必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): Viet Nam

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 14.232.39.142
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 10854
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;14.232.39.142.			IN	A

;; AUTHORITY SECTION:
.			449	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022030803 1800 900 604800 86400

;; Query time: 73 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Mar 09 08:55:53 CST 2022
;; MSG SIZE  rcvd: 106
HOST信息:
142.39.232.14.in-addr.arpa domain name pointer static.vnpt.vn.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
142.39.232.14.in-addr.arpa	name = static.vnpt.vn.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
206.167.33.12 attack
Oct  7 22:19:14 game-panel sshd[30036]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=206.167.33.12
Oct  7 22:19:15 game-panel sshd[30036]: Failed password for invalid user #$%ertdfgCVB from 206.167.33.12 port 49892 ssh2
Oct  7 22:23:50 game-panel sshd[30216]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=206.167.33.12
2019-10-08 06:35:17
186.46.227.76 attackspambots
Attempt to attack host OS, exploiting network vulnerabilities, on 07-10-2019 20:50:31.
2019-10-08 06:31:00
221.195.234.108 attack
Oct  7 22:31:31 game-panel sshd[30534]: Failed password for root from 221.195.234.108 port 52454 ssh2
Oct  7 22:35:23 game-panel sshd[30732]: Failed password for root from 221.195.234.108 port 54332 ssh2
2019-10-08 06:43:07
131.108.158.210 attackbots
Attempt to attack host OS, exploiting network vulnerabilities, on 07-10-2019 20:50:24.
2019-10-08 06:43:33
114.32.35.140 attack
Attempt to attack host OS, exploiting network vulnerabilities, on 07-10-2019 20:50:22.
2019-10-08 06:47:34
187.11.218.243 attack
Attempt to attack host OS, exploiting network vulnerabilities, on 07-10-2019 20:50:32.
2019-10-08 06:30:15
200.87.69.210 attack
Attempt to attack host OS, exploiting network vulnerabilities, on 07-10-2019 20:50:36.
2019-10-08 06:22:12
122.225.100.82 attackspambots
Oct  7 18:36:11 plusreed sshd[8331]: Invalid user P4ssw0rt1234% from 122.225.100.82
...
2019-10-08 06:45:21
216.13.74.194 attack
Attempt to attack host OS, exploiting network vulnerabilities, on 07-10-2019 20:50:39.
2019-10-08 06:16:45
103.16.14.171 attackspambots
Automatic report - Port Scan Attack
2019-10-08 06:49:24
222.186.15.18 attack
Oct  7 18:01:11 ny01 sshd[9553]: Failed password for root from 222.186.15.18 port 41524 ssh2
Oct  7 18:02:01 ny01 sshd[9682]: Failed password for root from 222.186.15.18 port 35422 ssh2
2019-10-08 06:28:43
14.226.250.27 attack
Attempt to attack host OS, exploiting network vulnerabilities, on 07-10-2019 20:50:26.
2019-10-08 06:41:54
187.189.145.33 attackbotsspam
Attempt to attack host OS, exploiting network vulnerabilities, on 07-10-2019 20:50:33.
2019-10-08 06:29:31
94.191.76.19 attackbotsspam
2019-10-07T18:26:13.6119761495-001 sshd\[9296\]: Failed password for invalid user Coco123 from 94.191.76.19 port 42920 ssh2
2019-10-07T18:38:58.2276471495-001 sshd\[10280\]: Invalid user Box2017 from 94.191.76.19 port 35482
2019-10-07T18:38:58.2364491495-001 sshd\[10280\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=94.191.76.19
2019-10-07T18:38:59.7857541495-001 sshd\[10280\]: Failed password for invalid user Box2017 from 94.191.76.19 port 35482 ssh2
2019-10-07T18:43:21.3470971495-001 sshd\[10604\]: Invalid user Cent0s1234 from 94.191.76.19 port 42420
2019-10-07T18:43:21.3500391495-001 sshd\[10604\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=94.191.76.19
...
2019-10-08 06:55:44
207.135.179.27 attackspam
Attempt to attack host OS, exploiting network vulnerabilities, on 07-10-2019 20:50:38.
2019-10-08 06:20:26

最近上报的IP列表

14.232.4.194 118.67.89.199 14.232.41.75 14.232.41.197
14.232.44.120 14.232.65.173 14.232.77.236 14.232.72.231
14.232.83.208 14.232.85.95 14.232.88.149 14.232.93.84
14.232.97.215 14.232.97.125 14.232.93.37 118.68.1.117
14.232.92.79 14.233.100.135 14.232.97.58 14.233.105.14