必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): Thailand

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 14.207.30.144
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 53900
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;14.207.30.144.			IN	A

;; AUTHORITY SECTION:
.			596	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022022701 1800 900 604800 86400

;; Query time: 14 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Feb 28 04:14:15 CST 2022
;; MSG SIZE  rcvd: 106
HOST信息:
144.30.207.14.in-addr.arpa domain name pointer mx-ll-14.207.30-144.dynamic.3bb.co.th.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
144.30.207.14.in-addr.arpa	name = mx-ll-14.207.30-144.dynamic.3bb.co.th.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
108.161.131.247 attackbotsspam
Tries to download system config files (IIS)
Fakes user-agent
2019-09-09 16:39:53
218.56.110.203 attackbots
2019-09-09T07:28:02.960580abusebot-6.cloudsearch.cf sshd\[4408\]: Invalid user ubuntu from 218.56.110.203 port 58784
2019-09-09 16:41:36
40.117.135.57 attack
Sep  9 10:40:34 vps01 sshd[28851]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=40.117.135.57
Sep  9 10:40:36 vps01 sshd[28851]: Failed password for invalid user minecraft from 40.117.135.57 port 39724 ssh2
2019-09-09 16:47:33
104.131.248.46 attackbots
[2019-09-0906:51:58 0200]info[cpaneld]104.131.248.46-hotelgar"POST/login/\?login_only=1HTTP/1.1"FAILEDLOGINcpaneld:accessdeniedforroot\,reseller\,anduserpassword[2019-09-0906:51:59 0200]info[cpaneld]104.131.248.46-volcano"POST/login/\?login_only=1HTTP/1.1"FAILEDLOGINcpaneld:invalidcpaneluservolcano\(has_cpuser_filefailed\)[2019-09-0906:51:59 0200]info[cpaneld]104.131.248.46-ballivet"POST/login/\?login_only=1HTTP/1.1"FAILEDLOGINcpaneld:invalidcpaneluserballivet\(has_cpuser_filefailed\)[2019-09-0906:51:59 0200]info[cpaneld]104.131.248.46-hotelg"POST/login/\?login_only=1HTTP/1.1"FAILEDLOGINcpaneld:invalidcpaneluserhotelg\(has_cpuser_filefailed\)[2019-09-0906:51:59 0200]info[cpaneld]104.131.248.46-volcan"POST/login/\?login_only=1HTTP/1.1"FAILEDLOGINcpaneld:invalidcpaneluservolcan\(has_cpuser_filefailed\)[2019-09-0906:51:59 0200]info[cpaneld]104.131.248.46-balliv"POST/login/\?login_only=1HTTP/1.1"FAILEDLOGINcpaneld:invalidcpaneluserballiv\(has_cpuser_filefailed\)[2019-09-0906:51:59 0200]info[cpaneld]10
2019-09-09 16:40:09
119.84.146.239 attack
Sep  8 22:16:19 tdfoods sshd\[16343\]: Invalid user devops from 119.84.146.239
Sep  8 22:16:19 tdfoods sshd\[16343\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=119.84.146.239
Sep  8 22:16:21 tdfoods sshd\[16343\]: Failed password for invalid user devops from 119.84.146.239 port 56525 ssh2
Sep  8 22:20:24 tdfoods sshd\[16723\]: Invalid user admin from 119.84.146.239
Sep  8 22:20:24 tdfoods sshd\[16723\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=119.84.146.239
2019-09-09 16:25:46
78.187.195.16 attackspambots
Sep  9 04:36:42 system,error,critical: login failure for user admin from 78.187.195.16 via telnet
Sep  9 04:36:44 system,error,critical: login failure for user admin from 78.187.195.16 via telnet
Sep  9 04:36:46 system,error,critical: login failure for user root from 78.187.195.16 via telnet
Sep  9 04:36:49 system,error,critical: login failure for user root from 78.187.195.16 via telnet
Sep  9 04:36:51 system,error,critical: login failure for user admin from 78.187.195.16 via telnet
Sep  9 04:36:52 system,error,critical: login failure for user admin from 78.187.195.16 via telnet
Sep  9 04:36:56 system,error,critical: login failure for user root from 78.187.195.16 via telnet
Sep  9 04:36:58 system,error,critical: login failure for user root from 78.187.195.16 via telnet
