必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): Thailand

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
IP 类型 评论内容 时间
14.207.66.24 attack
1586798208 - 04/13/2020 19:16:48 Host: 14.207.66.24/14.207.66.24 Port: 445 TCP Blocked
2020-04-14 04:49:28
14.207.66.220 attack
Lines containing failures of 14.207.66.220
Nov 11 23:25:19 shared12 sshd[31743]: Invalid user admin from 14.207.66.220 port 43397
Nov 11 23:25:19 shared12 sshd[31743]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=14.207.66.220
Nov 11 23:25:21 shared12 sshd[31743]: Failed password for invalid user admin from 14.207.66.220 port 43397 ssh2


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=14.207.66.220
2019-11-12 07:28:34
14.207.66.162 attackbots
Chat Spam
2019-10-18 16:39:38
14.207.66.19 attackspambots
Scanning random ports - tries to find possible vulnerable services
2019-09-01 19:20:06
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 14.207.66.154
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 54204
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;14.207.66.154.			IN	A

;; AUTHORITY SECTION:
.			54	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022022700 1800 900 604800 86400

;; Query time: 47 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Feb 27 13:40:37 CST 2022
;; MSG SIZE  rcvd: 106
HOST信息:
154.66.207.14.in-addr.arpa domain name pointer mx-ll-14.207.66-154.dynamic.3bb.in.th.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
154.66.207.14.in-addr.arpa	name = mx-ll-14.207.66-154.dynamic.3bb.in.th.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
49.48.248.12 attack
1596805794 - 08/07/2020 15:09:54 Host: 49.48.248.12/49.48.248.12 Port: 445 TCP Blocked
2020-08-08 03:27:05
104.248.60.42 attack
WordPress wp-login brute force :: 104.248.60.42 0.084 BYPASS [07/Aug/2020:15:05:10  0000] [censored_2] "POST /wp-login.php HTTP/1.1" 200 2003 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
2020-08-08 03:33:33
49.235.28.96 attackbotsspam
Aug  7 20:11:40 prod4 sshd\[7044\]: Failed password for root from 49.235.28.96 port 55776 ssh2
Aug  7 20:16:13 prod4 sshd\[9043\]: Failed password for root from 49.235.28.96 port 60472 ssh2
Aug  7 20:20:32 prod4 sshd\[10847\]: Failed password for root from 49.235.28.96 port 36932 ssh2
...
2020-08-08 03:42:09
104.223.197.227 attackspam
SSH Brute Force
2020-08-08 03:57:38
190.242.46.250 attackspam
Unauthorized connection attempt from IP address 190.242.46.250 on Port 445(SMB)
2020-08-08 03:28:16
157.230.251.115 attack
Aug  7 09:33:23 mx sshd[20606]: Failed password for root from 157.230.251.115 port 40018 ssh2
2020-08-08 03:25:20
103.39.245.5 attackspam
Unauthorized connection attempt from IP address 103.39.245.5 on Port 445(SMB)
2020-08-08 03:24:40
198.46.168.116 attack
Unauthorized connection attempt from IP address 198.46.168.116 on Port 445(SMB)
2020-08-08 03:55:05
88.247.231.67 attack
Unauthorized connection attempt from IP address 88.247.231.67 on Port 445(SMB)
2020-08-08 03:47:37
49.35.122.203 attack
Unauthorized connection attempt from IP address 49.35.122.203 on Port 445(SMB)
2020-08-08 03:56:18
190.151.15.202 attackspam
Aug 7 20:30:11 *hidden* sshd[28688]: Failed password for *hidden* from 190.151.15.202 port 55539 ssh2 Aug 7 20:34:46 *hidden* sshd[29178]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=190.151.15.202 user=root Aug 7 20:34:48 *hidden* sshd[29178]: Failed password for *hidden* from 190.151.15.202 port 5928 ssh2
2020-08-08 03:28:43
109.60.24.163 attack
Unauthorized connection attempt from IP address 109.60.24.163 on Port 445(SMB)
2020-08-08 03:33:00
46.101.122.100 attackspam
Aug  7 13:52:29 [host] kernel: [2468219.856252] [U
Aug  7 13:53:34 [host] kernel: [2468285.297369] [U
Aug  7 13:54:40 [host] kernel: [2468351.461795] [U
Aug  7 13:57:56 [host] kernel: [2468547.190955] [U
Aug  7 13:59:00 [host] kernel: [2468611.620795] [U
Aug  7 14:00:05 [host] kernel: [2468676.274365] [U
2020-08-08 03:30:10
37.152.177.66 attackbots
Aug  7 19:02:37 abendstille sshd\[11744\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=37.152.177.66  user=root
Aug  7 19:02:39 abendstille sshd\[11744\]: Failed password for root from 37.152.177.66 port 41944 ssh2
Aug  7 19:07:03 abendstille sshd\[16000\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=37.152.177.66  user=root
Aug  7 19:07:05 abendstille sshd\[16000\]: Failed password for root from 37.152.177.66 port 49958 ssh2
Aug  7 19:11:35 abendstille sshd\[20188\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=37.152.177.66  user=root
...
2020-08-08 03:20:38
150.107.222.74 attackbots
Unauthorized connection attempt from IP address 150.107.222.74 on Port 445(SMB)
2020-08-08 03:27:39

最近上报的IP列表

14.207.66.203 66.191.174.201 14.207.66.166 14.207.66.213
14.207.66.138 14.207.65.83 14.207.65.95 14.207.66.224
14.207.66.229 14.207.66.69 14.207.66.64 14.207.67.149
14.207.67.169 14.207.66.90 14.207.67.111 14.207.67.12
14.207.67.151 14.207.67.156 14.207.67.15 14.207.67.195