必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): Thailand

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
IP 类型 评论内容 时间
14.207.3.189 attackbotsspam
Chat Spam
2019-09-16 15:40:50
14.207.32.51 attackspam
Unauthorized connection attempt from IP address 14.207.32.51 on Port 445(SMB)
2019-07-22 17:10:07
14.207.34.186 attackspam
Unauthorized connection attempt from IP address 14.207.34.186 on Port 445(SMB)
2019-07-13 03:53:11
14.207.31.183 attackbots
Automatic report - SSH Brute-Force Attack
2019-07-05 09:07:24
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 14.207.3.55
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 57969
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;14.207.3.55.			IN	A

;; AUTHORITY SECTION:
.			158	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022022700 1800 900 604800 86400

;; Query time: 72 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Feb 27 13:34:48 CST 2022
;; MSG SIZE  rcvd: 104
HOST信息:
55.3.207.14.in-addr.arpa domain name pointer mx-ll-14.207.3-55.dynamic.3bb.co.th.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
55.3.207.14.in-addr.arpa	name = mx-ll-14.207.3-55.dynamic.3bb.co.th.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
106.13.131.4 attackbots
Nov 13 20:56:51 auw2 sshd\[11219\]: Invalid user apache from 106.13.131.4
Nov 13 20:56:51 auw2 sshd\[11219\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.131.4
Nov 13 20:56:53 auw2 sshd\[11219\]: Failed password for invalid user apache from 106.13.131.4 port 39928 ssh2
Nov 13 21:02:17 auw2 sshd\[11633\]: Invalid user server from 106.13.131.4
Nov 13 21:02:17 auw2 sshd\[11633\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.131.4
2019-11-14 15:29:22
94.191.47.204 attackspam
2019-11-14T07:03:03.361385abusebot-4.cloudsearch.cf sshd\[1668\]: Invalid user zizi from 94.191.47.204 port 56154
2019-11-14 15:18:41
45.82.153.133 attackspambots
Nov 14 08:18:20 relay postfix/smtpd\[25629\]: warning: unknown\[45.82.153.133\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Nov 14 08:18:43 relay postfix/smtpd\[1203\]: warning: unknown\[45.82.153.133\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Nov 14 08:19:56 relay postfix/smtpd\[7214\]: warning: unknown\[45.82.153.133\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Nov 14 08:20:14 relay postfix/smtpd\[2343\]: warning: unknown\[45.82.153.133\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Nov 14 08:20:29 relay postfix/smtpd\[25833\]: warning: unknown\[45.82.153.133\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
...
2019-11-14 15:26:52
167.71.175.204 attackbotsspam
167.71.175.204 - - [14/Nov/2019:07:30:24 +0100] "POST /wp-login.php HTTP/1.1" 200 3123 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
167.71.175.204 - - [14/Nov/2019:07:30:30 +0100] "POST /wp-login.php HTTP/1.1" 200 3102 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
...
2019-11-14 15:07:45
62.80.164.18 attackbotsspam
Lines containing failures of 62.80.164.18
Nov 14 01:58:33 smtp-out sshd[20415]: Invalid user chesney from 62.80.164.18 port 57228
Nov 14 01:58:33 smtp-out sshd[20415]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=62.80.164.18 
Nov 14 01:58:35 smtp-out sshd[20415]: Failed password for invalid user chesney from 62.80.164.18 port 57228 ssh2
Nov 14 01:58:36 smtp-out sshd[20415]: Received disconnect from 62.80.164.18 port 57228:11: Bye Bye [preauth]
Nov 14 01:58:36 smtp-out sshd[20415]: Disconnected from invalid user chesney 62.80.164.18 port 57228 [preauth]
Nov 14 02:12:21 smtp-out sshd[20883]: Invalid user web from 62.80.164.18 port 48120
Nov 14 02:12:21 smtp-out sshd[20883]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=62.80.164.18 
Nov 14 02:12:23 smtp-out sshd[20883]: Failed password for invalid user web from 62.80.164.18 port 48120 ssh2
Nov 14 02:12:24 smtp-out sshd[20883]: Received di........
------------------------------
2019-11-14 15:19:53
185.61.148.221 attackbotsspam
Lines containing failures of 185.61.148.221
Nov 14 05:35:21 zabbix sshd[65133]: Invalid user dhe from 185.61.148.221 port 40564
Nov 14 05:35:21 zabbix sshd[65133]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=185.61.148.221
Nov 14 05:35:23 zabbix sshd[65133]: Failed password for invalid user dhe from 185.61.148.221 port 40564 ssh2
Nov 14 05:35:23 zabbix sshd[65133]: Received disconnect from 185.61.148.221 port 40564:11: Bye Bye [preauth]
Nov 14 05:35:23 zabbix sshd[65133]: Disconnected from invalid user dhe 185.61.148.221 port 40564 [preauth]
Nov 14 05:51:56 zabbix sshd[66266]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=185.61.148.221  user=r.r
Nov 14 05:51:59 zabbix sshd[66266]: Failed password for r.r from 185.61.148.221 port 51178 ssh2
Nov 14 05:51:59 zabbix sshd[66266]: Received disconnect from 185.61.148.221 port 51178:11: Bye Bye [preauth]
Nov 14 05:51:59 zabbix sshd[66266]: Dis........
------------------------------
2019-11-14 15:25:01
37.49.227.109 attackspambots
UTC: 2019-11-13 port: 623/udp
2019-11-14 15:26:00
188.163.40.78 attack
Automatic report - Port Scan
2019-11-14 15:38:55
101.228.121.231 bots
Login attempts on Synology Nas
2019-11-14 15:26:33
41.37.69.250 attackbots
failed_logins
2019-11-14 15:27:20
149.129.251.229 attackspam
Nov 14 02:20:59 TORMINT sshd\[19322\]: Invalid user ftpuser from 149.129.251.229
Nov 14 02:20:59 TORMINT sshd\[19322\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=149.129.251.229
Nov 14 02:21:02 TORMINT sshd\[19322\]: Failed password for invalid user ftpuser from 149.129.251.229 port 43732 ssh2
...
2019-11-14 15:21:23
193.200.173.160 attack
Nov 14 08:22:40 pkdns2 sshd\[38051\]: Invalid user horus from 193.200.173.160Nov 14 08:22:42 pkdns2 sshd\[38051\]: Failed password for invalid user horus from 193.200.173.160 port 35978 ssh2Nov 14 08:26:21 pkdns2 sshd\[38238\]: Invalid user 01234 from 193.200.173.160Nov 14 08:26:24 pkdns2 sshd\[38238\]: Failed password for invalid user 01234 from 193.200.173.160 port 54150 ssh2Nov 14 08:30:06 pkdns2 sshd\[38390\]: Invalid user rittik from 193.200.173.160Nov 14 08:30:08 pkdns2 sshd\[38390\]: Failed password for invalid user rittik from 193.200.173.160 port 44078 ssh2
...
2019-11-14 15:04:40
1.175.117.34 attackbotsspam
IP Ban Report :  
 https://help-dysk.pl/wordpress-firewall-plugins/ip/1.175.117.34/ 
 
