必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): Thailand

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
IP 类型 评论内容 时间
14.207.43.165 attackspambots
 TCP (SYN) 14.207.43.165:6483 -> port 2323, len 44
2020-09-11 01:57:02
14.207.43.165 attack
Telnet/23 MH Probe, Scan, BF, Hack -
2020-09-10 17:18:54
14.207.43.165 attackbotsspam
SP-Scan 6227:23 detected 2020.09.09 11:04:53
blocked until 2020.10.29 03:07:40
2020-09-10 07:52:06
14.207.44.88 attackbotsspam
Sql/code injection probe
2020-06-25 07:37:18
14.207.46.220 attack
1586436916 - 04/09/2020 14:55:16 Host: 14.207.46.220/14.207.46.220 Port: 445 TCP Blocked
2020-04-10 05:54:40
14.207.43.158 attackspam
Unauthorized connection attempt from IP address 14.207.43.158 on Port 445(SMB)
2020-04-01 19:49:21
14.207.43.232 attackbots
1584434416 - 03/17/2020 09:40:16 Host: 14.207.43.232/14.207.43.232 Port: 445 TCP Blocked
2020-03-18 00:54:51
14.207.46.177 attackbotsspam
2020-03-1304:53:091jCbNk-0003DA-Dj\<=info@whatsup2013.chH=\(localhost\)[14.207.46.177]:41254P=esmtpsaX=TLS1.2:ECDHE-RSA-AES256-GCM-SHA384:256CV=noA=dovecot_login:info@whatsup2013.chS=2402id=181DABF8F32709BA66632A92665F8666@whatsup2013.chT="fromDarya"forwarmnightswithyou@protonmail.comsulaiman.ay145212@gmail.com2020-03-1304:52:341jCbNB-0003Al-E5\<=info@whatsup2013.chH=\(localhost\)[113.172.223.107]:48066P=esmtpsaX=TLS1.2:ECDHE-RSA-AES256-GCM-SHA384:256CV=noA=dovecot_login:info@whatsup2013.chS=2396id=6164D2818A5E70C31F1A53EB1F2C114A@whatsup2013.chT="fromDarya"fordonehadenough@gmail.comxavior.j.suarez.52511@gmail.com2020-03-1304:53:221jCbNx-0003EM-SB\<=info@whatsup2013.chH=\(localhost\)[14.186.226.226]:49779P=esmtpsaX=TLS1.2:ECDHE-RSA-AES256-GCM-SHA384:256CV=noA=dovecot_login:info@whatsup2013.chS=2428id=F2F7411219CDE3508C89C0788CE75291@whatsup2013.chT="fromDarya"forjoseph_b55@yahoo.comakiff786@icloud.com2020-03-1304:52:311jCbMi-00039A-R1\<=info@whatsup2013.chH=\(localhost\)[197.251.224.136]:55287P=esmtpsaX
2020-03-13 15:29:29
14.207.41.233 attack
Attacks websites by trying to access known vulnerables of plugins, brute-force of backends or probing of administrative tools
2020-01-31 14:26:04
14.207.41.149 attackbots
Unauthorized connection attempt from IP address 14.207.41.149 on Port 445(SMB)
2020-01-24 06:15:01
14.207.41.9 attack
Invalid user admin from 14.207.41.9 port 51850
2020-01-19 02:52:58
14.207.41.9 attackspam
Invalid user admin from 14.207.41.9 port 51850
2020-01-18 04:48:57
14.207.42.89 attackspambots
2019-12-29 23:48:56 plain_virtual_exim authenticator failed for mx-ll-14.207.42-89.dynamic.3bb.co.th ([127.0.0.1]) [14.207.42.89]: 535 Incorrect authentication data


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=14.207.42.89
2019-12-30 08:21:41
14.207.40.232 attackbots
1577041415 - 12/22/2019 20:03:35 Host: 14.207.40.232/14.207.40.232 Port: 445 TCP Blocked
2019-12-23 05:17:55
14.207.42.142 attack
Lines containing failures of 14.207.42.142
2019-11-04 x@x


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=14.207.42.142
2019-11-05 06:48:58
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 14.207.4.214
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 39724
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;14.207.4.214.			IN	A

;; AUTHORITY SECTION:
.			600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022022700 1800 900 604800 86400

