必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): None

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
IP 类型 评论内容 时间
14.207.207.181 attackspam
Unauthorized connection attempt from IP address 14.207.207.181 on Port 445(SMB)
2020-08-21 03:40:37
14.207.207.191 attackbotsspam
May 11 13:47:03 vbuntu sshd[29020]: warning: /etc/hosts.allow, line 11: can't verify hostname: getaddrinfo(mx-ll-14.207.207-191.dynamic.3bb.in.th, AF_INET) failed
May 11 13:47:03 vbuntu sshd[29020]: refused connect from 14.207.207.191 (14.207.207.191)
May 11 13:47:05 vbuntu sshd[29026]: warning: /etc/hosts.allow, line 11: can't verify hostname: getaddrinfo(mx-ll-14.207.207-191.dynamic.3bb.in.th, AF_INET) failed
May 11 13:47:05 vbuntu sshd[29026]: refused connect from 14.207.207.191 (14.207.207.191)


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=14.207.207.191
2020-05-12 01:21:04
14.207.207.49 attack
Attempt to attack host OS, exploiting network vulnerabilities, on 18-12-2019 14:35:09.
2019-12-19 01:32:25
14.207.207.12 attackspambots
IP Ban Report :  
 https://help-dysk.pl/wordpress-firewall-plugins/ip/14.207.207.12/ 
 
 TH - 1H : (18)  
 Protection Against DDoS WordPress plugin :  
 "odzyskiwanie danych help-dysk" 
 IP Address Ranges by Country : TH 
 NAME ASN : ASN45758 
 
 IP : 14.207.207.12 
 
 CIDR : 14.207.0.0/16 
 
 PREFIX COUNT : 64 
 
 UNIQUE IP COUNT : 1069568 
 
 
 ATTACKS DETECTED ASN45758 :  
  1H - 1 
  3H - 2 
  6H - 2 
 12H - 2 
 24H - 6 
 
 DateTime : 2019-11-05 07:28:48 
 
 INFO : Server 403 - Looking for resource vulnerabilities Detected and Blocked by ADMIN  - data recovery
2019-11-05 15:55:47
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 14.207.207.24
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 32879
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;14.207.207.24.			IN	A

;; AUTHORITY SECTION:
.			595	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022022700 1800 900 604800 86400

;; Query time: 72 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Feb 27 13:30:07 CST 2022
;; MSG SIZE  rcvd: 106
HOST信息:
24.207.207.14.in-addr.arpa domain name pointer mx-ll-14.207.207-24.dynamic.3bb.co.th.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
24.207.207.14.in-addr.arpa	name = mx-ll-14.207.207-24.dynamic.3bb.co.th.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
185.175.93.3 attack
10/07/2019-15:53:38.598471 185.175.93.3 Protocol: 6 ET DROP Dshield Block Listed Source group 1
2019-10-08 04:18:14
2.186.241.187 attackspam
Automatic report - Port Scan Attack
2019-10-08 04:21:28
2.136.131.36 attackspambots
2019-10-07T20:23:56.220326abusebot-5.cloudsearch.cf sshd\[26041\]: Invalid user team from 2.136.131.36 port 53464
2019-10-08 04:24:38
193.70.2.117 attackspam
Oct  7 22:11:25 SilenceServices sshd[6341]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=193.70.2.117
Oct  7 22:11:27 SilenceServices sshd[6341]: Failed password for invalid user Roland@2017 from 193.70.2.117 port 37666 ssh2
Oct  7 22:14:56 SilenceServices sshd[7235]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=193.70.2.117
2019-10-08 04:15:41
222.186.175.212 attack
Oct  7 16:01:01 debian sshd\[16618\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.175.212  user=root
Oct  7 16:01:03 debian sshd\[16618\]: Failed password for root from 222.186.175.212 port 33628 ssh2
Oct  7 16:01:07 debian sshd\[16618\]: Failed password for root from 222.186.175.212 port 33628 ssh2
...
2019-10-08 04:05:25
41.159.18.20 attackbotsspam
Oct  7 19:49:27 hcbbdb sshd\[21847\]: Invalid user debian123!@\# from 41.159.18.20
Oct  7 19:49:27 hcbbdb sshd\[21847\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=41.159.18.20
Oct  7 19:49:28 hcbbdb sshd\[21847\]: Failed password for invalid user debian123!@\# from 41.159.18.20 port 49601 ssh2
Oct  7 19:53:48 hcbbdb sshd\[22327\]: Invalid user Killer@2017 from 41.159.18.20
Oct  7 19:53:48 hcbbdb sshd\[22327\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=41.159.18.20
2019-10-08 04:10:39
212.129.35.106 attackbotsspam
2019-10-07T16:05:25.8699321495-001 sshd\[63375\]: Failed password for invalid user Fast@2017 from 212.129.35.106 port 37299 ssh2
2019-10-07T16:17:23.1963401495-001 sshd\[64311\]: Invalid user P@$$w0rd@2020 from 212.129.35.106 port 43280
2019-10-07T16:17:23.2045541495-001 sshd\[64311\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=212.129.35.106
2019-10-07T16:17:25.5378371495-001 sshd\[64311\]: Failed password for invalid user P@$$w0rd@2020 from 212.129.35.106 port 43280 ssh2
2019-10-07T16:21:28.1484151495-001 sshd\[64588\]: Invalid user Debut from 212.129.35.106 port 35897
2019-10-07T16:21:28.1514151495-001 sshd\[64588\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=212.129.35.106
...
2019-10-08 04:41:05
49.88.112.74 attackspambots
Oct  7 21:53:06 MK-Soft-VM4 sshd[5452]: Failed password for root from 49.88.112.74 port 47264 ssh2
Oct  7 21:53:08 MK-Soft-VM4 sshd[5452]: Failed password for root from 49.88.112.74 port 47264 ssh2
...
2019-10-08 04:35:43
14.29.162.139 attack
2019-10-07T23:03:47.608175tmaserv sshd\[15912\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=14.29.162.139  user=root
2019-10-07T23:03:49.252991tmaserv sshd\[15912\]: Failed password for root from 14.29.162.139 port 49903 ssh2
2019-10-07T23:07:27.640622tmaserv sshd\[16076\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=14.29.162.139  user=root
2019-10-07T23:07:29.486004tmaserv sshd\[16076\]: Failed password for root from 14.29.162.139 port 26240 ssh2
2019-10-07T23:11:15.928499tmaserv sshd\[16255\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=14.29.162.139  user=root
2019-10-07T23:11:18.411608tmaserv sshd\[16255\]: Failed password for root from 14.29.162.139 port 59088 ssh2
...
2019-10-08 04:26:44
182.61.166.148 attackspambots
Oct  7 09:32:50 srv05 sshd[20525]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.61.166.148  user=r.r
Oct  7 09:32:51 srv05 sshd[20525]: Failed password for r.r from 182.61.166.148 port 57038 ssh2
Oct  7 09:32:52 srv05 sshd[20525]: Received disconnect from 182.61.166.148: 11: Bye Bye [preauth]
Oct  7 09:55:34 srv05 sshd[21834]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.61.166.148  user=r.r
Oct  7 09:55:35 srv05 sshd[21834]: Failed password for r.r from 182.61.166.148 port 55422 ssh2
Oct  7 09:55:36 srv05 sshd[21834]: Received disconnect from 182.61.166.148: 11: Bye Bye [preauth]
Oct  7 09:59:53 srv05 sshd[22017]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.61.166.148  user=r.r
Oct  7 09:59:55 srv05 sshd[22017]: Failed password for r.r from 182.61.166.148 port 40102 ssh2
Oct  7 09:59:55 srv05 sshd[22017]: Received disconnect from........
-------------------------------
2019-10-08 04:22:31
14.189.75.169 attackbots
Lines containing failures of 14.189.75.169
Oct  7 02:38:16 shared11 sshd[14036]: Invalid user admin from 14.189.75.169 port 32868
Oct  7 02:38:16 shared11 sshd[14036]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=14.189.75.169
Oct  7 02:38:18 shared11 sshd[14036]: Failed password for invalid user admin from 14.189.75.169 port 32868 ssh2
Oct  7 02:38:19 shared11 sshd[14036]: Connection closed by invalid user admin 14.189.75.169 port 32868 [preauth]