Sep  9 04:36:59 system,error,critical: login failure for user admin from 78.187.195.16 via telnet
Sep  9 04:37:03 system,error,critical: login failure for user guest from 78.187.195.16 via telnet
2019-09-09 16:34:35
144.217.4.14 attack
Sep  9 09:56:29 XXX sshd[39800]: Invalid user ofsaa from 144.217.4.14 port 35922
2019-09-09 16:20:33
193.112.145.125 attack
Sep  9 02:55:00 vtv3 sshd\[30486\]: Invalid user deploy from 193.112.145.125 port 47772
Sep  9 02:55:00 vtv3 sshd\[30486\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=193.112.145.125
Sep  9 02:55:03 vtv3 sshd\[30486\]: Failed password for invalid user deploy from 193.112.145.125 port 47772 ssh2
Sep  9 03:01:17 vtv3 sshd\[1434\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=193.112.145.125  user=root
Sep  9 03:01:19 vtv3 sshd\[1434\]: Failed password for root from 193.112.145.125 port 44862 ssh2
Sep  9 03:54:06 vtv3 sshd\[27061\]: Invalid user test from 193.112.145.125 port 52984
Sep  9 03:54:06 vtv3 sshd\[27061\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=193.112.145.125
Sep  9 03:54:07 vtv3 sshd\[27061\]: Failed password for invalid user test from 193.112.145.125 port 52984 ssh2
Sep  9 04:00:25 vtv3 sshd\[30564\]: Invalid user oracle from 193.112.145.125 port 52662
Se
2019-09-09 16:00:56
183.129.160.229 attack
" "
2019-09-09 16:29:02
188.166.251.87 attack
Sep  9 11:25:44 yabzik sshd[5592]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.166.251.87
Sep  9 11:25:45 yabzik sshd[5592]: Failed password for invalid user luser from 188.166.251.87 port 59739 ssh2
Sep  9 11:32:50 yabzik sshd[8168]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.166.251.87
2019-09-09 16:33:00
165.227.60.103 attackbotsspam
Sep  8 21:53:44 hcbb sshd\[25334\]: Invalid user demo from 165.227.60.103
Sep  8 21:53:44 hcbb sshd\[25334\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.227.60.103
Sep  8 21:53:46 hcbb sshd\[25334\]: Failed password for invalid user demo from 165.227.60.103 port 47476 ssh2
Sep  8 21:59:37 hcbb sshd\[25902\]: Invalid user chris from 165.227.60.103
Sep  8 21:59:37 hcbb sshd\[25902\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.227.60.103
2019-09-09 16:18:22
168.194.140.130 attackbots
Sep  9 10:34:40 vps01 sshd[28664]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=168.194.140.130
Sep  9 10:34:42 vps01 sshd[28664]: Failed password for invalid user 123456 from 168.194.140.130 port 38926 ssh2
2019-09-09 16:43:55
188.166.158.153 attackbotsspam
WordPress XMLRPC scan :: 188.166.158.153 0.044 BYPASS [09/Sep/2019:14:37:23  1000] [censored_2] "POST /xmlrpc.php HTTP/1.1" 200 413 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
2019-09-09 16:22:57
13.94.57.155 attack
2019-09-09T12:59:17.258310enmeeting.mahidol.ac.th sshd\[12156\]: Invalid user ts3 from 13.94.57.155 port 54388
2019-09-09T12:59:17.271362enmeeting.mahidol.ac.th sshd\[12156\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=13.94.57.155
2019-09-09T12:59:19.114756enmeeting.mahidol.ac.th sshd\[12156\]: Failed password for invalid user ts3 from 13.94.57.155 port 54388 ssh2
...
2019-09-09 16:12:12
150.95.212.72 attackbotsspam
Sep  9 09:45:40 ArkNodeAT sshd\[27956\]: Invalid user testing from 150.95.212.72
Sep  9 09:45:40 ArkNodeAT sshd\[27956\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=150.95.212.72
Sep  9 09:45:43 ArkNodeAT sshd\[27956\]: Failed password for invalid user testing from 150.95.212.72 port 47216 ssh2
2019-09-09 16:17:44

最近上报的IP列表

14.207.30.140 14.207.30.164 14.207.30.16 14.207.30.170
14.207.30.18 14.207.30.181 14.207.30.189 14.207.30.191
14.207.30.194 14.207.30.196 14.207.30.198 14.207.30.20
14.207.30.201 14.207.30.202 14.207.30.205 14.207.38.62
14.207.38.71 14.207.38.82 14.207.38.90 14.207.38.84