;; Query time: 72 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Feb 27 13:36:25 CST 2022
;; MSG SIZE  rcvd: 105
HOST信息:
214.4.207.14.in-addr.arpa domain name pointer mx-ll-14.207.4-214.dynamic.3bb.co.th.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
214.4.207.14.in-addr.arpa	name = mx-ll-14.207.4-214.dynamic.3bb.co.th.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
201.159.52.237 attack
libpam_shield report: forced login attempt
2019-06-26 05:26:34
190.10.8.97 attackbotsspam
445/tcp 445/tcp 445/tcp...
[2019-05-12/06-25]8pkt,1pt.(tcp)
2019-06-26 05:21:41
222.180.100.198 attackspambots
failed_logins
2019-06-26 05:14:12
51.81.7.250 attack
Imap
2019-06-26 05:23:00
218.22.98.178 attackspam
imap. Unknown user
2019-06-26 05:09:05
163.172.54.52 attackbotsspam
miraniessen.de 163.172.54.52 \[25/Jun/2019:22:23:17 +0200\] "POST /wp-login.php HTTP/1.1" 200 5972 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0"
miraniessen.de 163.172.54.52 \[25/Jun/2019:22:23:18 +0200\] "POST /wp-login.php HTTP/1.1" 200 5976 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0"
2019-06-26 04:52:54
151.80.140.13 attack
Jun 25 23:00:17 localhost sshd\[6451\]: Invalid user jenkins from 151.80.140.13 port 38384
Jun 25 23:00:17 localhost sshd\[6451\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=151.80.140.13
Jun 25 23:00:19 localhost sshd\[6451\]: Failed password for invalid user jenkins from 151.80.140.13 port 38384 ssh2
2019-06-26 05:13:57
103.113.230.2 attackspambots
[SPAM] I'll ask you
2019-06-26 04:58:57
170.84.141.221 attack
25.06.2019 19:16:31 - Login Fail on hMailserver 
Detected by ELinOX-hMail-A2F
2019-06-26 05:03:06
177.74.183.208 attackbotsspam
Authentication failure: tty=dovecot ruser=mojca.poklukar@kovinska-bled.si
2019-06-26 04:49:04
185.104.185.61 attack
This address sends emails to one drive name to address the link to capture usaurios and contraeñas

https://onedrive.live.com/?authkey=%21AONQD2uCqzHRqzw&cid=34A70EA52FE2F864&id=34A70EA52FE2F864%21105&parId=root&o=OneUp
2019-06-26 04:47:43
80.91.176.139 attack
Jun 25 22:53:52 lnxded63 sshd[10067]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=80.91.176.139
Jun 25 22:53:52 lnxded63 sshd[10067]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=80.91.176.139
2019-06-26 04:59:34
221.176.201.228 attackspam
Brute force attempt
2019-06-26 05:26:07
45.120.115.150 attack
Jun 25 20:13:38 vtv3 sshd\[23597\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.120.115.150  user=root
Jun 25 20:13:40 vtv3 sshd\[23597\]: Failed password for root from 45.120.115.150 port 35964 ssh2
Jun 25 20:15:52 vtv3 sshd\[25174\]: Invalid user ts3 from 45.120.115.150 port 53884
Jun 25 20:15:52 vtv3 sshd\[25174\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.120.115.150
Jun 25 20:15:54 vtv3 sshd\[25174\]: Failed password for invalid user ts3 from 45.120.115.150 port 53884 ssh2
Jun 25 20:27:06 vtv3 sshd\[500\]: Invalid user select from 45.120.115.150 port 33992
Jun 25 20:27:06 vtv3 sshd\[500\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.120.115.150
Jun 25 20:27:08 vtv3 sshd\[500\]: Failed password for invalid user select from 45.120.115.150 port 33992 ssh2
Jun 25 20:29:04 vtv3 sshd\[1559\]: Invalid user admin from 45.120.115.150 port 49498
Jun 25 20:29:04 vtv
2019-06-26 05:27:33
179.53.121.215 attackbots
Unauthorized connection attempt from IP address 179.53.121.215 on Port 445(SMB)
2019-06-26 05:29:50

最近上报的IP列表

14.207.4.229 20.185.252.190 14.207.4.238 14.207.4.234
14.207.4.242 14.207.4.25 14.207.4.244 14.207.4.253
14.207.4.29 14.207.4.254 14.207.4.36 14.207.4.46
14.207.4.50 14.207.4.48 14.207.4.53 14.207.4.44
14.207.4.4 14.207.4.54 14.207.4.32 14.207.4.60