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=14.189.75.169
2019-10-08 04:06:44
188.171.40.60 attack
Oct  7 22:36:11 meumeu sshd[27297]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.171.40.60 
Oct  7 22:36:13 meumeu sshd[27297]: Failed password for invalid user Amadeus_123 from 188.171.40.60 port 46030 ssh2
Oct  7 22:40:09 meumeu sshd[28142]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.171.40.60 
...
2019-10-08 04:41:52
185.36.81.230 attackspambots
Oct  7 18:00:09 heicom postfix/smtpd\[1868\]: warning: unknown\[185.36.81.230\]: SASL LOGIN authentication failed: authentication failure
Oct  7 18:28:34 heicom postfix/smtpd\[1872\]: warning: unknown\[185.36.81.230\]: SASL LOGIN authentication failed: authentication failure
Oct  7 18:57:02 heicom postfix/smtpd\[5255\]: warning: unknown\[185.36.81.230\]: SASL LOGIN authentication failed: authentication failure
Oct  7 19:25:32 heicom postfix/smtpd\[6934\]: warning: unknown\[185.36.81.230\]: SASL LOGIN authentication failed: authentication failure
Oct  7 19:53:44 heicom postfix/smtpd\[8132\]: warning: unknown\[185.36.81.230\]: SASL LOGIN authentication failed: authentication failure
...
2019-10-08 04:13:15
103.80.117.214 attackspam
2019-10-07T19:49:44.245705shield sshd\[29553\]: Invalid user 4rfv3edc2wsx from 103.80.117.214 port 43664
2019-10-07T19:49:44.251288shield sshd\[29553\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.80.117.214
2019-10-07T19:49:46.167664shield sshd\[29553\]: Failed password for invalid user 4rfv3edc2wsx from 103.80.117.214 port 43664 ssh2
2019-10-07T19:53:46.364947shield sshd\[30366\]: Invalid user P4\$\$2019 from 103.80.117.214 port 55414
2019-10-07T19:53:46.369597shield sshd\[30366\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.80.117.214
2019-10-08 04:11:52
50.62.177.171 attack
xmlrpc attack
2019-10-08 04:32:19

最近上报的IP列表

14.207.207.19 14.207.207.234 14.207.207.241 14.207.207.224
14.207.207.26 14.207.207.29 14.207.207.31 14.207.207.254
14.207.207.238 14.207.207.59 14.207.207.64 14.207.207.57
14.207.207.9 14.207.207.76 14.207.207.82 14.207.207.66
14.207.207.91 14.207.21.118 14.207.21.144 14.207.21.149