必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): Thailand

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 14.207.50.175
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 1130
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;14.207.50.175.			IN	A

;; AUTHORITY SECTION:
.			600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022022700 1800 900 604800 86400

;; Query time: 56 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Feb 27 13:38:59 CST 2022
;; MSG SIZE  rcvd: 106
HOST信息:
175.50.207.14.in-addr.arpa domain name pointer mx-ll-14.207.50-175.dynamic.3bb.in.th.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
175.50.207.14.in-addr.arpa	name = mx-ll-14.207.50-175.dynamic.3bb.in.th.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
45.143.220.18 attackbots
SIPVicious Scanner Detection
2019-10-27 08:20:25
80.82.77.245 attack
26.10.2019 23:51:12 Connection to port 1029 blocked by firewall
2019-10-27 08:17:20
166.111.80.44 attackspam
Oct 27 04:50:41 vps58358 sshd\[12762\]: Invalid user skibum from 166.111.80.44Oct 27 04:50:43 vps58358 sshd\[12762\]: Failed password for invalid user skibum from 166.111.80.44 port 39368 ssh2Oct 27 04:55:11 vps58358 sshd\[12849\]: Invalid user clint from 166.111.80.44Oct 27 04:55:13 vps58358 sshd\[12849\]: Failed password for invalid user clint from 166.111.80.44 port 45028 ssh2Oct 27 04:59:18 vps58358 sshd\[12923\]: Invalid user password!@\#abc!@\# from 166.111.80.44Oct 27 04:59:19 vps58358 sshd\[12923\]: Failed password for invalid user password!@\#abc!@\# from 166.111.80.44 port 50694 ssh2
...
2019-10-27 12:00:02
61.28.227.133 attack
Oct 26 18:11:42 sachi sshd\[20909\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.28.227.133  user=root
Oct 26 18:11:44 sachi sshd\[20909\]: Failed password for root from 61.28.227.133 port 60040 ssh2
Oct 26 18:16:10 sachi sshd\[21265\]: Invalid user skz from 61.28.227.133
Oct 26 18:16:10 sachi sshd\[21265\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.28.227.133
Oct 26 18:16:12 sachi sshd\[21265\]: Failed password for invalid user skz from 61.28.227.133 port 42214 ssh2
2019-10-27 12:17:55
207.46.13.69 attackspambots
Automatic report - Banned IP Access
2019-10-27 08:24:55
94.177.240.4 attackbots
2019-10-27T03:55:17.103013shield sshd\[2373\]: Invalid user ftpuser from 94.177.240.4 port 34938
2019-10-27T03:55:17.111262shield sshd\[2373\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=94.177.240.4
2019-10-27T03:55:18.903244shield sshd\[2373\]: Failed password for invalid user ftpuser from 94.177.240.4 port 34938 ssh2
2019-10-27T03:58:51.151970shield sshd\[3696\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=94.177.240.4  user=root
2019-10-27T03:58:53.658161shield sshd\[3696\]: Failed password for root from 94.177.240.4 port 44222 ssh2
2019-10-27 12:09:31
45.227.253.139 attackspambots
Oct 27 04:57:20 relay postfix/smtpd\[28566\]: warning: unknown\[45.227.253.139\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Oct 27 04:57:27 relay postfix/smtpd\[18757\]: warning: unknown\[45.227.253.139\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Oct 27 04:57:57 relay postfix/smtpd\[30555\]: warning: unknown\[45.227.253.139\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Oct 27 04:58:04 relay postfix/smtpd\[19234\]: warning: unknown\[45.227.253.139\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Oct 27 04:58:43 relay postfix/smtpd\[30557\]: warning: unknown\[45.227.253.139\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
...
2019-10-27 12:14:07
83.16.200.171 attackbotsspam
SSH brutforce
2019-10-27 08:25:38
213.25.135.10 attackbots
IP Ban Report :  
 https://help-dysk.pl/wordpress-firewall-plugins/ip/213.25.135.10/ 
 
 PL - 1H : (144)  
 Protection Against DDoS WordPress plugin :  
 "odzyskiwanie danych help-dysk" 
 IP Address Ranges by Country : PL 
 NAME ASN : ASN5617 
 
 IP : 213.25.135.10 
 
 CIDR : 213.25.128.0/19 
 
 PREFIX COUNT : 183 
 
 UNIQUE IP COUNT : 5363456 
 
 
 ATTACKS DETECTED ASN5617 :  
  1H - 5 
  3H - 17 
  6H - 37 
 12H - 58 
 24H - 78 
 
 DateTime : 2019-10-27 04:58:41 
 
 INFO : Server 403 - Looking for resource vulnerabilities Detected and Blocked by ADMIN  - data recovery
2019-10-27 12:14:26
159.203.17.176 attackbots
Oct 26 22:28:38 ovpn sshd\[8886\]: Invalid user support from 159.203.17.176
Oct 26 22:28:38 ovpn sshd\[8886\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.203.17.176
Oct 26 22:28:40 ovpn sshd\[8886\]: Failed password for invalid user support from 159.203.17.176 port 49100 ssh2
Oct 26 22:43:30 ovpn sshd\[11731\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.203.17.176  user=root
Oct 26 22:43:32 ovpn sshd\[11731\]: Failed password for root from 159.203.17.176 port 40272 ssh2
2019-10-27 08:26:45
94.23.212.137 attackbots
Oct 27 01:56:41 www5 sshd\[38404\]: Invalid user 1QaZ2WsX from 94.23.212.137
Oct 27 01:56:41 www5 sshd\[38404\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=94.23.212.137
Oct 27 01:56:43 www5 sshd\[38404\]: Failed password for invalid user 1QaZ2WsX from 94.23.212.137 port 52189 ssh2
...
2019-10-27 08:29:23
81.22.45.115 attackspam
10/26/2019-19:34:30.872139 81.22.45.115 Protocol: 6 ET DROP Dshield Block Listed Source group 1
2019-10-27 08:16:20
151.80.207.9 attackbots
Oct 27 03:59:01 www_kotimaassa_fi sshd[22675]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=151.80.207.9
Oct 27 03:59:03 www_kotimaassa_fi sshd[22675]: Failed password for invalid user virl from 151.80.207.9 port 39563 ssh2
...
2019-10-27 12:06:17
212.64.109.175 attackbots
Oct 27 00:54:00 firewall sshd[27023]: Failed password for root from 212.64.109.175 port 59171 ssh2
Oct 27 00:58:49 firewall sshd[27249]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=212.64.109.175  user=root
Oct 27 00:58:52 firewall sshd[27249]: Failed password for root from 212.64.109.175 port 49615 ssh2
...
2019-10-27 12:10:00
131.196.7.234 attackbotsspam
Oct 27 01:48:44 MK-Soft-VM5 sshd[31877]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=131.196.7.234 
Oct 27 01:48:46 MK-Soft-VM5 sshd[31877]: Failed password for invalid user pasword from 131.196.7.234 port 55134 ssh2
...
2019-10-27 08:27:24

最近上报的IP列表

14.207.50.84 14.207.50.95 14.207.50.167 14.207.51.106
14.207.51.195 14.207.51.196 14.207.50.242 14.207.51.67
14.207.51.228 14.207.51.72 14.207.51.8 14.207.52.13
14.207.51.131 14.207.51.95 14.207.52.121 14.207.52.59
14.207.53.203 14.207.52.176 14.207.54.183 14.207.53.84