必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): Thailand

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
IP 类型 评论内容 时间
14.207.43.165 attackspambots
 TCP (SYN) 14.207.43.165:6483 -> port 2323, len 44
2020-09-11 01:57:02
14.207.43.165 attack
Telnet/23 MH Probe, Scan, BF, Hack -
2020-09-10 17:18:54
14.207.43.165 attackbotsspam
SP-Scan 6227:23 detected 2020.09.09 11:04:53
blocked until 2020.10.29 03:07:40
2020-09-10 07:52:06
14.207.44.88 attackbotsspam
Sql/code injection probe
2020-06-25 07:37:18
14.207.46.220 attack
1586436916 - 04/09/2020 14:55:16 Host: 14.207.46.220/14.207.46.220 Port: 445 TCP Blocked
2020-04-10 05:54:40
14.207.43.158 attackspam
Unauthorized connection attempt from IP address 14.207.43.158 on Port 445(SMB)
2020-04-01 19:49:21
14.207.43.232 attackbots
1584434416 - 03/17/2020 09:40:16 Host: 14.207.43.232/14.207.43.232 Port: 445 TCP Blocked
2020-03-18 00:54:51
14.207.46.177 attackbotsspam
2020-03-1304:53:091jCbNk-0003DA-Dj\<=info@whatsup2013.chH=\(localhost\)[14.207.46.177]:41254P=esmtpsaX=TLS1.2:ECDHE-RSA-AES256-GCM-SHA384:256CV=noA=dovecot_login:info@whatsup2013.chS=2402id=181DABF8F32709BA66632A92665F8666@whatsup2013.chT="fromDarya"forwarmnightswithyou@protonmail.comsulaiman.ay145212@gmail.com2020-03-1304:52:341jCbNB-0003Al-E5\<=info@whatsup2013.chH=\(localhost\)[113.172.223.107]:48066P=esmtpsaX=TLS1.2:ECDHE-RSA-AES256-GCM-SHA384:256CV=noA=dovecot_login:info@whatsup2013.chS=2396id=6164D2818A5E70C31F1A53EB1F2C114A@whatsup2013.chT="fromDarya"fordonehadenough@gmail.comxavior.j.suarez.52511@gmail.com2020-03-1304:53:221jCbNx-0003EM-SB\<=info@whatsup2013.chH=\(localhost\)[14.186.226.226]:49779P=esmtpsaX=TLS1.2:ECDHE-RSA-AES256-GCM-SHA384:256CV=noA=dovecot_login:info@whatsup2013.chS=2428id=F2F7411219CDE3508C89C0788CE75291@whatsup2013.chT="fromDarya"forjoseph_b55@yahoo.comakiff786@icloud.com2020-03-1304:52:311jCbMi-00039A-R1\<=info@whatsup2013.chH=\(localhost\)[197.251.224.136]:55287P=esmtpsaX
2020-03-13 15:29:29
14.207.41.233 attack
Attacks websites by trying to access known vulnerables of plugins, brute-force of backends or probing of administrative tools
2020-01-31 14:26:04
14.207.41.149 attackbots
Unauthorized connection attempt from IP address 14.207.41.149 on Port 445(SMB)
2020-01-24 06:15:01
14.207.41.9 attack
Invalid user admin from 14.207.41.9 port 51850
2020-01-19 02:52:58
14.207.41.9 attackspam
Invalid user admin from 14.207.41.9 port 51850
2020-01-18 04:48:57
14.207.42.89 attackspambots
2019-12-29 23:48:56 plain_virtual_exim authenticator failed for mx-ll-14.207.42-89.dynamic.3bb.co.th ([127.0.0.1]) [14.207.42.89]: 535 Incorrect authentication data


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=14.207.42.89
2019-12-30 08:21:41
14.207.40.232 attackbots
1577041415 - 12/22/2019 20:03:35 Host: 14.207.40.232/14.207.40.232 Port: 445 TCP Blocked
2019-12-23 05:17:55
14.207.42.142 attack
Lines containing failures of 14.207.42.142
2019-11-04 x@x


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=14.207.42.142
2019-11-05 06:48:58
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 14.207.4.4
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 54569
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;14.207.4.4.			IN	A

