必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): Thailand

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
IP 类型 评论内容 时间
14.207.240.189 attack
Honeypot attack, port: 445, PTR: mx-ll-14.207.240-189.dynamic.3bb.in.th.
2020-03-24 16:11:16
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 14.207.240.139
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 60152
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;14.207.240.139.			IN	A

;; AUTHORITY SECTION:
.			338	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022030803 1800 900 604800 86400

;; Query time: 19 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Mar 09 08:52:59 CST 2022
;; MSG SIZE  rcvd: 107
HOST信息:
139.240.207.14.in-addr.arpa domain name pointer mx-ll-14.207.240-139.dynamic.3bb.in.th.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
139.240.207.14.in-addr.arpa	name = mx-ll-14.207.240-139.dynamic.3bb.in.th.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
92.222.71.125 attackspambots
Sep  8 16:08:08 web1 sshd\[20999\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=92.222.71.125  user=root
Sep  8 16:08:10 web1 sshd\[20999\]: Failed password for root from 92.222.71.125 port 34430 ssh2
Sep  8 16:13:58 web1 sshd\[21582\]: Invalid user vnc from 92.222.71.125
Sep  8 16:13:58 web1 sshd\[21582\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=92.222.71.125
Sep  8 16:14:00 web1 sshd\[21582\]: Failed password for invalid user vnc from 92.222.71.125 port 39678 ssh2
2019-09-09 10:25:46
106.248.41.245 attackbots
Sep  9 02:41:18 MK-Soft-VM7 sshd\[701\]: Invalid user oracle from 106.248.41.245 port 58850
Sep  9 02:41:18 MK-Soft-VM7 sshd\[701\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.248.41.245
Sep  9 02:41:20 MK-Soft-VM7 sshd\[701\]: Failed password for invalid user oracle from 106.248.41.245 port 58850 ssh2
...
2019-09-09 10:44:21
180.182.228.200 attackbotsspam
26604/udp 8080/tcp
[2019-08-27/09-08]2pkt
2019-09-09 10:47:01
220.181.108.119 attack
Automatic report - Banned IP Access
2019-09-09 10:37:21
110.76.149.22 attackbotsspam
Brute force attempt
2019-09-09 10:05:05
139.199.228.133 attackbotsspam
Sep  9 01:54:08 SilenceServices sshd[9633]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.199.228.133
Sep  9 01:54:10 SilenceServices sshd[9633]: Failed password for invalid user 123456 from 139.199.228.133 port 63457 ssh2
Sep  9 01:57:18 SilenceServices sshd[11930]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.199.228.133
2019-09-09 10:30:17
210.212.194.113 attackspam
Sep  9 03:58:21 dedicated sshd[25851]: Invalid user admin from 210.212.194.113 port 41630
2019-09-09 10:04:31
115.159.220.190 attackbots
2019-09-08T21:31:02.575378abusebot-8.cloudsearch.cf sshd\[10695\]: Invalid user admin from 115.159.220.190 port 55490
2019-09-09 10:00:38
200.70.56.204 attackspambots
Sep  9 05:14:19 www sshd\[4825\]: Invalid user user6 from 200.70.56.204Sep  9 05:14:21 www sshd\[4825\]: Failed password for invalid user user6 from 200.70.56.204 port 56528 ssh2Sep  9 05:22:47 www sshd\[5158\]: Invalid user tsbot from 200.70.56.204
...
2019-09-09 10:27:31
81.177.33.4 attackspam
WordPress wp-login brute force :: 81.177.33.4 0.140 BYPASS [09/Sep/2019:11:31:05  1000] [censored_1] "POST /wp-login.php HTTP/1.1" 200 3972 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
2019-09-09 09:58:36
189.244.51.19 attackbotsspam
port scan/probe/communication attempt
2019-09-09 10:25:17
95.179.127.225 attack
Brute force RDP, port 3389
2019-09-09 10:38:04
58.215.121.36 attackspambots
SSH Brute Force, server-1 sshd[28154]: Failed password for invalid user test from 58.215.121.36 port 56838 ssh2
2019-09-09 10:01:13
37.119.230.22 attack
Sep  8 21:49:38 plusreed sshd[27879]: Invalid user teamspeak3 from 37.119.230.22
...
2019-09-09 10:08:20
217.160.15.228 attackbots
Sep  8 16:39:42 friendsofhawaii sshd\[10843\]: Invalid user admin from 217.160.15.228
Sep  8 16:39:42 friendsofhawaii sshd\[10843\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=217.160.15.228
Sep  8 16:39:44 friendsofhawaii sshd\[10843\]: Failed password for invalid user admin from 217.160.15.228 port 49713 ssh2
Sep  8 16:45:15 friendsofhawaii sshd\[11314\]: Invalid user teamspeak from 217.160.15.228
Sep  8 16:45:15 friendsofhawaii sshd\[11314\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=217.160.15.228
2019-09-09 10:49:52

最近上报的IP列表

14.207.240.154 14.207.240.187 118.41.204.68 14.207.240.217
14.207.240.229 14.207.240.59 14.207.241.150 14.207.241.154
14.207.241.73 14.207.241.104 14.207.240.98 14.207.242.102
14.207.240.247 14.207.242.105 14.207.240.92 118.41.216.112
14.207.242.192 14.207.242.120 14.207.245.62 14.207.242.211