必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): None

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
IP 类型 评论内容 时间
14.207.129.75 attackbotsspam
Triggered: repeated knocking on closed ports.
2020-02-03 21:34:20
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 14.207.129.222
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 44884
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;14.207.129.222.			IN	A

;; AUTHORITY SECTION:
.			220	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022022601 1800 900 604800 86400

;; Query time: 59 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Feb 27 13:21:24 CST 2022
;; MSG SIZE  rcvd: 107
HOST信息:
222.129.207.14.in-addr.arpa domain name pointer mx-ll-14.207.129-222.dynamic.3bb.in.th.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
222.129.207.14.in-addr.arpa	name = mx-ll-14.207.129-222.dynamic.3bb.in.th.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
93.158.228.230 attackspam
email spam
2019-12-19 20:21:19
217.112.128.204 attackspam
email spam
2019-12-19 20:06:31
103.57.80.50 attackbots
email spam
2019-12-19 20:20:16
91.103.31.45 attackbots
email spam
2019-12-19 19:59:48
212.200.101.22 attackspambots
email spam
2019-12-19 20:08:06
212.12.29.242 attackspambots
email spam
2019-12-19 20:08:27
79.134.179.253 attack
email spam
2019-12-19 20:24:36
45.136.108.157 attackspam
Dec 19 12:51:26 h2177944 kernel: \[9631253.432339\] \[UFW BLOCK\] IN=venet0 OUT= MAC= SRC=45.136.108.157 DST=85.214.117.9 LEN=40 TOS=0x00 PREC=0x00 TTL=248 ID=39471 PROTO=TCP SPT=50345 DPT=4014 WINDOW=1024 RES=0x00 SYN URGP=0 
Dec 19 12:52:08 h2177944 kernel: \[9631295.148798\] \[UFW BLOCK\] IN=venet0 OUT= MAC= SRC=45.136.108.157 DST=85.214.117.9 LEN=40 TOS=0x00 PREC=0x00 TTL=248 ID=38102 PROTO=TCP SPT=50345 DPT=4043 WINDOW=1024 RES=0x00 SYN URGP=0 
Dec 19 13:00:23 h2177944 kernel: \[9631790.424045\] \[UFW BLOCK\] IN=venet0 OUT= MAC= SRC=45.136.108.157 DST=85.214.117.9 LEN=40 TOS=0x00 PREC=0x00 TTL=248 ID=60711 PROTO=TCP SPT=50345 DPT=3500 WINDOW=1024 RES=0x00 SYN URGP=0 
Dec 19 13:09:12 h2177944 kernel: \[9632319.242183\] \[UFW BLOCK\] IN=venet0 OUT= MAC= SRC=45.136.108.157 DST=85.214.117.9 LEN=40 TOS=0x00 PREC=0x00 TTL=248 ID=14339 PROTO=TCP SPT=50345 DPT=4123 WINDOW=1024 RES=0x00 SYN URGP=0 
Dec 19 13:19:52 h2177944 kernel: \[9632959.195885\] \[UFW BLOCK\] IN=venet0 OUT= MAC= SRC=45.136.108.157 DST=85.214.
2019-12-19 20:27:26
168.181.196.25 attackspambots
email spam
2019-12-19 20:15:29
115.90.219.181 attack
email spam
2019-12-19 20:16:59
218.145.224.211 attackbots
email spam
2019-12-19 20:30:08
5.39.93.158 attackspambots
Invalid user green from 5.39.93.158 port 39420
pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=5.39.93.158
Failed password for invalid user green from 5.39.93.158 port 39420 ssh2
Invalid user web from 5.39.93.158 port 46542
pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=5.39.93.158
2019-12-19 20:05:46
202.142.178.114 attack
proto=tcp  .  spt=43337  .  dpt=25  .     (Found on   Dark List de Dec 19)     (449)
2019-12-19 20:31:05
45.146.200.54 attackspam
email spam
2019-12-19 20:03:06
109.224.37.85 attackbotsspam
proto=tcp  .  spt=58635  .  dpt=25  .     (Found on   Dark List de Dec 19)     (485)
2019-12-19 20:17:47

最近上报的IP列表

14.207.129.215 14.207.129.34 14.207.129.29 14.207.129.31
14.207.129.49 14.207.129.56 14.207.129.46 14.207.129.250
14.207.129.6 14.207.129.60 14.207.129.232 14.207.129.36
14.207.129.88 14.207.129.77 14.207.129.85 14.207.13.101
14.207.129.90 14.207.13.117 14.207.13.111 14.207.129.86