必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): Viet Nam

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
IP 类型 评论内容 时间
14.232.136.164 attackbots
20/6/29@23:56:19: FAIL: Alarm-Network address from=14.232.136.164
...
2020-06-30 12:31:28
14.232.135.165 attackspam
1590580366 - 05/27/2020 13:52:46 Host: 14.232.135.165/14.232.135.165 Port: 445 TCP Blocked
2020-05-28 00:06:55
14.232.133.76 attackspambots
1588670230 - 05/05/2020 11:17:10 Host: 14.232.133.76/14.232.133.76 Port: 445 TCP Blocked
2020-05-05 22:01:55
14.232.136.10 attackspambots
Honeypot attack, port: 445, PTR: static.vnpt.vn.
2020-05-04 04:10:18
14.232.135.170 attack
SSH bruteforce (Triggered fail2ban)
2020-02-15 14:25:57
14.232.131.227 attackspambots
Unauthorized connection attempt from IP address 14.232.131.227 on Port 445(SMB)
2020-01-08 00:46:05
14.232.133.196 attackspam
Unauthorized connection attempt from IP address 14.232.133.196 on Port 445(SMB)
2019-11-17 22:49:04
14.232.136.34 attack
Autoban   14.232.136.34 AUTH/CONNECT
2019-11-16 05:18:07
14.232.132.212 attack
Unauthorized connection attempt from IP address 14.232.132.212 on Port 445(SMB)
2019-10-10 00:42:06
14.232.134.196 attack
Lines containing failures of 14.232.134.196
Jul 11 06:49:50 server-name sshd[11150]: Invalid user admin from 14.232.134.196 port 58722
Jul 11 06:49:50 server-name sshd[11150]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=14.232.134.196 
Jul 11 06:49:52 server-name sshd[11150]: Failed password for invalid user admin from 14.232.134.196 port 58722 ssh2


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=14.232.134.196
2019-07-12 05:52:23
14.232.132.57 attackbotsspam
@LucianNitescu Personal Honeypot Network <<<>>> Donate at paypal.me/LNitescu <<<>>> 2019-07-01 02:24:36,271 INFO [amun_request_handler] PortScan Detected on Port: 445 (14.232.132.57)
2019-07-01 17:25:36
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 14.232.13.158
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 64307
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;14.232.13.158.			IN	A

;; AUTHORITY SECTION:
.			588	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022022700 1800 900 604800 86400

;; Query time: 21 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Feb 27 13:49:22 CST 2022
;; MSG SIZE  rcvd: 106
HOST信息:
158.13.232.14.in-addr.arpa domain name pointer static.vnpt.vn.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
158.13.232.14.in-addr.arpa	name = static.vnpt.vn.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
117.48.231.173 attackspambots
SSH Brute-Force reported by Fail2Ban
2020-01-16 15:41:22
36.57.177.171 attackspam
fell into ViewStateTrap:wien2018
2020-01-16 15:39:38
64.44.40.66 attackspam
Unauthorized connection attempt detected from IP address 64.44.40.66 to port 23 [J]
2020-01-16 15:26:46
183.81.18.169 attack
Unauthorized connection attempt detected from IP address 183.81.18.169 to port 23 [J]
2020-01-16 15:52:53
52.196.212.60 attack
Unauthorized connection attempt detected from IP address 52.196.212.60 to port 2220 [J]
2020-01-16 15:24:46
183.83.202.56 attackbotsspam
1579150277 - 01/16/2020 05:51:17 Host: 183.83.202.56/183.83.202.56 Port: 445 TCP Blocked
2020-01-16 15:41:07
37.230.117.250 attackspam
Jan 16 05:20:33 herz-der-gamer sshd[5695]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=37.230.117.250  user=root
Jan 16 05:20:35 herz-der-gamer sshd[5695]: Failed password for root from 37.230.117.250 port 56280 ssh2
Jan 16 05:50:58 herz-der-gamer sshd[15346]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=37.230.117.250  user=root
Jan 16 05:51:01 herz-der-gamer sshd[15346]: Failed password for root from 37.230.117.250 port 51298 ssh2
...
2020-01-16 15:52:21
5.135.146.51 attack
2020-01-16T07:22:15.348635shield sshd\[8152\]: Invalid user Redistoor from 5.135.146.51 port 44634
2020-01-16T07:22:15.352363shield sshd\[8152\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.ip-5-135-146.eu
2020-01-16T07:22:17.351624shield sshd\[8152\]: Failed password for invalid user Redistoor from 5.135.146.51 port 44634 ssh2
2020-01-16T07:25:14.070575shield sshd\[9477\]: Invalid user ts3srv from 5.135.146.51 port 44060
2020-01-16T07:25:14.079160shield sshd\[9477\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.ip-5-135-146.eu
2020-01-16 15:40:04
81.22.63.235 attack
[portscan] Port scan
2020-01-16 15:57:25
94.198.55.91 attackspam
Invalid user aastorp from 94.198.55.91 port 41990
2020-01-16 15:38:42
79.137.73.253 attack
Unauthorized connection attempt detected from IP address 79.137.73.253 to port 2220 [J]
2020-01-16 15:43:25
85.140.2.117 attackbotsspam
9057518578@mail.ru
Заберите Ваш подарок 38209 р - http://uhabykuwuj.tk/638209_UhkomXhdA pyat
2020-01-16 15:39:01
106.12.58.4 attack
Jan 16 00:13:27 ny01 sshd[8715]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.58.4
Jan 16 00:13:29 ny01 sshd[8715]: Failed password for invalid user fabrizio from 106.12.58.4 port 59144 ssh2
Jan 16 00:14:26 ny01 sshd[8803]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.58.4
2020-01-16 15:23:17
80.227.68.4 attackspambots
Unauthorized connection attempt detected from IP address 80.227.68.4 to port 2220 [J]
2020-01-16 15:45:49
190.85.54.158 attack
Jan 16 09:18:09 www2 sshd\[49480\]: Failed password for root from 190.85.54.158 port 50207 ssh2Jan 16 09:20:20 www2 sshd\[49860\]: Invalid user fidelis from 190.85.54.158Jan 16 09:20:22 www2 sshd\[49860\]: Failed password for invalid user fidelis from 190.85.54.158 port 59513 ssh2
...
2020-01-16 15:23:46

最近上报的IP列表

211.55.148.142 14.232.13.122 14.232.134.245 14.232.136.224
14.232.149.224 14.232.141.159 14.232.154.213 14.232.122.191
14.232.155.150 14.232.160.234 14.232.154.87 14.232.161.4
14.232.160.253 14.232.163.180 14.232.164.67 14.232.164.81
14.232.163.82 14.232.166.225 14.232.167.59 14.232.164.56