必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): Thailand

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 14.207.54.208
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 27589
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;14.207.54.208.			IN	A

;; AUTHORITY SECTION:
.			597	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022022700 1800 900 604800 86400

;; Query time: 72 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Feb 27 13:39:05 CST 2022
;; MSG SIZE  rcvd: 106
HOST信息:
208.54.207.14.in-addr.arpa domain name pointer mx-ll-14.207.54-208.dynamic.3bb.in.th.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
208.54.207.14.in-addr.arpa	name = mx-ll-14.207.54-208.dynamic.3bb.in.th.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
77.40.61.94 attackbotsspam
abuse-sasl
2020-04-03 21:04:50
128.72.154.80 attackbots
Unauthorized connection attempt from IP address 128.72.154.80 on Port 445(SMB)
2020-04-03 21:12:49
42.113.61.205 attack
Unauthorized connection attempt from IP address 42.113.61.205 on Port 445(SMB)
2020-04-03 21:02:21
142.44.240.190 attackbotsspam
Apr  3 09:56:42 vps46666688 sshd[9331]: Failed password for root from 142.44.240.190 port 43098 ssh2
...
2020-04-03 21:15:33
77.40.62.173 attackspam
abuse-sasl
2020-04-03 20:57:51
183.57.72.2 attackspambots
Too many connections or unauthorized access detected from Arctic banned ip
2020-04-03 20:52:52
104.137.17.215 attackbotsspam
leo_www
2020-04-03 20:51:18
124.115.173.234 attack
2020-04-03T13:00:27.447058shield sshd\[31709\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=124.115.173.234  user=root
2020-04-03T13:00:28.966693shield sshd\[31709\]: Failed password for root from 124.115.173.234 port 5318 ssh2
2020-04-03T13:03:11.200450shield sshd\[32556\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=124.115.173.234  user=root
2020-04-03T13:03:13.236678shield sshd\[32556\]: Failed password for root from 124.115.173.234 port 2885 ssh2
2020-04-03T13:06:01.272778shield sshd\[759\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=124.115.173.234  user=root
2020-04-03 21:20:20
77.81.107.220 attackspambots
abuse-sasl
2020-04-03 20:46:41
2.135.220.202 attackspam
Unauthorized connection attempt from IP address 2.135.220.202 on Port 445(SMB)
2020-04-03 21:08:08
80.241.251.238 attack
80.241.251.238 - - [03/Apr/2020:08:50:04 +0300] "POST /cgi-bin/mainfunction.cgi HTTP/1.1" 404 196 "-" "XTC BOTNET"
2020-04-03 21:24:09
221.226.14.178 attackspam
Apr  3 10:37:31 haigwepa sshd[26327]: Failed password for root from 221.226.14.178 port 60974 ssh2
...
2020-04-03 21:02:44
85.94.178.155 attack
Unauthorized connection attempt from IP address 85.94.178.155 on Port 445(SMB)
2020-04-03 21:27:38
36.81.219.146 attack
Unauthorized connection attempt from IP address 36.81.219.146 on Port 445(SMB)
2020-04-03 21:00:15
182.52.210.47 attackbotsspam
Unauthorized connection attempt from IP address 182.52.210.47 on Port 445(SMB)
2020-04-03 20:47:09

最近上报的IP列表

14.207.53.84 14.207.53.42 14.207.54.66 14.207.55.119
14.207.55.103 14.207.53.211 14.207.55.125 14.207.55.123
66.251.46.47 14.207.57.52 14.207.57.80 14.207.57.34
14.207.57.72 14.207.57.51 14.207.57.57 14.207.57.70
14.207.57.76 14.207.57.69 14.207.57.29 14.207.57.44