必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): Foshan

省份(region): Guangdong

国家(country): China

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
% [whois.apnic.net]
% Whois data copyright terms    http://www.apnic.net/db/dbcopyright.html

% Information related to '14.208.0.0 - 14.223.255.255'

% Abuse contact for '14.208.0.0 - 14.223.255.255' is 'anti-spam@chinatelecom.cn'

inetnum:        14.208.0.0 - 14.223.255.255
netname:        CHINANET-GD
descr:          CHINANET Guangdong province network
descr:          Data Communication Division
descr:          China Telecom
country:        CN
admin-c:        CH93-AP
tech-c:         IC83-AP
abuse-c:        AC1573-AP
status:         ALLOCATED PORTABLE
remarks:        service provider
remarks:        --------------------------------------------------------
remarks:        To report network abuse, please contact mnt-irt
remarks:        For troubleshooting, please contact tech-c and admin-c
remarks:        Report invalid contact via www.apnic.net/invalidcontact
remarks:        --------------------------------------------------------
notify:         abuse_gdnoc@189.cn
mnt-by:         APNIC-HM
mnt-lower:      MAINT-CHINANET-GD
mnt-irt:        IRT-CHINANET-CN
last-modified:  2021-06-15T08:06:06Z
source:         APNIC

irt:            IRT-CHINANET-CN
address:        No.31 ,jingrong street,beijing
address:        100032
e-mail:         anti-spam@chinatelecom.cn
abuse-mailbox:  anti-spam@chinatelecom.cn
admin-c:        CH93-AP
tech-c:         CH93-AP
auth:           # Filtered
remarks:        anti-spam@chinatelecom.cn was validated on 2025-11-13
mnt-by:         MAINT-CHINANET
last-modified:  2026-03-13T07:12:20Z
source:         APNIC

role:           ABUSE CHINANETCN
country:        ZZ
address:        No.31 ,jingrong street,beijing
address:        100032
phone:          +000000000
e-mail:         anti-spam@chinatelecom.cn
admin-c:        CH93-AP
tech-c:         CH93-AP
nic-hdl:        AC1573-AP
remarks:        Generated from irt object IRT-CHINANET-CN
remarks:        anti-spam@chinatelecom.cn was validated on 2025-11-13
abuse-mailbox:  anti-spam@chinatelecom.cn
mnt-by:         APNIC-ABUSE
last-modified:  2025-11-13T14:15:15Z
source:         APNIC

person:         Chinanet Hostmaster
nic-hdl:        CH93-AP
e-mail:         anti-spam@chinatelecom.cn
address:        No.31 ,jingrong street,beijing
address:        100032
phone:          +86-10-58501724
fax-no:         +86-10-58501724
country:        CN
mnt-by:         MAINT-CHINANET
last-modified:  2022-02-28T06:53:44Z
source:         APNIC

person:         IPMASTER CHINANET-GD
nic-hdl:        IC83-AP
e-mail:         abuse_gdicnoc@163.com
address:        NO.18,RO. ZHONGSHANER,YUEXIU DISTRIC,GUANGZHOU
phone:          +86-20-87189274
fax-no:         +86-20-87189274
country:        CN
mnt-by:         MAINT-CHINANET-GD
remarks:        IPMASTER is not for spam complaint,please send spam complaint to abuse_gdicnoc@163.com
abuse-mailbox:  abuse_gdicnoc@163.com
last-modified:  2021-05-12T09:06:58Z
source:         APNIC

% This query was served by the APNIC Whois Service version 1.88.48 (WHOIS-AU4)
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 14.212.95.63
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 37872
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;14.212.95.63.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2026051600 1800 900 604800 86400

;; Query time: 191 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat May 16 15:01:31 CST 2026
;; MSG SIZE  rcvd: 105
HOST信息:
Host 63.95.212.14.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 63.95.212.14.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
190.36.109.166 attack
Unauthorized connection attempt from IP address 190.36.109.166 on Port 445(SMB)
2020-01-31 21:11:20
59.152.246.174 attack
Unauthorized connection attempt from IP address 59.152.246.174 on Port 445(SMB)
2020-01-31 21:08:39
103.114.208.242 attack
20/1/31@03:45:25: FAIL: Alarm-Network address from=103.114.208.242
20/1/31@03:45:25: FAIL: Alarm-Network address from=103.114.208.242
...
2020-01-31 21:28:04
46.214.111.60 attack
RDP Bruteforce
2020-01-31 20:56:40
78.189.231.126 attackspam
Automatic report - Banned IP Access
2020-01-31 21:02:28
139.162.70.53 attackspam
" "
2020-01-31 20:47:43
144.217.12.237 attackspambots
2020-01-31T03:45:26.811945vostok sshd\[15154\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=237.ip-144-217-12.net  user=root | Triggered by Fail2Ban at Vostok web server
2020-01-31 21:01:48
92.82.223.84 attackspam
(sshd) Failed SSH login from 92.82.223.84 (RO/Romania/adsl92-82-223-84.romtelecom.net): 1 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_TRIGGER; Logs: Jan 31 06:39:03 host sshd[48965]: Invalid user tets from 92.82.223.84 port 58964
2020-01-31 21:14:48
14.231.92.68 attackspam
Unauthorized connection attempt from IP address 14.231.92.68 on Port 445(SMB)
2020-01-31 21:31:13
103.68.11.25 attack
Unauthorized connection attempt from IP address 103.68.11.25 on Port 445(SMB)
2020-01-31 21:32:58
171.251.24.189 attack
20/1/31@03:45:26: FAIL: Alarm-Network address from=171.251.24.189
...
2020-01-31 21:26:52
180.241.47.156 attackspam
Unauthorized connection attempt from IP address 180.241.47.156 on Port 445(SMB)
2020-01-31 21:32:04
78.36.97.216 attackbotsspam
Unauthorized connection attempt detected from IP address 78.36.97.216 to port 2220 [J]
2020-01-31 21:29:07
36.66.69.33 attackbotsspam
Jan 31 13:57:32 sd-53420 sshd\[856\]: Invalid user vajradhar from 36.66.69.33
Jan 31 13:57:32 sd-53420 sshd\[856\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=36.66.69.33
Jan 31 13:57:34 sd-53420 sshd\[856\]: Failed password for invalid user vajradhar from 36.66.69.33 port 15355 ssh2
Jan 31 14:01:19 sd-53420 sshd\[1287\]: Invalid user jasapal from 36.66.69.33
Jan 31 14:01:19 sd-53420 sshd\[1287\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=36.66.69.33
...
2020-01-31 21:13:59
61.153.104.62 attack
" "
2020-01-31 21:08:23

最近上报的IP列表

121.234.219.99 203.194.119.121 192.168.178.179 193.185.140.118
192.154.143.254 43.163.4.179 10.164.101.139 180.93.128.189
103.173.7.239 2606:4700:10::6814:7129 2606:4700:10::6814:8804 208.84.100.82
8.218.201.91 129.226.83.4 57.141.2.94 2606:4700:10::6816:970
204.1.79.0 37.10.113.219 192.3.235.72 2606:4700:10::6816:2794