必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): Viet Nam

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 14.237.139.94
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 9145
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;14.237.139.94.			IN	A

;; AUTHORITY SECTION:
.			102	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022020701 1800 900 604800 86400

;; Query time: 14 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Feb 08 05:28:41 CST 2022
;; MSG SIZE  rcvd: 106
HOST信息:
94.139.237.14.in-addr.arpa domain name pointer static.vnpt.vn.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
94.139.237.14.in-addr.arpa	name = static.vnpt.vn.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
176.10.118.193 attackspambots
1561729035 - 06/28/2019 15:37:15 Host: 176.10.118.193/176.10.118.193 Port: 1900 UDP Blocked
2019-06-29 05:39:37
213.238.223.27 attack
Jun 28 07:45:20 dropbear[32467]: Login attempt for nonexistent user from 213.238.223.27:43866
Jun 28 07:45:20 dropbear[32467]: Login attempt for nonexistent user from 213.238.223.27:43866
Jun 28 07:45:21 dropbear[32467]: Login attempt for nonexistent user from 213.238.223.27:43866
2019-06-29 06:01:13
139.199.174.58 attackbotsspam
Invalid user usuario from 139.199.174.58 port 33930
2019-06-29 05:58:51
94.101.181.238 attackspambots
Jun 28 15:37:01 nextcloud sshd\[16174\]: Invalid user web3 from 94.101.181.238
Jun 28 15:37:01 nextcloud sshd\[16174\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=94.101.181.238
Jun 28 15:37:03 nextcloud sshd\[16174\]: Failed password for invalid user web3 from 94.101.181.238 port 37208 ssh2
...
2019-06-29 05:40:02
162.243.4.134 attackspam
Jun 28 15:37:18 nextcloud sshd\[16600\]: Invalid user sang from 162.243.4.134
Jun 28 15:37:18 nextcloud sshd\[16600\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=162.243.4.134
Jun 28 15:37:19 nextcloud sshd\[16600\]: Failed password for invalid user sang from 162.243.4.134 port 32794 ssh2
...
2019-06-29 05:35:43
37.187.196.64 attackbotsspam
Automatic report generated by Wazuh
2019-06-29 05:47:07
172.105.226.61 attackspambots
" "
2019-06-29 05:33:39
5.148.3.212 attack
Jun 28 22:54:24 SilenceServices sshd[913]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=5.148.3.212
Jun 28 22:54:26 SilenceServices sshd[913]: Failed password for invalid user toragemgmt from 5.148.3.212 port 43687 ssh2
Jun 28 22:56:17 SilenceServices sshd[3400]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=5.148.3.212
2019-06-29 06:08:29
217.32.246.90 attack
Jun 28 10:01:19 vps200512 sshd\[17514\]: Invalid user monitoring from 217.32.246.90
Jun 28 10:01:19 vps200512 sshd\[17514\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=217.32.246.90
Jun 28 10:01:22 vps200512 sshd\[17514\]: Failed password for invalid user monitoring from 217.32.246.90 port 45540 ssh2
Jun 28 10:03:01 vps200512 sshd\[17533\]: Invalid user bei from 217.32.246.90
Jun 28 10:03:01 vps200512 sshd\[17533\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=217.32.246.90
2019-06-29 05:41:47
192.99.57.193 attack
$f2bV_matches
2019-06-29 06:01:44
77.42.126.114 attackspambots
Telnet Server BruteForce Attack
2019-06-29 05:27:15
124.166.240.130 attack
2202/tcp 2203/tcp 2200/tcp...
[2019-04-28/06-28]186pkt,75pt.(tcp)
2019-06-29 05:38:43
132.232.236.206 attackbotsspam
[FriJun2815:36:15.0200112019][:error][pid19998:tid47129072404224][client132.232.236.206:1809][client132.232.236.206]ModSecurity:Accessdeniedwithcode403\(phase2\).Patternmatch"/wp-config.php"atREQUEST_FILENAME.[file"/etc/apache2/conf.d/modsec_rules/99_asl_jitp.conf"][line"3411"][id"381206"][rev"1"][msg"Atomicorp.comWAFRules-VirtualJustInTimePatch:AccesstoWordPressconfigurationfileblocked"][data"/wp-config.php"][severity"CRITICAL"][hostname"136.243.224.56"][uri"/wp-config.php"][unique_id"XRYXz@b2FwWmHlVINHhLpgAAABI"][FriJun2815:37:28.8103362019][:error][pid19998:tid47129049290496][client132.232.236.206:12740][client132.232.236.206]ModSecurity:Accessdeniedwithcode404\(phase2\).Patternmatch"\(\?:/images/stories/\|/components/com_smartformer/files/\|/uploaded_files/user/\|uploads/job-manager-uploads/\).\*\\\\\\\\.php"atREQUEST_URI.[file"/etc/apache2/conf.d/modsec_rules/50_asl_rootkits.conf"][line"71"][id"318812"][rev"2"][msg"Atomicorp.comWAFRules:PossibleAttempttoAccessunauthorized
2019-06-29 05:31:40
113.173.167.49 attackbots
Jun 28 16:36:26 srv-4 sshd\[18878\]: Invalid user admin from 113.173.167.49
Jun 28 16:36:26 srv-4 sshd\[18878\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=113.173.167.49
Jun 28 16:36:29 srv-4 sshd\[18878\]: Failed password for invalid user admin from 113.173.167.49 port 38563 ssh2
...
2019-06-29 05:49:52
5.62.41.170 attackbots
Multiple brute forced RDP login attempts detected
2019-06-29 05:42:38

最近上报的IP列表

112.47.210.57 118.73.149.4 92.113.190.47 102.191.172.87
71.207.56.74 190.200.136.246 222.158.170.86 120.85.92.249
185.78.10.196 45.72.95.134 182.61.18.57 220.189.204.182
83.177.191.12 186.19.125.148 103.169.56.40 79.162.214.140
46.28.72.69 125.70.57.202 46.227.37.37 139.47.101.80