必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): Thailand

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 14.207.81.16
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 12326
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;14.207.81.16.			IN	A

;; AUTHORITY SECTION:
.			590	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022022700 1800 900 604800 86400

;; Query time: 15 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Feb 27 13:44:49 CST 2022
;; MSG SIZE  rcvd: 105
HOST信息:
16.81.207.14.in-addr.arpa domain name pointer mx-ll-14.207.81-16.dynamic.3bb.in.th.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
16.81.207.14.in-addr.arpa	name = mx-ll-14.207.81-16.dynamic.3bb.in.th.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
104.131.79.140 attackspambots
10s of requests to none existent pages - :443/app-ads.txt - typically bursts of 8 requests per second - undefined
node-superagent/4.1.0
2019-07-20 23:28:44
68.183.83.166 attackspambots
Jul 20 12:54:48 master sshd[18047]: Failed password for invalid user fake from 68.183.83.166 port 60630 ssh2
Jul 20 12:54:51 master sshd[18050]: Failed password for invalid user user from 68.183.83.166 port 36898 ssh2
Jul 20 12:54:56 master sshd[18060]: Failed password for invalid user ubnt from 68.183.83.166 port 41392 ssh2
Jul 20 12:54:59 master sshd[18062]: Failed password for invalid user admin from 68.183.83.166 port 46412 ssh2
Jul 20 12:55:03 master sshd[18064]: Failed password for root from 68.183.83.166 port 50494 ssh2
Jul 20 12:55:07 master sshd[18066]: Failed password for invalid user admin from 68.183.83.166 port 54488 ssh2
2019-07-20 23:28:05
213.149.62.57 attackbots
C1,WP GET /lappan/wp-login.php
2019-07-20 23:06:07
201.49.127.212 attack
Jul 20 17:29:44 microserver sshd[56343]: Invalid user prince from 201.49.127.212 port 45186
Jul 20 17:29:44 microserver sshd[56343]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=201.49.127.212
Jul 20 17:29:45 microserver sshd[56343]: Failed password for invalid user prince from 201.49.127.212 port 45186 ssh2
Jul 20 17:35:24 microserver sshd[57509]: Invalid user matwork from 201.49.127.212 port 39764
Jul 20 17:35:24 microserver sshd[57509]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=201.49.127.212
Jul 20 17:46:44 microserver sshd[58916]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=201.49.127.212  user=root
Jul 20 17:46:45 microserver sshd[58916]: Failed password for root from 201.49.127.212 port 57210 ssh2
Jul 20 17:52:27 microserver sshd[59654]: Invalid user ds from 201.49.127.212 port 51830
Jul 20 17:52:27 microserver sshd[59654]: pam_unix(sshd:auth): authentication failure; log
2019-07-21 00:22:32
92.119.160.148 attackbots
20.07.2019 13:40:30 Connection to port 4889 blocked by firewall
2019-07-20 23:47:50
148.70.223.53 attackspambots
Jul 20 20:55:42 vibhu-HP-Z238-Microtower-Workstation sshd\[12193\]: Invalid user scanner from 148.70.223.53
Jul 20 20:55:42 vibhu-HP-Z238-Microtower-Workstation sshd\[12193\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=148.70.223.53
Jul 20 20:55:45 vibhu-HP-Z238-Microtower-Workstation sshd\[12193\]: Failed password for invalid user scanner from 148.70.223.53 port 42398 ssh2
Jul 20 21:02:52 vibhu-HP-Z238-Microtower-Workstation sshd\[12451\]: Invalid user jupyter from 148.70.223.53
Jul 20 21:02:52 vibhu-HP-Z238-Microtower-Workstation sshd\[12451\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=148.70.223.53
...
2019-07-20 23:38:33
109.184.164.26 attack
0,31-05/25 [bc02/m08] concatform PostRequest-Spammer scoring: Durban01
2019-07-20 23:04:19
118.172.229.184 attackspambots
Jul 20 11:19:11 plusreed sshd[30532]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.172.229.184  user=root
Jul 20 11:19:13 plusreed sshd[30532]: Failed password for root from 118.172.229.184 port 43688 ssh2
...
2019-07-20 23:19:43
176.67.84.158 attackbots
Bruteforcing port 3389 (Remote Desktop) - Exceed maximum 10 attempts/hour
2019-07-20 23:01:04
191.53.253.225 attackspambots
failed_logins
2019-07-21 00:19:32
177.23.62.214 attackspambots
failed_logins
2019-07-20 23:39:57
94.244.179.119 attackspam
Jul 16 13:09:53 mail sshd[12891]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=94.244.179.119.nash.net.ua
Jul 16 13:09:55 mail sshd[12891]: Failed password for invalid user XXX from 94.244.179.119 port 43400 ssh2
Jul 16 13:09:55 mail sshd[12891]: Received disconnect from 94.244.179.119: 11: Bye Bye [preauth]
Jul 16 14:04:43 mail sshd[21768]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=94.244.179.119.nash.net.ua


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=94.244.179.119
2019-07-20 23:20:17
27.221.81.138 attack
Jul 20 16:50:42 ArkNodeAT sshd\[5129\]: Invalid user none from 27.221.81.138
Jul 20 16:50:42 ArkNodeAT sshd\[5129\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=27.221.81.138
Jul 20 16:50:44 ArkNodeAT sshd\[5129\]: Failed password for invalid user none from 27.221.81.138 port 59592 ssh2
2019-07-20 22:56:12
211.159.187.191 attack
2019-07-20T15:08:20.047833abusebot.cloudsearch.cf sshd\[3293\]: Invalid user ts from 211.159.187.191 port 37746
2019-07-20 23:25:34
45.13.39.126 attackspambots
Jul 20 17:27:24 relay postfix/smtpd\[9342\]: warning: unknown\[45.13.39.126\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Jul 20 17:27:54 relay postfix/smtpd\[15928\]: warning: unknown\[45.13.39.126\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Jul 20 17:28:16 relay postfix/smtpd\[9343\]: warning: unknown\[45.13.39.126\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Jul 20 17:28:46 relay postfix/smtpd\[15904\]: warning: unknown\[45.13.39.126\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Jul 20 17:29:08 relay postfix/smtpd\[9343\]: warning: unknown\[45.13.39.126\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
...
2019-07-20 23:42:47

最近上报的IP列表

14.207.81.162 14.207.81.182 14.207.81.171 14.207.81.186
14.207.81.199 14.207.81.223 14.207.81.190 14.207.81.21
14.207.81.243 14.207.81.246 14.207.81.245 14.207.81.4
14.207.81.39 14.207.81.29 14.207.81.40 14.207.81.43
14.207.81.49 14.207.81.56 14.207.81.6 14.207.81.76