必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): Viet Nam

运营商(isp): Vietnam Posts and Telecommunications Group

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
类型 评论内容 时间
attack
2020-03-10T09:21:49.772Z CLOSE host=14.244.50.205 port=58537 fd=4 time=50.039 bytes=67
...
2020-03-10 22:41:26
相同子网IP讨论:
IP 类型 评论内容 时间
14.244.50.224 attack
1588477916 - 05/03/2020 05:51:56 Host: 14.244.50.224/14.244.50.224 Port: 445 TCP Blocked
2020-05-03 15:58:32
14.244.50.80 attack
Unauthorized connection attempt from IP address 14.244.50.80 on Port 445(SMB)
2019-11-11 00:14:06
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 14.244.50.205
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 23416
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;14.244.50.205.			IN	A

;; AUTHORITY SECTION:
.			279	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2020031000 1800 900 604800 86400

;; Query time: 99 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Mar 10 22:41:13 CST 2020
;; MSG SIZE  rcvd: 117
HOST信息:
205.50.244.14.in-addr.arpa domain name pointer static.vnpt.vn.
NSLOOKUP信息:
Server:		100.100.2.138
Address:	100.100.2.138#53

Non-authoritative answer:
205.50.244.14.in-addr.arpa	name = static.vnpt.vn.

Authoritative answers can be found from:

相关IP信息:
最新评论:
IP 类型 评论内容 时间
14.183.248.151 attackbotsspam
Honeypot attack, port: 445, PTR: static.vnpt.vn.
2020-04-07 02:22:46
84.197.253.234 attackspambots
SSH-bruteforce attempts
2020-04-07 02:22:25
38.78.210.125 attack
Apr  6 20:01:57 OPSO sshd\[27713\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=38.78.210.125  user=root
Apr  6 20:01:59 OPSO sshd\[27713\]: Failed password for root from 38.78.210.125 port 57590 ssh2
Apr  6 20:05:51 OPSO sshd\[28503\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=38.78.210.125  user=root
Apr  6 20:05:54 OPSO sshd\[28503\]: Failed password for root from 38.78.210.125 port 33669 ssh2
Apr  6 20:09:44 OPSO sshd\[29057\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=38.78.210.125  user=root
2020-04-07 02:12:46
190.6.176.50 attack
Honeypot attack, port: 445, PTR: static-adsl-190-6-176-50.ert.com.co.
2020-04-07 02:16:52
95.177.173.96 attack
Brute force attack against VPN service
2020-04-07 02:22:10
36.76.114.98 attackbotsspam
Honeypot attack, port: 445, PTR: PTR record not found
2020-04-07 01:40:57
159.65.13.233 attackbots
fail2ban/Apr  6 19:01:15 h1962932 sshd[22090]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.65.13.233  user=root
Apr  6 19:01:18 h1962932 sshd[22090]: Failed password for root from 159.65.13.233 port 35654 ssh2
Apr  6 19:03:56 h1962932 sshd[22168]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.65.13.233  user=root
Apr  6 19:03:58 h1962932 sshd[22168]: Failed password for root from 159.65.13.233 port 49236 ssh2
Apr  6 19:06:27 h1962932 sshd[22481]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.65.13.233  user=root
Apr  6 19:06:29 h1962932 sshd[22481]: Failed password for root from 159.65.13.233 port 34588 ssh2
2020-04-07 02:02:03
103.252.42.179 attack
SpamScore above: 10.0
2020-04-07 02:13:47
199.127.61.237 attackbots
Apr  6 18:54:45 debian-2gb-nbg1-2 kernel: \[8451110.295354\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=199.127.61.237 DST=195.201.40.59 LEN=40 TOS=0x00 PREC=0x00 TTL=241 ID=5135 PROTO=TCP SPT=32767 DPT=8545 WINDOW=1024 RES=0x00 SYN URGP=0
2020-04-07 01:53:49
187.190.236.88 attackspam
2020-04-06T13:55:16.686339sorsha.thespaminator.com sshd[4984]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=fixed-187-190-236-88.totalplay.net  user=root
2020-04-06T13:55:18.372962sorsha.thespaminator.com sshd[4984]: Failed password for root from 187.190.236.88 port 33338 ssh2
...
2020-04-07 02:11:38
51.89.21.206 attackbotsspam
51.89.21.206 was recorded 8 times by 6 hosts attempting to connect to the following ports: 5060. Incident counter (4h, 24h, all-time): 8, 34, 1013
2020-04-07 02:19:50
182.254.172.219 attack
Apr  6 18:50:22 hosting sshd[4206]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.254.172.219  user=root
Apr  6 18:50:24 hosting sshd[4206]: Failed password for root from 182.254.172.219 port 57957 ssh2
Apr  6 18:52:41 hosting sshd[4283]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.254.172.219  user=root
Apr  6 18:52:43 hosting sshd[4283]: Failed password for root from 182.254.172.219 port 38132 ssh2
...
2020-04-07 01:49:47
222.186.173.201 attackspam
Apr  6 13:44:05 NPSTNNYC01T sshd[24077]: Failed password for root from 222.186.173.201 port 40432 ssh2
Apr  6 13:44:08 NPSTNNYC01T sshd[24077]: Failed password for root from 222.186.173.201 port 40432 ssh2
Apr  6 13:44:12 NPSTNNYC01T sshd[24077]: Failed password for root from 222.186.173.201 port 40432 ssh2
Apr  6 13:44:18 NPSTNNYC01T sshd[24077]: error: maximum authentication attempts exceeded for root from 222.186.173.201 port 40432 ssh2 [preauth]
...
2020-04-07 01:49:14
123.201.125.126 attackspam
Honeypot attack, port: 445, PTR: 126-125-201-123.static.youbroadband.in.
2020-04-07 02:13:19
45.9.47.42 attackspam
Honeypot attack, port: 445, PTR: PTR record not found
2020-04-07 01:52:00

最近上报的IP列表

187.10.142.74 149.3.124.136 14.234.188.248 104.248.43.155
58.232.54.8 103.11.244.232 59.103.132.22 45.143.222.163
236.147.62.86 166.209.85.132 104.71.217.226 180.34.175.243
180.38.234.185 144.241.176.197 39.24.73.23 125.71.190.67
64.33.156.30 144.217.108.11 36.213.138.34 121.133.146.46