必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): unknown

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 14.207.131.114
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 56194
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;14.207.131.114.			IN	A

;; AUTHORITY SECTION:
.			124	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022030803 1800 900 604800 86400

;; Query time: 16 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Mar 09 08:52:24 CST 2022
;; MSG SIZE  rcvd: 107
HOST信息:
114.131.207.14.in-addr.arpa domain name pointer mx-ll-14.207.131-114.dynamic.3bb.co.th.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
114.131.207.14.in-addr.arpa	name = mx-ll-14.207.131-114.dynamic.3bb.co.th.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
20.188.32.46 attackspam
Wordpress malicious attack:[octablocked]
2020-05-31 16:08:07
195.54.160.234 attack
Unauthorized connection attempt detected from IP address 195.54.160.234 to port 333
2020-05-31 15:58:38
46.101.248.180 attackbots
detected by Fail2Ban
2020-05-31 15:58:00
122.224.168.22 attack
Invalid user goodlett from 122.224.168.22 port 53202
2020-05-31 16:14:04
66.249.155.102 attack
Unauthorized connection attempt detected from IP address 66.249.155.102 to port 23
2020-05-31 15:44:45
162.243.136.194 attackspam
Port Scan detected!
...
2020-05-31 16:11:38
185.91.142.202 attackbotsspam
Invalid user omn from 185.91.142.202 port 37039
2020-05-31 16:09:46
117.102.197.53 attackbotsspam
SSH Brute Force
2020-05-31 15:53:49
41.221.168.167 attackspambots
Invalid user minecraft from 41.221.168.167 port 42700
2020-05-31 15:45:05
54.37.14.3 attack
May 30 23:48:07 dignus sshd[1899]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=54.37.14.3  user=root
May 30 23:48:10 dignus sshd[1899]: Failed password for root from 54.37.14.3 port 59110 ssh2
May 30 23:51:39 dignus sshd[2160]: Invalid user 888888 from 54.37.14.3 port 34988
May 30 23:51:39 dignus sshd[2160]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=54.37.14.3
May 30 23:51:41 dignus sshd[2160]: Failed password for invalid user 888888 from 54.37.14.3 port 34988 ssh2
...
2020-05-31 15:59:01
122.51.17.106 attack
Invalid user othello from 122.51.17.106 port 53556
2020-05-31 16:05:48
178.128.122.126 attack
2020-05-31T13:21:00.070604vivaldi2.tree2.info sshd[30101]: Failed password for root from 178.128.122.126 port 40014 ssh2
2020-05-31T13:23:05.115959vivaldi2.tree2.info sshd[30176]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.128.122.126  user=root
2020-05-31T13:23:06.593153vivaldi2.tree2.info sshd[30176]: Failed password for root from 178.128.122.126 port 42474 ssh2
2020-05-31T13:25:05.872460vivaldi2.tree2.info sshd[30269]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.128.122.126  user=root
2020-05-31T13:25:07.828027vivaldi2.tree2.info sshd[30269]: Failed password for root from 178.128.122.126 port 44934 ssh2
...
2020-05-31 16:11:17
112.198.126.124 attack
Udp port scan atack
2020-05-31 16:23:10
129.204.28.114 attackspam
$f2bV_matches
2020-05-31 16:10:32
94.23.179.199 attack
May 31 08:59:50 santamaria sshd\[10391\]: Invalid user lynum from 94.23.179.199
May 31 08:59:50 santamaria sshd\[10391\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=94.23.179.199
May 31 08:59:52 santamaria sshd\[10391\]: Failed password for invalid user lynum from 94.23.179.199 port 37154 ssh2
...
2020-05-31 15:44:23

最近上报的IP列表

14.207.130.76 14.207.131.123 14.207.130.98 14.207.131.119
14.207.131.130 14.207.131.143 14.207.131.145 118.41.128.197
14.207.131.151 14.207.131.199 14.207.131.167 14.207.131.186
14.207.131.178 14.207.131.209 14.207.131.240 14.207.131.36
14.207.131.41 14.207.131.230 14.207.131.57 14.207.131.69