必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): Thailand

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
IP 类型 评论内容 时间
14.207.57.111 attackspam
SSH/22 MH Probe, BF, Hack -
2020-07-11 01:44:46
14.207.57.91 attack
1590983128 - 06/01/2020 05:45:28 Host: 14.207.57.91/14.207.57.91 Port: 445 TCP Blocked
2020-06-01 20:00:33
14.207.58.141 attackbotsspam
Honeypot attack, port: 445, PTR: mx-ll-14.207.58-141.dynamic.3bb.in.th.
2020-04-29 00:29:59
14.207.57.126 attackspambots
1583241604 - 03/03/2020 14:20:04 Host: 14.207.57.126/14.207.57.126 Port: 445 TCP Blocked
2020-03-04 05:34:38
14.207.57.187 attackbots
Attempt to attack host OS, exploiting network vulnerabilities, on 06-02-2020 04:55:20.
2020-02-06 15:40:43
14.207.5.88 attack
Honeypot attack, port: 445, PTR: mx-ll-14.207.5-88.dynamic.3bb.co.th.
2019-12-12 20:31:42
14.207.5.224 attackbots
Port Scan
2019-10-29 22:22:56
14.207.56.62 attackspam
Automatic report - XMLRPC Attack
2019-10-13 03:12:52
14.207.5.222 attackspam
Aug 31 13:24:06 mxgate1 sshd[6584]: Invalid user admin from 14.207.5.222 port 39330
Aug 31 13:24:06 mxgate1 sshd[6584]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=14.207.5.222
Aug 31 13:24:08 mxgate1 sshd[6584]: Failed password for invalid user admin from 14.207.5.222 port 39330 ssh2


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=14.207.5.222
2019-09-01 04:20:18
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 14.207.5.254
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 63704
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;14.207.5.254.			IN	A

;; AUTHORITY SECTION:
.			599	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022022700 1800 900 604800 86400