 TW - 1H : (304)  
 Protection Against DDoS WordPress plugin :  
 "odzyskiwanie danych help-dysk" 
 IP Address Ranges by Country : TW 
 NAME ASN : ASN3462 
 
 IP : 1.175.117.34 
 
 CIDR : 1.175.0.0/16 
 
 PREFIX COUNT : 390 
 
 UNIQUE IP COUNT : 12267520 
 
 
 ATTACKS DETECTED ASN3462 :  
  1H - 8 
  3H - 26 
  6H - 70 
 12H - 168 
 24H - 282 
 
 DateTime : 2019-11-14 07:29:29 
 
 INFO : Port Scan TELNET Detected and Blocked by ADMIN  - data recovery
2019-11-14 15:41:14
1.201.140.126 attackbots
Nov 13 21:18:10 eddieflores sshd\[18879\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=1.201.140.126  user=root
Nov 13 21:18:12 eddieflores sshd\[18879\]: Failed password for root from 1.201.140.126 port 58272 ssh2
Nov 13 21:22:41 eddieflores sshd\[19212\]: Invalid user innchyn from 1.201.140.126
Nov 13 21:22:41 eddieflores sshd\[19212\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=1.201.140.126
Nov 13 21:22:43 eddieflores sshd\[19212\]: Failed password for invalid user innchyn from 1.201.140.126 port 48831 ssh2
2019-11-14 15:28:14
45.136.109.95 attackspambots
Portscan or hack attempt detected by psad/fwsnort
2019-11-14 15:32:55

最近上报的IP列表

14.207.3.66 14.207.3.72 14.207.3.7 14.207.30.94
14.207.31.109 14.207.31.113 14.207.31.12 14.207.31.118
14.207.31.127 14.207.31.116 14.207.31.122 14.207.31.104
14.207.31.124 14.207.31.106 14.207.30.96 14.207.31.135
14.207.31.133 14.207.31.131 14.207.31.14 14.207.31.142