必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): Thailand

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 14.207.182.242
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 8199
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;14.207.182.242.			IN	A

;; AUTHORITY SECTION:
.			273	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022022700 1800 900 604800 86400

;; Query time: 111 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Feb 27 17:53:49 CST 2022
;; MSG SIZE  rcvd: 107
HOST信息:
242.182.207.14.in-addr.arpa domain name pointer mx-ll-14.207.182-242.dynamic.3bb.in.th.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
242.182.207.14.in-addr.arpa	name = mx-ll-14.207.182-242.dynamic.3bb.in.th.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
128.199.178.188 attack
ssh failed login
2019-12-24 00:08:05
35.239.243.107 spamattack
Is a Fraud, scam
2019-12-24 00:08:34
129.28.115.92 attackspambots
Sep 21 03:48:26 yesfletchmain sshd\[8178\]: Invalid user nq from 129.28.115.92 port 49161
Sep 21 03:48:26 yesfletchmain sshd\[8178\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.28.115.92
Sep 21 03:48:28 yesfletchmain sshd\[8178\]: Failed password for invalid user nq from 129.28.115.92 port 49161 ssh2
Sep 21 03:52:33 yesfletchmain sshd\[8274\]: Invalid user test from 129.28.115.92 port 37471
Sep 21 03:52:34 yesfletchmain sshd\[8274\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.28.115.92
...
2019-12-24 00:24:05
129.28.56.16 attackbotsspam
Apr 19 23:24:18 yesfletchmain sshd\[14843\]: Invalid user admin from 129.28.56.16 port 48978
Apr 19 23:24:18 yesfletchmain sshd\[14843\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.28.56.16
Apr 19 23:24:19 yesfletchmain sshd\[14843\]: Failed password for invalid user admin from 129.28.56.16 port 48978 ssh2
Apr 19 23:27:20 yesfletchmain sshd\[14875\]: Invalid user dv from 129.28.56.16 port 47446
Apr 19 23:27:20 yesfletchmain sshd\[14875\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.28.56.16
...
2019-12-23 23:51:54
51.91.108.124 attackspam
Dec 23 06:00:45 php1 sshd\[26934\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=124.ip-51-91-108.eu  user=root
Dec 23 06:00:46 php1 sshd\[26934\]: Failed password for root from 51.91.108.124 port 35094 ssh2
Dec 23 06:06:49 php1 sshd\[27571\]: Invalid user laurinda from 51.91.108.124
Dec 23 06:06:49 php1 sshd\[27571\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=124.ip-51-91-108.eu
Dec 23 06:06:51 php1 sshd\[27571\]: Failed password for invalid user laurinda from 51.91.108.124 port 38632 ssh2
2019-12-24 00:22:05
218.92.0.145 attack
--- report ---
Dec 23 13:14:47 sshd: Connection from 218.92.0.145 port 59900
2019-12-24 00:27:29
129.226.129.191 attackbotsspam
Nov 28 18:34:18 yesfletchmain sshd\[9230\]: Invalid user hilstrom from 129.226.129.191 port 54356
Nov 28 18:34:19 yesfletchmain sshd\[9230\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.226.129.191
Nov 28 18:34:20 yesfletchmain sshd\[9230\]: Failed password for invalid user hilstrom from 129.226.129.191 port 54356 ssh2
Nov 28 18:39:36 yesfletchmain sshd\[9496\]: User www-data from 129.226.129.191 not allowed because not listed in AllowUsers
Nov 28 18:39:36 yesfletchmain sshd\[9496\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.226.129.191  user=www-data
...
