必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): Thailand

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
IP 类型 评论内容 时间
14.207.147.180 attackspam
Attempt to attack host OS, exploiting network vulnerabilities, on 03-01-2020 13:05:15.
2020-01-03 23:43:27
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 14.207.147.242
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 33392
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;14.207.147.242.			IN	A

;; AUTHORITY SECTION:
.			451	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022022700 1800 900 604800 86400

;; Query time: 93 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Feb 27 17:51:47 CST 2022
;; MSG SIZE  rcvd: 107
HOST信息:
242.147.207.14.in-addr.arpa domain name pointer mx-ll-14.207.147-242.dynamic.3bb.in.th.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
242.147.207.14.in-addr.arpa	name = mx-ll-14.207.147-242.dynamic.3bb.in.th.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
106.124.140.36 attackbots
Invalid user bobby from 106.124.140.36 port 39501
2020-03-20 03:30:42
80.211.13.167 attackbotsspam
fail2ban -- 80.211.13.167
...
2020-03-20 04:06:11
77.118.203.60 attack
Invalid user krishna from 77.118.203.60 port 5450
2020-03-20 04:06:43
80.211.55.234 attackspambots
Invalid user kristofvps from 80.211.55.234 port 57740
2020-03-20 03:37:11
92.222.156.151 attack
Mar 19 12:23:53 home sshd[20217]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=92.222.156.151  user=root
Mar 19 12:23:55 home sshd[20217]: Failed password for root from 92.222.156.151 port 38394 ssh2
Mar 19 12:36:13 home sshd[20309]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=92.222.156.151  user=root
Mar 19 12:36:14 home sshd[20309]: Failed password for root from 92.222.156.151 port 39234 ssh2
Mar 19 12:42:53 home sshd[20352]: Invalid user sonaruser from 92.222.156.151 port 33640
Mar 19 12:42:53 home sshd[20352]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=92.222.156.151
Mar 19 12:42:53 home sshd[20352]: Invalid user sonaruser from 92.222.156.151 port 33640
Mar 19 12:42:55 home sshd[20352]: Failed password for invalid user sonaruser from 92.222.156.151 port 33640 ssh2
Mar 19 12:50:58 home sshd[20374]: Invalid user ubuntu from 92.222.156.151 port 56288
Mar 19 12:50:58 home sshd[2
2020-03-20 03:35:16
112.6.129.80 attackbots
Invalid user newadmin from 112.6.129.80 port 15880
2020-03-20 04:00:28
37.204.15.96 attackspambots
Invalid user admin from 37.204.15.96 port 47342
2020-03-20 03:42:19
195.224.138.61 attack
2020-03-19T18:17:20.550237shield sshd\[2567\]: Invalid user frappe from 195.224.138.61 port 46966
2020-03-19T18:17:20.557634shield sshd\[2567\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=195.224.138.61
2020-03-19T18:17:22.338951shield sshd\[2567\]: Failed password for invalid user frappe from 195.224.138.61 port 46966 ssh2
2020-03-19T18:23:58.457638shield sshd\[4171\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=195.224.138.61  user=root
2020-03-19T18:24:00.876347shield sshd\[4171\]: Failed password for root from 195.224.138.61 port 40836 ssh2
2020-03-20 03:47:48
50.93.249.242 attackspambots
Mar 19 19:26:49 ewelt sshd[5675]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=50.93.249.242  user=root
Mar 19 19:26:51 ewelt sshd[5675]: Failed password for root from 50.93.249.242 port 49150 ssh2
Mar 19 19:30:39 ewelt sshd[5951]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=50.93.249.242  user=root
Mar 19 19:30:41 ewelt sshd[5951]: Failed password for root from 50.93.249.242 port 57638 ssh2
...
2020-03-20 03:40:20
65.34.120.176 attackspambots
Mar 20 00:17:50 itv-usvr-01 sshd[15114]: Invalid user suporte from 65.34.120.176
Mar 20 00:17:50 itv-usvr-01 sshd[15114]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=65.34.120.176
Mar 20 00:17:50 itv-usvr-01 sshd[15114]: Invalid user suporte from 65.34.120.176
Mar 20 00:17:52 itv-usvr-01 sshd[15114]: Failed password for invalid user suporte from 65.34.120.176 port 60033 ssh2
Mar 20 00:25:09 itv-usvr-01 sshd[15406]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=65.34.120.176  user=root
Mar 20 00:25:11 itv-usvr-01 sshd[15406]: Failed password for root from 65.34.120.176 port 40769 ssh2
2020-03-20 03:37:46
49.234.163.142 attackspam
Invalid user nagios from 49.234.163.142 port 45730
2020-03-20 03:41:00
61.160.96.90 attackbotsspam
$f2bV_matches
2020-03-20 04:07:55
51.77.150.118 attackspambots
$f2bV_matches
2020-03-20 03:39:27
201.219.242.22 attackbotsspam
Lines containing failures of 201.219.242.22
Mar 19 07:46:08 shared07 sshd[16955]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=201.219.242.22  user=r.r
Mar 19 07:46:10 shared07 sshd[16955]: Failed password for r.r from 201.219.242.22 port 44330 ssh2
Mar 19 07:46:10 shared07 sshd[16955]: Received disconnect from 201.219.242.22 port 44330:11: Bye Bye [preauth]
Mar 19 07:46:10 shared07 sshd[16955]: Disconnected from authenticating user r.r 201.219.242.22 port 44330 [preauth]
Mar 19 08:12:05 shared07 sshd[26707]: Connection closed by 201.219.242.22 port 38846 [preauth]
Mar 19 08:15:56 shared07 sshd[28138]: Invalid user ubuntu from 201.219.242.22 port 51428
Mar 19 08:15:56 shared07 sshd[28138]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=201.219.242.22
Mar 19 08:15:58 shared07 sshd[28138]: Failed password for invalid user ubuntu from 201.219.242.22 port 51428 ssh2
Mar 19 08:15:58 shared07 s........
------------------------------
2020-03-20 03:47:19
106.12.5.196 attackbotsspam
-
2020-03-20 04:03:24

最近上报的IP列表

14.207.147.58 14.207.147.67 14.207.147.23 14.207.147.80
14.207.147.82 14.207.147.89 14.207.148.1 14.207.147.73
14.207.160.217 14.207.160.222 14.207.160.126 14.207.160.29
14.207.160.253 14.207.160.175 14.207.160.162 14.207.160.42
14.207.160.43 14.207.160.249 14.207.160.155 14.207.160.26