;; Query time: 69 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Feb 27 13:38:54 CST 2022
;; MSG SIZE  rcvd: 105
HOST信息:
254.5.207.14.in-addr.arpa domain name pointer mx-ll-14.207.5-254.dynamic.3bb.in.th.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
254.5.207.14.in-addr.arpa	name = mx-ll-14.207.5-254.dynamic.3bb.in.th.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
185.143.221.58 attack
Jul 29 14:30:34 lumpi kernel: INPUT:DROP:SPAMHAUS_EDROP:IN=eth0 OUT= MAC=52:54:a2:01:a5:04:d2:74:7f:6e:37:e3:08:00 SRC=185.143.221.58 DST=172.31.1.100 LEN=40 TOS=0x00 PREC=0x00 TTL=244 ID=17998 PROTO=TCP SPT=54017 DPT=12799 WINDOW=1024 RES=0x00 SYN URGP=0 
...
2019-07-29 21:14:36
198.108.67.97 attackspam
Scanning (more than 2 packets) random ports - tries to find possible vulnerable services
2019-07-29 21:36:48
52.197.176.231 attackspambots
Jul 29 05:43:42 h2022099 sshd[21165]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=em3-52-197-176-231.ap-northeast-1.compute.amazonaws.com  user=r.r
Jul 29 05:43:44 h2022099 sshd[21165]: Failed password for r.r from 52.197.176.231 port 14056 ssh2
Jul 29 05:43:45 h2022099 sshd[21165]: Received disconnect from 52.197.176.231: 11: Bye Bye [preauth]
Jul 29 05:56:59 h2022099 sshd[22890]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=em3-52-197-176-231.ap-northeast-1.compute.amazonaws.com  user=r.r
Jul 29 05:57:01 h2022099 sshd[22890]: Failed password for r.r from 52.197.176.231 port 25274 ssh2
Jul 29 05:57:02 h2022099 sshd[22890]: Received disconnect from 52.197.176.231: 11: Bye Bye [preauth]
Jul 29 06:02:48 h2022099 sshd[23573]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=em3-52-197-176-231.ap-northeast-1.compute.amazonaws.com  user=r.r
Jul 29 06:........
-------------------------------
2019-07-29 20:52:29
171.111.153.194 attackspam
19/7/29@02:43:34: FAIL: Alarm-Intrusion address from=171.111.153.194
19/7/29@02:43:34: FAIL: Alarm-Intrusion address from=171.111.153.194
...
2019-07-29 21:18:07
194.55.187.3 attackspambots
Jul 29 12:50:29 MK-Soft-VM4 sshd\[17004\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=194.55.187.3  user=root
Jul 29 12:50:31 MK-Soft-VM4 sshd\[17004\]: Failed password for root from 194.55.187.3 port 56100 ssh2
Jul 29 12:50:33 MK-Soft-VM4 sshd\[17036\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=194.55.187.3  user=root
...
2019-07-29 21:07:27
113.118.192.165 attackbotsspam
Honeypot attack, port: 445, PTR: PTR record not found
2019-07-29 21:03:28
185.195.201.148 attackspam
Scanning (more than 2 packets) random ports - tries to find possible vulnerable services
2019-07-29 21:46:48
43.243.127.89 attackspam
DATE:2019-07-29 08:43:51, IP:43.243.127.89, PORT:ssh brute force auth on SSH service (patata)
2019-07-29 21:11:53
121.142.111.222 attackbots
Automatic report - Banned IP Access
2019-07-29 21:11:34
51.75.249.28 attackspam
Lines containing failures of 51.75.249.28
Jul 29 09:17:12 siirappi sshd[11085]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.75.249.28  user=r.r
Jul 29 09:17:14 siirappi sshd[11085]: Failed password for r.r from 51.75.249.28 port 59938 ssh2
Jul 29 09:17:14 siirappi sshd[11085]: Received disconnect from 51.75.249.28 port 59938:11: Bye Bye [preauth]
Jul 29 09:17:14 siirappi sshd[11085]: Disconnected from 51.75.249.28 port 59938 [preauth]
Jul 29 09:27:45 siirappi sshd[11181]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.75.249.28  user=r.r
Jul 29 09:27:47 siirappi sshd[11181]: Failed password for r.r from 51.75.249.28 port 47258 ssh2
Jul 29 09:27:47 siirappi sshd[11181]: Received disconnect from 51.75.249.28 port 47258:11: Bye Bye [preauth]
Jul 29 09:27:47 siirappi sshd[11181]: Disconnected from 51.75.249.28 port 47258 [preauth]
Jul 29 09:31:58 siirappi sshd[11211]: pam_unix(sshd:aut........
------------------------------
2019-07-29 20:58:24
209.212.199.186 attackspam
Automatic report - Port Scan Attack
2019-07-29 20:50:37
103.99.0.151 attackspambots
Connection attempts using mod_proxy:
    103.99.0.151 -> steamcommunity.com:443: 1 Time(s)
2019-07-29 21:22:22
218.78.54.80 attackbotsspam
Jul 29 04:52:00 pl2server postfix/smtpd[3393830]: warning: hostname 80.54.78.218.dial.xw.sh.dynamic.163data.com.cn does not resolve to address 218.78.54.80: Name or service not known
Jul 29 04:52:00 pl2server postfix/smtpd[3393830]: connect from unknown[218.78.54.80]
Jul 29 04:52:02 pl2server postfix/smtpd[3393830]: warning: unknown[218.78.54.80]: SASL LOGIN authentication failed: authentication failure
Jul 29 04:52:02 pl2server postfix/smtpd[3393830]: lost connection after AUTH from unknown[218.78.54.80]
Jul 29 04:52:02 pl2server postfix/smtpd[3393830]: disconnect from unknown[218.78.54.80]
Jul 29 04:52:12 pl2server postfix/smtpd[3393830]: warning: hostname 80.54.78.218.dial.xw.sh.dynamic.163data.com.cn does not resolve to address 218.78.54.80: Name or service not known
Jul 29 04:52:12 pl2server postfix/smtpd[3393830]: connect from unknown[218.78.54.80]
Jul 29 04:52:13 pl2server postfix/smtpd[3393830]: warning: unknown[218.78.54.80]: SASL LOGIN authentication failed: a........
-------------------------------
2019-07-29 21:22:01
54.37.136.60 attack
Jul 29 06:54:31 TORMINT sshd\[30594\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=54.37.136.60  user=root
Jul 29 06:54:33 TORMINT sshd\[30594\]: Failed password for root from 54.37.136.60 port 56628 ssh2
Jul 29 06:58:48 TORMINT sshd\[30829\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=54.37.136.60  user=root
...
2019-07-29 21:31:35
5.154.5.119 attack
2019-07-29 01:44:01 H=(logisticequipments.it) [5.154.5.119]:59536 I=[192.147.25.65]:25 F= rejected RCPT : RBL: found in thrukfz5b56tq6xao6odgdyjrq.zen.dq.spamhaus.net (127.0.0.4, 127.0.0.11, 127.0.0.3) (https://www.spamhaus.org/sbl/query/SBLCSS)
2019-07-29 01:44:06 H=(logisticequipments.it) [5.154.5.119]:59536 I=[192.147.25.65]:25 F= rejected RCPT : RBL: found in thrukfz5b56tq6xao6odgdyjrq.zen.dq.spamhaus.net (127.0.0.4, 127.0.0.3, 127.0.0.11) (https://www.spamhaus.org/sbl/query/SBLCSS)
2019-07-29 01:44:11 H=(logisticequipments.it) [5.154.5.119]:59536 I=[192.147.25.65]:25 F= rejected RCPT : RBL: found in thrukfz5b56tq6xao6odgdyjrq.zen.dq.spamhaus.net (127.0.0.3, 127.0.0.11, 127.0.0.4) (https://www.spamhaus.org/query/ip/5.154.5.119)
...
2019-07-29 20:59:59

最近上报的IP列表

14.207.5.251 14.207.5.29 14.207.5.6 14.207.5.67
14.207.5.55 14.207.5.44 14.207.5.56 14.207.5.72
14.207.5.76 14.207.5.40 14.207.5.63 14.207.5.87
14.207.5.9 61.235.70.11 14.207.5.89 14.207.5.99
14.207.50.84 14.207.50.175 14.207.50.95 14.207.50.167