必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): Ho Chi Minh City

省份(region): Ho Chi Minh

国家(country): Vietnam

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 14.234.70.245
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 15131
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;14.234.70.245.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025062800 1800 900 604800 86400

;; Query time: 57 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Jun 28 21:03:53 CST 2025
;; MSG SIZE  rcvd: 106
HOST信息:
245.70.234.14.in-addr.arpa domain name pointer static.vnpt.vn.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
245.70.234.14.in-addr.arpa	name = static.vnpt.vn.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
138.197.200.16 attack
Sep 29 22:03:57 ns382633 sshd\[5327\]: Invalid user sybase from 138.197.200.16 port 51536
Sep 29 22:03:57 ns382633 sshd\[5327\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.197.200.16
Sep 29 22:03:59 ns382633 sshd\[5327\]: Failed password for invalid user sybase from 138.197.200.16 port 51536 ssh2
Sep 29 22:08:59 ns382633 sshd\[6266\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.197.200.16  user=root
Sep 29 22:09:01 ns382633 sshd\[6266\]: Failed password for root from 138.197.200.16 port 55498 ssh2
2020-09-30 06:45:57
189.213.158.151 attackspam
Automatic report - Port Scan Attack
2020-09-30 06:12:00
112.85.42.67 attackspambots
Sep 29 23:52:10 mail sshd[31436]: refused connect from 112.85.42.67 (112.85.42.67)
Sep 29 23:53:03 mail sshd[31474]: refused connect from 112.85.42.67 (112.85.42.67)
Sep 29 23:53:55 mail sshd[31497]: refused connect from 112.85.42.67 (112.85.42.67)
Sep 29 23:54:51 mail sshd[31568]: refused connect from 112.85.42.67 (112.85.42.67)
Sep 29 23:55:43 mail sshd[31605]: refused connect from 112.85.42.67 (112.85.42.67)
...
2020-09-30 06:15:40
62.211.97.105 attackbotsspam
Icarus honeypot on github
2020-09-30 06:24:23
122.168.125.226 attackbotsspam
$f2bV_matches
2020-09-30 06:46:59
27.154.66.175 attackspambots
Invalid user tf2 from 27.154.66.175 port 22834
2020-09-30 06:48:42
139.155.85.67 attackbotsspam
Invalid user allison from 139.155.85.67 port 58114
2020-09-30 06:12:56
106.13.181.242 attackbotsspam
[N3.H3.VM3] Port Scanner Detected Blocked by UFW
2020-09-30 06:22:16
49.232.111.165 attackbots
Time:     Tue Sep 29 16:50:12 2020 +0000
IP:       49.232.111.165 (CN/China/-)
Failures: 5 (sshd)
Interval: 3600 seconds
Blocked:  Permanent Block [LF_SSHD]

Log entries:

Sep 29 16:42:02 29-1 sshd[5438]: Invalid user edu from 49.232.111.165 port 48288
Sep 29 16:42:04 29-1 sshd[5438]: Failed password for invalid user edu from 49.232.111.165 port 48288 ssh2
Sep 29 16:46:41 29-1 sshd[6174]: Invalid user word from 49.232.111.165 port 35234
Sep 29 16:46:43 29-1 sshd[6174]: Failed password for invalid user word from 49.232.111.165 port 35234 ssh2
Sep 29 16:50:09 29-1 sshd[6715]: Invalid user tina from 49.232.111.165 port 42820
2020-09-30 06:42:36
119.123.226.56 attack
Invalid user grace from 119.123.226.56 port 2860
2020-09-30 06:50:23
45.142.120.215 attackspam
Sep  4 15:06:14 mail postfix/smtpd[3805]: warning: unknown[45.142.120.215]: SASL LOGIN authentication failed: authentication failure
2020-09-30 06:40:07
152.32.173.160 attackbots
Sep 29 23:57:53 lnxded63 sshd[31946]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=152.32.173.160
Sep 29 23:57:53 lnxded63 sshd[31946]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=152.32.173.160
2020-09-30 06:20:07
117.187.16.105 attack
Port Scan
...
2020-09-30 06:07:20
106.69.228.182 attackspam
Automatic report - Banned IP Access
2020-09-30 06:43:28
167.71.109.96 attack
bruteforce detected
2020-09-30 06:12:32

最近上报的IP列表

162.34.95.17 169.246.167.171 15.16.202.245 13.90.33.234
127.20.6.45 165.95.28.118 120.86.146.12 120.56.145.34
30.66.230.210 7.62.180.210 119.144.195.248 136.83.40.157
154.180.22.147 96.255.239.153 101.247.155.30 110.114.148.202
105.251.226.209 1.128.162.108 1.118.253.93 116.7.174.162