必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): Thailand

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 14.207.208.191
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 32275
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;14.207.208.191.			IN	A

;; AUTHORITY SECTION:
.			219	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022022700 1800 900 604800 86400

;; Query time: 74 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Feb 27 17:55:03 CST 2022
;; MSG SIZE  rcvd: 107
HOST信息:
191.208.207.14.in-addr.arpa domain name pointer mx-ll-14.207.208-191.dynamic.3bb.co.th.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
191.208.207.14.in-addr.arpa	name = mx-ll-14.207.208-191.dynamic.3bb.co.th.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
59.12.225.55 attackbotsspam
Honeypot attack, port: 5555, PTR: PTR record not found
2020-02-26 16:37:09
220.134.123.230 attack
Telnet Server BruteForce Attack
2020-02-26 16:29:53
49.51.161.145 attackspambots
unauthorized connection attempt
2020-02-26 16:37:26
159.65.174.81 attackbotsspam
Feb 26 07:51:29 debian-2gb-nbg1-2 kernel: \[4959085.817257\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=159.65.174.81 DST=195.201.40.59 LEN=40 TOS=0x00 PREC=0x00 TTL=244 ID=16402 PROTO=TCP SPT=43150 DPT=8500 WINDOW=1024 RES=0x00 SYN URGP=0
2020-02-26 16:56:38
14.249.124.241 attackbotsspam
unauthorized connection attempt
2020-02-26 16:18:21
42.247.5.95 attackbots
Feb 26 06:31:38 debian-2gb-nbg1-2 kernel: \[4954295.571976\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=42.247.5.95 DST=195.201.40.59 LEN=40 TOS=0x00 PREC=0x00 TTL=230 ID=22462 PROTO=TCP SPT=49139 DPT=1433 WINDOW=1024 RES=0x00 SYN URGP=0
2020-02-26 16:49:04
177.106.6.103 attackbots
unauthorized connection attempt
2020-02-26 16:55:15
93.86.60.152 attackbotsspam
[ER hit] Tried to deliver spam. Already well known.
2020-02-26 16:35:08
1.1.230.155 attack
unauthorized connection attempt
2020-02-26 16:39:51
40.107.94.114 spam
MARRE de ces SOUS MERDES de POLLUEURS à répétition qui, TOUS LES JOURS, balancent des POURRIELS pour du CUL / SEXE via les ORDURES de BlogSpot INCAPABLES de gérer leur système ! ! !
Adresses courriel "nav.dosanjh@yahoo.ca", "brandy@prestigecruises.com" and "kimsaholmes@yahoo.co.uk", Lien et Web Site "blogspot" to BURN / CLOSE / DELETTE / STOP IMMEDIATELY !
brandy@prestigecruises.com => 40.107.94.114 which send to : 
https://search4secondhalflove.blogspot.com
https://www.mywot.com/scorecard/blogspot.com
Message-ID: <869e38e3e8c316e5c63553000bdfe2be9dc8fc1e87@prestigecruises.com>
Reply-To: Kaitlyn 
From: Kaitlyn 
To: kimsaholmes@yahoo.co.uk
https://en.asytech.cn/check-ip/40.107.94.114
2020-02-26 16:42:28
80.241.209.42 attack
unauthorized connection attempt
2020-02-26 16:46:56
110.35.47.41 attackbotsspam
unauthorized connection attempt
2020-02-26 16:34:25
94.224.245.119 attack
unauthorized connection attempt
2020-02-26 16:44:57
195.28.184.154 attackbots
unauthorized connection attempt
2020-02-26 16:20:32
122.54.25.155 attackbotsspam
unauthorized connection attempt
2020-02-26 17:00:18

最近上报的IP列表

14.207.208.183 14.207.208.184 14.207.208.198 14.207.208.202
154.179.251.249 14.207.212.86 14.207.212.42 14.207.213.112
14.207.213.12 14.207.212.80 14.207.213.159 14.207.212.57
14.207.213.169 14.207.22.202 14.207.22.204 14.207.213.155
14.207.22.201 14.207.22.217 29.174.98.199 14.207.22.225