必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): unknown

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
IP 类型 评论内容 时间
14.226.161.174 attack
1582519866 - 02/24/2020 05:51:06 Host: 14.226.161.174/14.226.161.174 Port: 445 TCP Blocked
2020-02-24 16:53:54
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 14.226.16.142
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 27504
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;14.226.16.142.			IN	A

;; AUTHORITY SECTION:
.			245	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022030803 1800 900 604800 86400

;; Query time: 66 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Mar 09 08:54:49 CST 2022
;; MSG SIZE  rcvd: 106
HOST信息:
142.16.226.14.in-addr.arpa domain name pointer static.vnpt.vn.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
142.16.226.14.in-addr.arpa	name = static.vnpt.vn.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
45.55.86.19 attackbots
Dec 20 04:49:46 php1 sshd\[4703\]: Invalid user griswold from 45.55.86.19
Dec 20 04:49:46 php1 sshd\[4703\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.55.86.19
Dec 20 04:49:48 php1 sshd\[4703\]: Failed password for invalid user griswold from 45.55.86.19 port 45235 ssh2
Dec 20 04:55:25 php1 sshd\[5570\]: Invalid user engeli from 45.55.86.19
Dec 20 04:55:25 php1 sshd\[5570\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.55.86.19
2019-12-20 23:03:00
77.87.100.196 attackspambots
Attempt to attack host OS, exploiting network vulnerabilities, on 20-12-2019 14:55:12.
2019-12-20 23:19:18
59.93.10.121 attackspam
Attempt to attack host OS, exploiting network vulnerabilities, on 20-12-2019 14:55:11.
2019-12-20 23:21:37
103.105.195.230 attackbotsspam
103.105.195.230 - - \[20/Dec/2019:15:55:13 +0100\] "POST /wp-login.php HTTP/1.0" 200 7682 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0"
103.105.195.230 - - \[20/Dec/2019:15:55:17 +0100\] "POST /wp-login.php HTTP/1.0" 200 7512 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0"
103.105.195.230 - - \[20/Dec/2019:15:55:20 +0100\] "POST /wp-login.php HTTP/1.0" 200 7506 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0"
2019-12-20 23:04:32
59.94.94.213 attackspambots
Attempt to attack host OS, exploiting network vulnerabilities, on 20-12-2019 14:55:11.
2019-12-20 23:19:45
67.205.135.127 attackspambots
Dec 20 14:55:22 *** sshd[12582]: Invalid user confluence1 from 67.205.135.127
2019-12-20 23:03:42
80.82.78.100 attack
Dec 20 15:17:06 debian-2gb-nbg1-2 kernel: \[504188.589788\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=80.82.78.100 DST=195.201.40.59 LEN=29 TOS=0x00 PREC=0x00 TTL=247 ID=54321 PROTO=UDP SPT=42672 DPT=998 LEN=9
2019-12-20 22:52:55
36.65.36.57 attackbotsspam
Unauthorized connection attempt detected from IP address 36.65.36.57 to port 445
2019-12-20 23:04:11
85.209.0.126 attackspambots
TCP Port Scanning
2019-12-20 22:45:29
41.224.59.78 attackbots
Dec 20 16:59:39 hosting sshd[17704]: Invalid user bella from 41.224.59.78 port 34416
...
2019-12-20 22:47:18
172.93.4.78 attackspambots
Invalid user web from 172.93.4.78 port 34370
2019-12-20 22:50:14
40.92.3.22 attackbots
Dec 20 17:55:12 debian-2gb-vpn-nbg1-1 kernel: [1232070.780513] [UFW BLOCK] IN=eth0 OUT= MAC=96:00:00:38:96:44:d2:74:7f:6e:37:e3:08:00 SRC=40.92.3.22 DST=78.46.192.101 LEN=40 TOS=0x00 PREC=0x00 TTL=233 ID=40670 DF PROTO=TCP SPT=30862 DPT=25 WINDOW=0 RES=0x00 ACK RST URGP=0
2019-12-20 23:20:22
51.91.100.236 attack
Dec 20 15:39:02 localhost sshd\[24761\]: Invalid user justme from 51.91.100.236 port 38198
Dec 20 15:39:02 localhost sshd\[24761\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.91.100.236
Dec 20 15:39:04 localhost sshd\[24761\]: Failed password for invalid user justme from 51.91.100.236 port 38198 ssh2
2019-12-20 22:47:48
129.211.76.101 attackspambots
Invalid user teador from 129.211.76.101 port 32938
2019-12-20 22:45:13
178.62.75.60 attackbotsspam
Dec 20 15:20:38 minden010 sshd[3886]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.62.75.60
Dec 20 15:20:40 minden010 sshd[3886]: Failed password for invalid user testingphp from 178.62.75.60 port 40664 ssh2
Dec 20 15:26:03 minden010 sshd[5542]: Failed password for root from 178.62.75.60 port 47544 ssh2
...
2019-12-20 22:54:48

最近上报的IP列表

14.226.16.7 14.226.161.243 118.67.222.10 118.67.222.130
118.67.222.138 118.67.222.154 118.67.222.198 118.67.222.242
118.67.222.245 14.229.158.253 14.229.205.14 14.229.204.34
14.229.227.55 14.229.212.117 14.229.237.144 14.229.24.214
14.229.25.214 14.229.242.176 14.229.230.9 14.229.216.69