2019-12-24 00:28:08
189.204.6.157 attack
[munged]::80 189.204.6.157 - - [23/Dec/2019:15:58:48 +0100] "POST /[munged]: HTTP/1.1" 200 12149 "http://[munged]:/[munged]:" "Mozilla/5.0 (Windows NT 6.1; rv:60.0) Gecko/20100101 Firefox/60.0"
[munged]::80 189.204.6.157 - - [23/Dec/2019:15:58:50 +0100] "POST /[munged]: HTTP/1.1" 200 12148 "http://[munged]:/[munged]:" "Mozilla/5.0 (Windows NT 6.1; rv:60.0) Gecko/20100101 Firefox/60.0"
[munged]::80 189.204.6.157 - - [23/Dec/2019:15:58:51 +0100] "POST /[munged]: HTTP/1.1" 200 12148 "http://[munged]:/[munged]:" "Mozilla/5.0 (Windows NT 6.1; rv:60.0) Gecko/20100101 Firefox/60.0"
[munged]::80 189.204.6.157 - - [23/Dec/2019:15:58:52 +0100] "POST /[munged]: HTTP/1.1" 200 12148 "http://[munged]:/[munged]:" "Mozilla/5.0 (Windows NT 6.1; rv:60.0) Gecko/20100101 Firefox/60.0"
[munged]::80 189.204.6.157 - - [23/Dec/2019:15:58:53 +0100] "POST /[munged]: HTTP/1.1" 200 12148 "http://[munged]:/[munged]:" "Mozilla/5.0 (Windows NT 6.1; rv:60.0) Gecko/20100101 Firefox/60.0"
[munged]::80 189.204.6.157 - - [23/Dec/2019:15:58:54 +
2019-12-24 00:27:47
222.186.175.140 attack
--- report ---
Dec 23 12:46:49 sshd: Connection from 222.186.175.140 port 15512
Dec 23 12:46:53 sshd: Failed password for root from 222.186.175.140 port 15512 ssh2
Dec 23 12:46:54 sshd: Received disconnect from 222.186.175.140: 11:  [preauth]
2019-12-24 00:06:43
129.28.140.254 attackspam
Mar 15 13:22:09 yesfletchmain sshd\[31487\]: User root from 129.28.140.254 not allowed because not listed in AllowUsers
Mar 15 13:22:09 yesfletchmain sshd\[31487\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.28.140.254  user=root
Mar 15 13:22:11 yesfletchmain sshd\[31487\]: Failed password for invalid user root from 129.28.140.254 port 45170 ssh2
Mar 15 13:29:15 yesfletchmain sshd\[31672\]: Invalid user shairport from 129.28.140.254 port 41978
Mar 15 13:29:15 yesfletchmain sshd\[31672\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.28.140.254
...
2019-12-24 00:14:31
41.235.214.93 attackbots
wget call in url
2019-12-24 00:22:53
124.156.55.236 attack
MultiHost/MultiPort Probe, Scan, Hack -
2019-12-24 00:21:48
42.118.219.198 attackspambots
Unauthorized connection attempt detected from IP address 42.118.219.198 to port 445
2019-12-23 23:53:40
35.160.48.160 attack
12/23/2019-16:25:02.452655 35.160.48.160 Protocol: 6 SURICATA TLS invalid record/traffic
2019-12-24 00:04:50
104.200.110.191 attackspam
2019-12-23T15:46:27.277360shield sshd\[4148\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.200.110.191  user=root
2019-12-23T15:46:29.183126shield sshd\[4148\]: Failed password for root from 104.200.110.191 port 35130 ssh2
2019-12-23T15:52:27.051022shield sshd\[5901\]: Invalid user pamila from 104.200.110.191 port 39340
2019-12-23T15:52:27.055485shield sshd\[5901\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.200.110.191
2019-12-23T15:52:29.050448shield sshd\[5901\]: Failed password for invalid user pamila from 104.200.110.191 port 39340 ssh2
2019-12-24 00:23:31

最近上报的IP列表

14.207.182.50 14.207.182.25 14.207.182.233 14.207.192.105
14.207.192.103 14.207.192.115 14.207.192.141 14.207.192.166
14.207.192.108 14.207.192.112 14.207.192.111 14.207.192.173
14.207.192.174 14.207.192.179 14.207.192.122 14.207.192.146
14.207.192.180 14.207.192.18 14.207.192.163 14.207.192.182