必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): None

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
IP 类型 评论内容 时间
14.207.207.181 attackspam
Unauthorized connection attempt from IP address 14.207.207.181 on Port 445(SMB)
2020-08-21 03:40:37
14.207.207.191 attackbotsspam
May 11 13:47:03 vbuntu sshd[29020]: warning: /etc/hosts.allow, line 11: can't verify hostname: getaddrinfo(mx-ll-14.207.207-191.dynamic.3bb.in.th, AF_INET) failed
May 11 13:47:03 vbuntu sshd[29020]: refused connect from 14.207.207.191 (14.207.207.191)
May 11 13:47:05 vbuntu sshd[29026]: warning: /etc/hosts.allow, line 11: can't verify hostname: getaddrinfo(mx-ll-14.207.207-191.dynamic.3bb.in.th, AF_INET) failed
May 11 13:47:05 vbuntu sshd[29026]: refused connect from 14.207.207.191 (14.207.207.191)


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=14.207.207.191
2020-05-12 01:21:04
14.207.207.49 attack
Attempt to attack host OS, exploiting network vulnerabilities, on 18-12-2019 14:35:09.
2019-12-19 01:32:25
14.207.207.12 attackspambots
IP Ban Report :  
 https://help-dysk.pl/wordpress-firewall-plugins/ip/14.207.207.12/ 
 
 TH - 1H : (18)  
 Protection Against DDoS WordPress plugin :  
 "odzyskiwanie danych help-dysk" 
 IP Address Ranges by Country : TH 
 NAME ASN : ASN45758 
 
 IP : 14.207.207.12 
 
 CIDR : 14.207.0.0/16 
 
 PREFIX COUNT : 64 
 
 UNIQUE IP COUNT : 1069568 
 
 
 ATTACKS DETECTED ASN45758 :  
  1H - 1 
  3H - 2 
  6H - 2 
 12H - 2 
 24H - 6 
 
 DateTime : 2019-11-05 07:28:48 
 
 INFO : Server 403 - Looking for resource vulnerabilities Detected and Blocked by ADMIN  - data recovery
2019-11-05 15:55:47
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 14.207.207.222
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 39635
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;14.207.207.222.			IN	A

;; AUTHORITY SECTION:
.			600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022022700 1800 900 604800 86400

