.56.29.115)
2019-07-02 15:29:50
37.187.196.64 attackspambots
Automatic report - Web App Attack
2019-07-02 15:07:04
203.166.162.197 attackspam
3389BruteforceFW21
2019-07-02 15:04:13
58.215.12.226 attack
Jul  2 05:51:40 [host] sshd[24531]: Invalid user castis from 58.215.12.226
Jul  2 05:51:40 [host] sshd[24531]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=58.215.12.226
Jul  2 05:51:42 [host] sshd[24531]: Failed password for invalid user castis from 58.215.12.226 port 34833 ssh2
2019-07-02 14:43:09
150.109.101.46 attack
2019-07-02T06:16:58.747618cavecanem sshd[24312]: Invalid user muhammad from 150.109.101.46 port 45934
2019-07-02T06:16:58.749983cavecanem sshd[24312]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=150.109.101.46
2019-07-02T06:16:58.747618cavecanem sshd[24312]: Invalid user muhammad from 150.109.101.46 port 45934
2019-07-02T06:17:00.300271cavecanem sshd[24312]: Failed password for invalid user muhammad from 150.109.101.46 port 45934 ssh2
2019-07-02T06:19:40.669077cavecanem sshd[25011]: Invalid user support from 150.109.101.46 port 43456
2019-07-02T06:19:40.671693cavecanem sshd[25011]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=150.109.101.46
2019-07-02T06:19:40.669077cavecanem sshd[25011]: Invalid user support from 150.109.101.46 port 43456
2019-07-02T06:19:42.462702cavecanem sshd[25011]: Failed password for invalid user support from 150.109.101.46 port 43456 ssh2
2019-07-02T06:22:10.255245cavecanem s
...
2019-07-02 14:54:37
173.164.173.36 attack
Jul  2 06:45:26 MK-Soft-VM5 sshd\[2779\]: Invalid user uftp from 173.164.173.36 port 50732
Jul  2 06:45:26 MK-Soft-VM5 sshd\[2779\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=173.164.173.36
Jul  2 06:45:28 MK-Soft-VM5 sshd\[2779\]: Failed password for invalid user uftp from 173.164.173.36 port 50732 ssh2
...
2019-07-02 15:31:09
1.169.2.177 attackspam
@LucianNitescu Personal Honeypot Network <<<>>> Donate at paypal.me/LNitescu <<<>>> 2019-07-02 02:28:55,507 INFO [amun_request_handler] PortScan Detected on Port: 445 (1.169.2.177)
2019-07-02 15:20:54
159.89.201.212 attack
Jul  2 03:45:01 mailserver sshd[18018]: Invalid user test from 159.89.201.212
Jul  2 03:45:01 mailserver sshd[18018]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.89.201.212
Jul  2 03:45:04 mailserver sshd[18018]: Failed password for invalid user test from 159.89.201.212 port 63827 ssh2
Jul  2 03:45:04 mailserver sshd[18018]: Connection closed by 159.89.201.212 port 63827 [preauth]


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=159.89.201.212
2019-07-02 15:23:56

最近上报的IP列表

14.207.121.99 14.207.119.118 14.207.121.95 14.207.121.89
14.207.121.84 14.207.122.101 118.40.58.214 14.207.122.103
14.207.122.110 14.207.122.113 14.207.122.116 14.207.122.120
14.207.122.123 14.207.122.115 14.207.122.124 14.207.122.126
14.207.122.13 14.207.122.131 14.207.122.128 14.207.122.132