必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): Foshan

省份(region): Guangdong

国家(country): China

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
% [whois.apnic.net]
% Whois data copyright terms    http://www.apnic.net/db/dbcopyright.html

% Information related to '14.208.0.0 - 14.223.255.255'

% Abuse contact for '14.208.0.0 - 14.223.255.255' is 'anti-spam@chinatelecom.cn'

inetnum:        14.208.0.0 - 14.223.255.255
netname:        CHINANET-GD
descr:          CHINANET Guangdong province network
descr:          Data Communication Division
descr:          China Telecom
country:        CN
admin-c:        CH93-AP
tech-c:         IC83-AP
abuse-c:        AC1573-AP
status:         ALLOCATED PORTABLE
remarks:        service provider
remarks:        --------------------------------------------------------
remarks:        To report network abuse, please contact mnt-irt
remarks:        For troubleshooting, please contact tech-c and admin-c
remarks:        Report invalid contact via www.apnic.net/invalidcontact
remarks:        --------------------------------------------------------
notify:         abuse_gdnoc@189.cn
mnt-by:         APNIC-HM
mnt-lower:      MAINT-CHINANET-GD
mnt-irt:        IRT-CHINANET-CN
last-modified:  2021-06-15T08:06:06Z
source:         APNIC

irt:            IRT-CHINANET-CN
address:        No.31 ,jingrong street,beijing
address:        100032
e-mail:         anti-spam@chinatelecom.cn
abuse-mailbox:  anti-spam@chinatelecom.cn
admin-c:        CH93-AP
tech-c:         CH93-AP
auth:           # Filtered
remarks:        anti-spam@chinatelecom.cn was validated on 2025-11-13
mnt-by:         MAINT-CHINANET
last-modified:  2026-03-13T07:12:20Z
source:         APNIC

role:           ABUSE CHINANETCN
country:        ZZ
address:        No.31 ,jingrong street,beijing
address:        100032
phone:          +000000000
e-mail:         anti-spam@chinatelecom.cn
admin-c:        CH93-AP
tech-c:         CH93-AP
nic-hdl:        AC1573-AP
remarks:        Generated from irt object IRT-CHINANET-CN
remarks:        anti-spam@chinatelecom.cn was validated on 2025-11-13
abuse-mailbox:  anti-spam@chinatelecom.cn
mnt-by:         APNIC-ABUSE
last-modified:  2025-11-13T14:15:15Z
source:         APNIC

person:         Chinanet Hostmaster
nic-hdl:        CH93-AP
e-mail:         anti-spam@chinatelecom.cn
address:        No.31 ,jingrong street,beijing
address:        100032
phone:          +86-10-58501724
fax-no:         +86-10-58501724
country:        CN
mnt-by:         MAINT-CHINANET
last-modified:  2022-02-28T06:53:44Z
source:         APNIC

person:         IPMASTER CHINANET-GD
nic-hdl:        IC83-AP
e-mail:         abuse_gdicnoc@163.com
address:        NO.18,RO. ZHONGSHANER,YUEXIU DISTRIC,GUANGZHOU
phone:          +86-20-87189274
fax-no:         +86-20-87189274
country:        CN
mnt-by:         MAINT-CHINANET-GD
remarks:        IPMASTER is not for spam complaint,please send spam complaint to abuse_gdicnoc@163.com
abuse-mailbox:  abuse_gdicnoc@163.com
last-modified:  2021-05-12T09:06:58Z
source:         APNIC

% This query was served by the APNIC Whois Service version 1.88.48 (WHOIS-AU5)
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 14.212.72.201
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 4200
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;14.212.72.201.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2026050501 1800 900 604800 86400