;; AUTHORITY SECTION:
.			141	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022022700 1800 900 604800 86400

;; Query time: 58 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Feb 27 13:36:32 CST 2022
;; MSG SIZE  rcvd: 103
HOST信息:
4.4.207.14.in-addr.arpa domain name pointer mx-ll-14.207.4-4.dynamic.3bb.in.th.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
4.4.207.14.in-addr.arpa	name = mx-ll-14.207.4-4.dynamic.3bb.in.th.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
123.13.210.89 attackspam
$f2bV_matches
2020-09-17 13:35:42
94.102.51.95 attack
Sep 17 06:52:00 [host] kernel: [650371.588827] [UF
Sep 17 06:54:49 [host] kernel: [650540.306893] [UF
Sep 17 06:56:59 [host] kernel: [650670.835337] [UF
Sep 17 07:00:40 [host] kernel: [650891.086436] [UF
Sep 17 07:08:19 [host] kernel: [651350.899539] [UF
Sep 17 07:15:28 [host] kernel: [651779.053956] [UF
2020-09-17 13:25:43
36.232.68.109 attack
Unauthorized connection attempt from IP address 36.232.68.109 on Port 445(SMB)
2020-09-17 13:29:06
45.235.93.14 attackbotsspam
Sep 17 06:56:35 sticky sshd\[12236\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.235.93.14  user=root
Sep 17 06:56:37 sticky sshd\[12236\]: Failed password for root from 45.235.93.14 port 11626 ssh2
Sep 17 06:58:09 sticky sshd\[12247\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.235.93.14  user=root
Sep 17 06:58:11 sticky sshd\[12247\]: Failed password for root from 45.235.93.14 port 22187 ssh2
Sep 17 06:59:45 sticky sshd\[12286\]: Invalid user git from 45.235.93.14 port 32748
Sep 17 06:59:45 sticky sshd\[12286\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.235.93.14
2020-09-17 13:17:40
178.165.99.208 attackbotsspam
SSH brutforce
2020-09-17 13:13:35
162.214.94.193 attack
Brute Force attack - banned by Fail2Ban
2020-09-17 13:42:17
118.24.151.254 attackbotsspam
detected by Fail2Ban
2020-09-17 13:30:21
106.12.119.218 attackspambots
2020-09-17T10:27:57.490824hostname sshd[18686]: Invalid user test from 106.12.119.218 port 35516
2020-09-17T10:27:59.650705hostname sshd[18686]: Failed password for invalid user test from 106.12.119.218 port 35516 ssh2
2020-09-17T10:31:22.296283hostname sshd[19950]: Invalid user robinetta from 106.12.119.218 port 38760
...
2020-09-17 13:22:23
119.192.206.158 attackbots
SSH brute force
2020-09-17 13:36:53
107.6.169.253 attackspambots
[Sun Sep 13 03:50:29 2020] - DDoS Attack From IP: 107.6.169.253 Port: 14637
2020-09-17 13:32:57
171.34.78.119 attackspambots
$f2bV_matches
2020-09-17 13:10:42
200.73.128.148 attack
$f2bV_matches
2020-09-17 13:23:26
213.113.121.161 attack
$f2bV_matches
2020-09-17 13:21:30
114.206.186.246 attackbotsspam
Connection to SSH Honeypot - Detected by HoneypotDB
2020-09-17 13:23:56
52.229.159.234 attackbotsspam
Sep 17 00:44:48 NPSTNNYC01T sshd[2576]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=52.229.159.234
Sep 17 00:44:50 NPSTNNYC01T sshd[2576]: Failed password for invalid user zanron from 52.229.159.234 port 21093 ssh2
Sep 17 00:48:08 NPSTNNYC01T sshd[2935]: Failed password for root from 52.229.159.234 port 15662 ssh2
...
2020-09-17 13:20:54

最近上报的IP列表

14.207.4.44 14.207.4.54 14.207.4.32 14.207.4.60
14.207.4.64 14.207.4.81 14.207.40.112 14.207.4.82
14.207.4.91 14.207.4.93 14.207.4.78 14.207.40.117
14.207.40.128 14.207.40.118 14.207.40.130 14.207.40.134
14.207.4.87 14.207.40.148 14.207.40.156 14.207.40.163