必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): Viet Nam

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
IP 类型 评论内容 时间
14.239.32.159 attack
Unauthorized connection attempt from IP address 14.239.32.159 on Port 445(SMB)
2020-04-30 05:08:33
14.239.32.245 attackspambots
Unauthorized connection attempt from IP address 14.239.32.245 on Port 445(SMB)
2019-08-30 20:42:54
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 14.239.32.20
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 27732
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;14.239.32.20.			IN	A

;; AUTHORITY SECTION:
.			586	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022030803 1800 900 604800 86400

;; Query time: 25 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Mar 09 08:56:49 CST 2022
;; MSG SIZE  rcvd: 105
HOST信息:
20.32.239.14.in-addr.arpa domain name pointer static.vnpt.vn.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
20.32.239.14.in-addr.arpa	name = static.vnpt.vn.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
128.199.118.81 attack
Jul 19 18:44:46 fr01 sshd[15034]: Invalid user ss from 128.199.118.81
Jul 19 18:44:46 fr01 sshd[15034]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.199.118.81
Jul 19 18:44:46 fr01 sshd[15034]: Invalid user ss from 128.199.118.81
Jul 19 18:44:49 fr01 sshd[15034]: Failed password for invalid user ss from 128.199.118.81 port 41142 ssh2
...
2019-07-20 02:47:50
191.53.252.192 attackspambots
$f2bV_matches
2019-07-20 02:23:11
81.144.129.98 attackbots
445/tcp 445/tcp 445/tcp...
[2019-05-20/07-19]16pkt,1pt.(tcp)
2019-07-20 02:31:39
71.42.101.242 spamattackproxy
THIS ALWAYS SAYS IM IN SAN ANTONIO, ME AND MY COMPUTER ARE IN DALLAS,TEXAS
2019-07-20 02:24:16
153.36.236.242 attackbotsspam
2019-07-19T17:51:41.447151abusebot-6.cloudsearch.cf sshd\[15239\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=153.36.236.242  user=root
2019-07-20 02:30:08
207.248.56.243 attack
445/tcp 445/tcp
[2019-07-17/19]2pkt
2019-07-20 02:25:02
49.88.112.68 attackspambots
pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.88.112.68  user=root
Failed password for root from 49.88.112.68 port 22795 ssh2
Failed password for root from 49.88.112.68 port 22795 ssh2
Failed password for root from 49.88.112.68 port 22795 ssh2
pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.88.112.68  user=root
2019-07-20 02:49:03
218.92.0.201 attackbots
Jul 19 17:45:33 MK-Soft-VM5 sshd\[11263\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.201  user=root
Jul 19 17:45:34 MK-Soft-VM5 sshd\[11263\]: Failed password for root from 218.92.0.201 port 36501 ssh2
Jul 19 17:46:51 MK-Soft-VM5 sshd\[11267\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.201  user=root
...
2019-07-20 02:29:13
217.124.185.164 attackbotsspam
445/tcp 445/tcp 445/tcp...
[2019-05-25/07-19]9pkt,1pt.(tcp)
2019-07-20 02:26:17
180.153.58.183 attackspam
Jul 19 20:16:41 giegler sshd[24624]: Invalid user ep from 180.153.58.183 port 34480
2019-07-20 02:34:37
165.22.206.167 attackbots
19.07.2019 16:45:24 Connection to port 5500 blocked by firewall
2019-07-20 02:25:55
195.66.179.90 attack
445/tcp 445/tcp 445/tcp...
[2019-05-30/07-19]5pkt,1pt.(tcp)
2019-07-20 03:01:19
179.96.151.114 attackspam
$f2bV_matches
2019-07-20 03:00:26
123.125.71.44 attackbots
Automatic report - Banned IP Access
2019-07-20 02:33:48
137.59.162.169 attack
Jul 19 18:45:36 host sshd\[42777\]: Invalid user studenti from 137.59.162.169 port 33631
Jul 19 18:45:36 host sshd\[42777\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=137.59.162.169
...
2019-07-20 02:19:16

最近上报的IP列表

14.239.3.134 14.239.32.112 14.239.37.20 14.239.62.241
14.239.41.219 14.239.42.184 14.239.53.190 118.68.36.225
14.239.98.185 14.239.89.3 14.240.104.135 14.239.84.179
14.240.106.136 14.240.121.244 14.240.120.196 14.240.133.104
14.239.49.36 14.240.108.88 14.240.156.36 118.69.144.180