必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): Thailand

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 14.207.121.41
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 57240
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;14.207.121.41.			IN	A

;; AUTHORITY SECTION:
.			221	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022022700 1800 900 604800 86400

;; Query time: 67 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Feb 27 17:50:12 CST 2022
;; MSG SIZE  rcvd: 106
HOST信息:
41.121.207.14.in-addr.arpa domain name pointer mx-ll-14.207.121-41.dynamic.3bb.co.th.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
41.121.207.14.in-addr.arpa	name = mx-ll-14.207.121-41.dynamic.3bb.co.th.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
222.186.180.142 attack
Feb  8 17:38:54 firewall sshd[6084]: Failed password for root from 222.186.180.142 port 52868 ssh2
Feb  8 17:38:56 firewall sshd[6084]: Failed password for root from 222.186.180.142 port 52868 ssh2
Feb  8 17:38:58 firewall sshd[6084]: Failed password for root from 222.186.180.142 port 52868 ssh2
...
2020-02-09 04:42:25
93.174.93.27 attackspambots
Feb  8 20:52:31 debian-2gb-nbg1-2 kernel: \[3450790.128733\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=93.174.93.27 DST=195.201.40.59 LEN=40 TOS=0x00 PREC=0x00 TTL=247 ID=65232 PROTO=TCP SPT=56453 DPT=824 WINDOW=1024 RES=0x00 SYN URGP=0
2020-02-09 04:08:41
179.222.97.194 attackbots
Feb  8 21:37:16 MK-Soft-VM8 sshd[17910]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=179.222.97.194 
Feb  8 21:37:18 MK-Soft-VM8 sshd[17910]: Failed password for invalid user yau from 179.222.97.194 port 44241 ssh2
...
2020-02-09 04:43:39
89.154.4.249 attackbots
Feb  8 17:19:06 legacy sshd[21810]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=89.154.4.249
Feb  8 17:19:08 legacy sshd[21810]: Failed password for invalid user zrn from 89.154.4.249 port 36642 ssh2
Feb  8 17:22:42 legacy sshd[22001]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=89.154.4.249
...
2020-02-09 04:51:19
94.191.58.157 attackspambots
Feb  8 00:35:22 server sshd\[30922\]: Invalid user utm from 94.191.58.157
Feb  8 00:35:22 server sshd\[30922\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=94.191.58.157 
Feb  8 00:35:23 server sshd\[30922\]: Failed password for invalid user utm from 94.191.58.157 port 50944 ssh2
Feb  8 21:21:18 server sshd\[3838\]: Invalid user sqm from 94.191.58.157
Feb  8 21:21:18 server sshd\[3838\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=94.191.58.157 
...
2020-02-09 04:38:38
79.179.217.66 attackspambots
Port probing on unauthorized port 23
2020-02-09 04:30:05
123.206.69.81 attackspambots
2020-02-08T15:37:06.811271scmdmz1 sshd[19612]: Invalid user qod from 123.206.69.81 port 43405
2020-02-08T15:37:06.814112scmdmz1 sshd[19612]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=123.206.69.81
2020-02-08T15:37:06.811271scmdmz1 sshd[19612]: Invalid user qod from 123.206.69.81 port 43405
2020-02-08T15:37:08.599341scmdmz1 sshd[19612]: Failed password for invalid user qod from 123.206.69.81 port 43405 ssh2
2020-02-08T15:41:59.238301scmdmz1 sshd[20107]: Invalid user raj from 123.206.69.81 port 56068
...
2020-02-09 04:43:56
80.82.77.245 attack
80.82.77.245 was recorded 12 times by 10 hosts attempting to connect to the following ports: 53,120. Incident counter (4h, 24h, all-time): 12, 125, 20270
2020-02-09 04:48:13
92.222.36.74 attackspam
$f2bV_matches
2020-02-09 04:26:54
222.72.137.115 attackspambots
Feb  6 10:49:59 nxxxxxxx0 sshd[7507]: Invalid user gnome-inhostnameal-setup from 222.72.137.115