;; Query time: 65 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Feb 27 13:30:06 CST 2022
;; MSG SIZE  rcvd: 107
HOST信息:
222.207.207.14.in-addr.arpa domain name pointer mx-ll-14.207.207-222.dynamic.3bb.in.th.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
222.207.207.14.in-addr.arpa	name = mx-ll-14.207.207-222.dynamic.3bb.in.th.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
5.39.6.29 attackbots
2019-10-04T12:25:26.333943shield sshd\[26154\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=ip29.ip-5-39-6.eu  user=root
2019-10-04T12:25:28.257845shield sshd\[26154\]: Failed password for root from 5.39.6.29 port 48530 ssh2
2019-10-04T12:26:53.984952shield sshd\[26264\]: Invalid user test from 5.39.6.29 port 40490
2019-10-04T12:26:53.989139shield sshd\[26264\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=ip29.ip-5-39-6.eu
2019-10-04T12:26:55.858966shield sshd\[26264\]: Failed password for invalid user test from 5.39.6.29 port 40490 ssh2
2019-10-04 22:55:59
85.113.15.106 attack
Automatic report - Port Scan Attack
2019-10-04 23:10:45
8.29.198.25 attackbotsspam
\[Fri Oct 04 14:19:23.422774 2019\] \[authz_core:error\] \[pid 3788:tid 140102521001728\] \[client 8.29.198.25:44660\] AH01630: client denied by server configuration: /var/www/vhosts/yourdailypornvideos.com/httpdocs/feed
\[Fri Oct 04 14:19:24.551151 2019\] \[authz_core:error\] \[pid 2020:tid 140102763058944\] \[client 8.29.198.25:44736\] AH01630: client denied by server configuration: /var/www/vhosts/yourdailypornvideos.com/httpdocs/feed
\[Fri Oct 04 14:19:24.697097 2019\] \[authz_core:error\] \[pid 2020:tid 140102729488128\] \[client 8.29.198.25:44740\] AH01630: client denied by server configuration: /var/www/vhosts/yourdailypornvideos.com/httpdocs/feed
\[Fri Oct 04 14:26:30.959495 2019\] \[authz_core:error\] \[pid 5703:tid 140102487430912\] \[client 8.29.198.25:34184\] AH01630: client denied by server configuration: /var/www/vhosts/yourdailypornvideos.com/httpdocs/feed
...
2019-10-04 23:05:37
162.241.132.130 attack
Oct  4 04:43:11 sachi sshd\[2259\]: Invalid user Bedienung123 from 162.241.132.130
Oct  4 04:43:11 sachi sshd\[2259\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=server.vizionedge.net
Oct  4 04:43:12 sachi sshd\[2259\]: Failed password for invalid user Bedienung123 from 162.241.132.130 port 36318 ssh2
Oct  4 04:47:52 sachi sshd\[2686\]: Invalid user Amor1@3 from 162.241.132.130
Oct  4 04:47:52 sachi sshd\[2686\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=server.vizionedge.net
2019-10-04 23:05:14
198.108.67.36 attackbotsspam
9251/tcp 2602/tcp 9027/tcp...
[2019-08-04/10-04]116pkt,109pt.(tcp)
2019-10-04 23:14:06
211.23.61.194 attackspam
Oct  4 11:12:54 plusreed sshd[18831]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=211.23.61.194  user=root
Oct  4 11:12:55 plusreed sshd[18831]: Failed password for root from 211.23.61.194 port 35102 ssh2
...
2019-10-04 23:24:04
222.186.190.92 attackspambots
Oct  4 17:01:40 MK-Soft-Root1 sshd[6563]: Failed password for root from 222.186.190.92 port 48644 ssh2
Oct  4 17:01:45 MK-Soft-Root1 sshd[6563]: Failed password for root from 222.186.190.92 port 48644 ssh2
...
2019-10-04 23:13:15
207.148.102.16 attack
[portscan] Port scan
2019-10-04 22:49:06
36.66.156.125 attack
Oct  4 15:41:06 MK-Soft-VM5 sshd[1968]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=36.66.156.125 
Oct  4 15:41:09 MK-Soft-VM5 sshd[1968]: Failed password for invalid user student07 from 36.66.156.125 port 56300 ssh2
...
2019-10-04 23:09:30
122.228.165.38 attack
[munged]::80 122.228.165.38 - - [04/Oct/2019:14:26:22 +0200] "POST /[munged]: HTTP/1.1" 200 4214 "http://[munged]:/[munged]:" "Mozilla/5.0 (Windows NT 6.1; rv:60.0) Gecko/20100101 Firefox/60.0"
[munged]::80 122.228.165.38 - - [04/Oct/2019:14:26:24 +0200] "POST /[munged]: HTTP/1.1" 200 4213 "http://[munged]:/[munged]:" "Mozilla/5.0 (Windows NT 6.1; rv:60.0) Gecko/20100101 Firefox/60.0"
[munged]::80 122.228.165.38 - - [04/Oct/2019:14:26:26 +0200] "POST /[munged]: HTTP/1.1" 200 4213 "http://[munged]:/[munged]:" "Mozilla/5.0 (Windows NT 6.1; rv:60.0) Gecko/20100101 Firefox/60.0"
[munged]::80 122.228.165.38 - - [04/Oct/2019:14:26:29 +0200] "POST /[munged]: HTTP/1.1" 200 4213 "http://[munged]:/[munged]:" "Mozilla/5.0 (Windows NT 6.1; rv:60.0) Gecko/20100101 Firefox/60.0"
[munged]::80 122.228.165.38 - - [04/Oct/2019:14:26:30 +0200] "POST /[munged]: HTTP/1.1" 200 4213 "http://[munged]:/[munged]:" "Mozilla/5.0 (Windows NT 6.1; rv:60.0) Gecko/20100101 Firefox/60.0"
[munged]::80 122.228.165.38 - - [04/Oct/2019:14:26:33
2019-10-04 23:07:19
213.166.70.101 attackspambots
10/04/2019-10:54:47.324324 213.166.70.101 Protocol: 6 ET SCAN NMAP -sS window 1024
2019-10-04 22:58:00
201.240.62.70 attackspam
Oct  4 19:08:29 gw1 sshd[24302]: Failed password for root from 201.240.62.70 port 54938 ssh2
...
2019-10-04 23:16:07
167.114.18.68 attackspam
[munged]::443 167.114.18.68 - - [04/Oct/2019:14:40:37 +0200] "POST /[munged]: HTTP/1.1" 200 9079 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
[munged]::443 167.114.18.68 - - [04/Oct/2019:14:40:38 +0200] "POST /[munged]: HTTP/1.1" 200 9079 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
[munged]::443 167.114.18.68 - - [04/Oct/2019:14:40:40 +0200] "POST /[munged]: HTTP/1.1" 200 9079 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
[munged]::443 167.114.18.68 - - [04/Oct/2019:14:40:41 +0200] "POST /[munged]: HTTP/1.1" 200 9079 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
[munged]::443 167.114.18.68 - - [04/Oct/2019:14:40:43 +0200] "POST /[munged]: HTTP/1.1" 200 9079 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
[munged]::443 167.114.18.68 - - [04/Oct/2019:14:40:44 +0200] "POST /[munged]: HTTP/1.1" 200 9079 "-" "Mozilla/5.0 (X11; Ubun
2019-10-04 22:57:29
219.250.29.108 attackbotsspam
Forbidden directory scan :: 2019/10/04 22:26:57 [error] 14664#14664: *888532 access forbidden by rule, client: 219.250.29.108, server: [censored_4], request: "GET //lazyfoodreviews1.sql HTTP/1.1", host: "[censored_4]", referrer: "http://[censored_4]:80//lazyfoodreviews1.sql"
2019-10-04 22:54:26
103.71.194.252 attack
Fail2Ban - FTP Abuse Attempt
2019-10-04 23:14:30

最近上报的IP列表

14.207.207.205 14.207.207.217 14.207.207.19 14.207.207.24
14.207.207.234 14.207.207.241 14.207.207.224 14.207.207.26
14.207.207.29 14.207.207.31 14.207.207.254 14.207.207.238
14.207.207.59 14.207.207.64 14.207.207.57 14.207.207.9
14.207.207.76 14.207.207.82 14.207.207.66 14.207.207.91