;; Query time: 29 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed May 06 04:00:42 CST 2026
;; MSG SIZE  rcvd: 106
HOST信息:
Host 201.72.212.14.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 201.72.212.14.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
103.98.17.23 attackbots
[SID2] Fail2ban detected 5 failed SSH login attempts within 30 minutes. This report was submitted automatically.
2020-08-18 13:49:38
192.144.190.244 attackspam
Invalid user appuser from 192.144.190.244 port 53730
2020-08-18 14:05:14
46.101.253.249 attackspambots
Aug 17 20:52:05 pixelmemory sshd[2638629]: Failed password for root from 46.101.253.249 port 46613 ssh2
Aug 17 20:56:10 pixelmemory sshd[2639252]: Invalid user leonidas from 46.101.253.249 port 51330
Aug 17 20:56:10 pixelmemory sshd[2639252]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=46.101.253.249 
Aug 17 20:56:10 pixelmemory sshd[2639252]: Invalid user leonidas from 46.101.253.249 port 51330
Aug 17 20:56:12 pixelmemory sshd[2639252]: Failed password for invalid user leonidas from 46.101.253.249 port 51330 ssh2
...
2020-08-18 13:23:38
41.73.213.186 attackspambots
Aug 18 07:22:27 eventyay sshd[25573]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=41.73.213.186
Aug 18 07:22:29 eventyay sshd[25573]: Failed password for invalid user zero from 41.73.213.186 port 36282 ssh2
Aug 18 07:30:12 eventyay sshd[25764]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=41.73.213.186
...
2020-08-18 13:42:17
89.235.95.251 attackspam
port scan and connect, tcp 8080 (http-proxy)
2020-08-18 13:10:17
200.0.236.210 attack
Aug 18 07:53:55 santamaria sshd\[9582\]: Invalid user test from 200.0.236.210
Aug 18 07:53:55 santamaria sshd\[9582\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=200.0.236.210
Aug 18 07:53:57 santamaria sshd\[9582\]: Failed password for invalid user test from 200.0.236.210 port 33630 ssh2
...
2020-08-18 13:56:31
191.162.242.181 attack
2020-08-18T03:46:47.502546abusebot-5.cloudsearch.cf sshd[9922]: Invalid user abhijit from 191.162.242.181 port 62017
2020-08-18T03:46:47.508797abusebot-5.cloudsearch.cf sshd[9922]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=191.162.242.181
2020-08-18T03:46:47.502546abusebot-5.cloudsearch.cf sshd[9922]: Invalid user abhijit from 191.162.242.181 port 62017
2020-08-18T03:46:49.985269abusebot-5.cloudsearch.cf sshd[9922]: Failed password for invalid user abhijit from 191.162.242.181 port 62017 ssh2
2020-08-18T03:55:32.038823abusebot-5.cloudsearch.cf sshd[9981]: Invalid user oracle from 191.162.242.181 port 47809
2020-08-18T03:55:32.045070abusebot-5.cloudsearch.cf sshd[9981]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=191.162.242.181
2020-08-18T03:55:32.038823abusebot-5.cloudsearch.cf sshd[9981]: Invalid user oracle from 191.162.242.181 port 47809
2020-08-18T03:55:34.260753abusebot-5.cloudsearch.cf sshd
...
2020-08-18 13:55:36
201.149.20.162 attackspambots
2020-08-18T04:04:25.386130abusebot-8.cloudsearch.cf sshd[3043]: Invalid user wwwadm from 201.149.20.162 port 18858
2020-08-18T04:04:25.391897abusebot-8.cloudsearch.cf sshd[3043]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=201.149.20.162
2020-08-18T04:04:25.386130abusebot-8.cloudsearch.cf sshd[3043]: Invalid user wwwadm from 201.149.20.162 port 18858
2020-08-18T04:04:28.114078abusebot-8.cloudsearch.cf sshd[3043]: Failed password for invalid user wwwadm from 201.149.20.162 port 18858 ssh2
2020-08-18T04:08:22.737159abusebot-8.cloudsearch.cf sshd[3154]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=201.149.20.162  user=root
2020-08-18T04:08:24.325803abusebot-8.cloudsearch.cf sshd[3154]: Failed password for root from 201.149.20.162 port 27044 ssh2
2020-08-18T04:12:08.134505abusebot-8.cloudsearch.cf sshd[3161]: Invalid user admin from 201.149.20.162 port 35216
...
2020-08-18 13:42:50
103.219.112.47 attackbotsspam
$f2bV_matches
2020-08-18 13:13:08
123.207.144.186 attackbots
2020-08-18T05:51:32.383725centos sshd[32409]: Invalid user rac from 123.207.144.186 port 41838
2020-08-18T05:51:34.327042centos sshd[32409]: Failed password for invalid user rac from 123.207.144.186 port 41838 ssh2
2020-08-18T05:55:31.489663centos sshd[32455]: Invalid user pepper from 123.207.144.186 port 52024
...
2020-08-18 14:00:07
124.110.9.75 attack
Aug 18 06:59:25 jane sshd[10655]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=124.110.9.75 
Aug 18 06:59:26 jane sshd[10655]: Failed password for invalid user teamspeak from 124.110.9.75 port 52388 ssh2
...
2020-08-18 13:12:46
193.169.255.41 attackbots
Aug 18 06:38:28 srv01 postfix/smtpd\[26583\]: warning: unknown\[193.169.255.41\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Aug 18 06:42:22 srv01 postfix/smtpd\[9923\]: warning: unknown\[193.169.255.41\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Aug 18 06:46:36 srv01 postfix/smtpd\[6792\]: warning: unknown\[193.169.255.41\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Aug 18 06:47:38 srv01 postfix/smtpd\[9938\]: warning: unknown\[193.169.255.41\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Aug 18 06:48:21 srv01 postfix/smtpd\[6792\]: warning: unknown\[193.169.255.41\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
...
2020-08-18 13:19:38
43.250.58.161 attackbotsspam
Brute forcing RDP port 3389
2020-08-18 13:43:42
60.30.98.194 attack
Aug 18 07:03:06 meumeu sshd[892349]: Invalid user cam from 60.30.98.194 port 40648
Aug 18 07:03:06 meumeu sshd[892349]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=60.30.98.194 
Aug 18 07:03:06 meumeu sshd[892349]: Invalid user cam from 60.30.98.194 port 40648
Aug 18 07:03:08 meumeu sshd[892349]: Failed password for invalid user cam from 60.30.98.194 port 40648 ssh2
Aug 18 07:06:46 meumeu sshd[892483]: Invalid user joomla from 60.30.98.194 port 24575
Aug 18 07:06:46 meumeu sshd[892483]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=60.30.98.194 
Aug 18 07:06:46 meumeu sshd[892483]: Invalid user joomla from 60.30.98.194 port 24575
Aug 18 07:06:48 meumeu sshd[892483]: Failed password for invalid user joomla from 60.30.98.194 port 24575 ssh2
Aug 18 07:10:35 meumeu sshd[892700]: Invalid user gisele from 60.30.98.194 port 7775
...
2020-08-18 13:13:29
186.206.157.34 attack
Invalid user est from 186.206.157.34 port 49982
2020-08-18 13:18:33

最近上报的IP列表

2606:4700:10::ac43:2597 2606:4700:10::6816:63 110.78.158.124 60.5.58.181
189.91.3.122 139.67.93.201 217.18.147.166 3.82.107.242
216.9.225.23 47.86.85.77 40.124.174.199 112.82.164.143
36.5.92.117 154.205.2.80 74.248.17.231 170.64.226.106
2606:4700:10::6816:717 180.213.222.219 54.162.117.154 192.253.248.180