Feb  6 10:49:59 nxxxxxxx0 sshd[7507]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.72.137.115 
Feb  6 10:50:01 nxxxxxxx0 sshd[7507]: Failed password for invalid user gnome-inhostnameal-setup from 222.72.137.115 port 16501 ssh2
Feb  6 10:50:01 nxxxxxxx0 sshd[7507]: Received disconnect from 222.72.137.115: 11: Bye Bye [preauth]
Feb  6 10:51:01 nxxxxxxx0 sshd[7560]: Invalid user gnome-inhostnameial-setu from 222.72.137.115
Feb  6 10:51:01 nxxxxxxx0 sshd[7560]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.72.137.115 
Feb  6 10:51:02 nxxxxxxx0 sshd[7560]: Failed password for invalid user gnome-inhostnameial-setu from 222.72.137.115 port 43439 ssh2
Feb  6 10:51:02 nxxxxxxx0 sshd[7560]: Received disconnect from 222.72.137.115: 11: Bye Bye [preauth]
Feb  6 10:52:05 nxxxxxxx0 sshd[7652]: Inva........
-------------------------------
2020-02-09 04:14:04
218.92.0.158 attackspam
pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.158  user=root
Failed password for root from 218.92.0.158 port 7815 ssh2
Failed password for root from 218.92.0.158 port 7815 ssh2
Failed password for root from 218.92.0.158 port 7815 ssh2
Failed password for root from 218.92.0.158 port 7815 ssh2
2020-02-09 04:37:41
139.170.150.252 attackbots
Feb  8 15:29:42 firewall sshd[450]: Invalid user ftq from 139.170.150.252
Feb  8 15:29:44 firewall sshd[450]: Failed password for invalid user ftq from 139.170.150.252 port 38548 ssh2
Feb  8 15:33:58 firewall sshd[608]: Invalid user ibc from 139.170.150.252
...
2020-02-09 04:23:43
84.119.173.125 attackbotsspam
Feb  9 00:52:46 areeb-Workstation sshd[28076]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=84.119.173.125 
Feb  9 00:52:48 areeb-Workstation sshd[28076]: Failed password for invalid user su from 84.119.173.125 port 42562 ssh2
...
2020-02-09 04:27:22
145.239.94.191 attack
2020-02-08T15:21:00.123009scmdmz1 sshd[17637]: Invalid user umy from 145.239.94.191 port 51190
2020-02-08T15:21:00.125854scmdmz1 sshd[17637]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=191.ip-145-239-94.eu
2020-02-08T15:21:00.123009scmdmz1 sshd[17637]: Invalid user umy from 145.239.94.191 port 51190
2020-02-08T15:21:01.989476scmdmz1 sshd[17637]: Failed password for invalid user umy from 145.239.94.191 port 51190 ssh2
2020-02-08T15:23:38.671995scmdmz1 sshd[17928]: Invalid user nsf from 145.239.94.191 port 34620
...
2020-02-09 04:15:09
37.49.226.50 attackspam
(Feb  8)  LEN=40 TTL=57 ID=22313 TCP DPT=8080 WINDOW=55868 SYN 
 (Feb  8)  LEN=40 TTL=57 ID=62870 TCP DPT=8080 WINDOW=55868 SYN 
 (Feb  8)  LEN=40 TTL=57 ID=22504 TCP DPT=8080 WINDOW=19786 SYN 
 (Feb  7)  LEN=40 TTL=57 ID=23245 TCP DPT=8080 WINDOW=47442 SYN 
 (Feb  7)  LEN=40 TTL=57 ID=28082 TCP DPT=8080 WINDOW=24676 SYN 
 (Feb  6)  LEN=40 TTL=57 ID=62643 TCP DPT=8080 WINDOW=24676 SYN 
 (Feb  6)  LEN=40 TTL=57 ID=44574 TCP DPT=8080 WINDOW=47442 SYN 
 (Feb  6)  LEN=40 TTL=57 ID=1179 TCP DPT=8080 WINDOW=47442 SYN 
 (Feb  3)  LEN=40 TTL=57 ID=27194 TCP DPT=8080 WINDOW=24676 SYN 
 (Feb  3)  LEN=40 TTL=57 ID=3354 TCP DPT=8080 WINDOW=8018 SYN 
 (Feb  3)  LEN=40 TTL=57 ID=14967 TCP DPT=8080 WINDOW=40914 SYN 
 (Feb  2)  LEN=40 TTL=57 ID=59437 TCP DPT=8080 WINDOW=57234 SYN 
 (Feb  2)  LEN=40 TTL=57 ID=2242 TCP DPT=8080 WINDOW=57234 SYN
2020-02-09 04:44:28

最近上报的IP列表

14.207.121.53 14.207.121.54 14.207.121.58 14.207.121.62
14.207.121.61 14.207.121.63 14.207.121.64 14.207.121.71
14.207.121.76 129.116.250.208 14.207.124.31 14.207.124.60
14.207.124.80 14.207.124.86 14.207.124.28 14.207.124.63
14.207.124.43 14.207.124.40 14.207.124.50 14.207.124.52