必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): Viet Nam

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 14.249.164.201
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 33410
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;14.249.164.201.			IN	A

;; AUTHORITY SECTION:
.			600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022022700 1800 900 604800 86400

;; Query time: 63 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Feb 27 13:51:14 CST 2022
;; MSG SIZE  rcvd: 107
HOST信息:
201.164.249.14.in-addr.arpa domain name pointer static.vnpt.vn.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
201.164.249.14.in-addr.arpa	name = static.vnpt.vn.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
125.74.47.230 attackbotsspam
Nov 19 01:07:54 lnxweb62 sshd[1790]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=125.74.47.230
Nov 19 01:07:54 lnxweb62 sshd[1790]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=125.74.47.230
2019-11-19 08:15:59
5.42.239.197 attack
IP Ban Report :  
 https://help-dysk.pl/wordpress-firewall-plugins/ip/5.42.239.197/ 
 
 SA - 1H : (12)  
 Protection Against DDoS WordPress plugin :  
 "odzyskiwanie danych help-dysk" 
 IP Address Ranges by Country : SA 
 NAME ASN : ASN35753 
 
 IP : 5.42.239.197 
 
 CIDR : 5.42.238.0/23 
 
 PREFIX COUNT : 230 
 
 UNIQUE IP COUNT : 194816 
 
 
 ATTACKS DETECTED ASN35753 :  
  1H - 1 
  3H - 1 
  6H - 1 
 12H - 1 
 24H - 1 
 
 DateTime : 2019-11-18 23:53:44 
 
 INFO : Server 301 - Looking for resource vulnerabilities Detected and Blocked by ADMIN  - data recovery
2019-11-19 07:40:51
51.75.24.200 attack
Nov 18 23:53:14 srv206 sshd[25288]: Invalid user skaar from 51.75.24.200
...
2019-11-19 08:09:27
111.180.134.31 attack
Admin access attempt: 
111.180.134.31 - - [18/Nov/2019:19:22:27 +0000] "HEAD /include/dialog/select_soft_post.php HTTP/1.1" 404 - "-" "-"
2019-11-19 07:46:03
217.107.219.12 attackspam
[munged]::443 217.107.219.12 - - [18/Nov/2019:23:52:59 +0100] "POST /[munged]: HTTP/1.1" 200 9081 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
[munged]::443 217.107.219.12 - - [18/Nov/2019:23:53:00 +0100] "POST /[munged]: HTTP/1.1" 200 9081 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
[munged]::443 217.107.219.12 - - [18/Nov/2019:23:53:00 +0100] "POST /[munged]: HTTP/1.1" 200 9081 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
[munged]::443 217.107.219.12 - - [18/Nov/2019:23:53:01 +0100] "POST /[munged]: HTTP/1.1" 200 9081 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
[munged]::443 217.107.219.12 - - [18/Nov/2019:23:53:01 +0100] "POST /[munged]: HTTP/1.1" 200 9081 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
[munged]::443 217.107.219.12 - - [18/Nov/2019:23:53:02 +0100] "POST /[munged]: HTTP/1.1" 200 9081 "-" "Mozilla/5.0 (X11
2019-11-19 08:13:00
94.13.180.208 attackspam
Honeypot attack, port: 23, PTR: 5e0db4d0.bb.sky.com.
2019-11-19 07:50:28
42.231.206.4 attackspam
port 23 attempt blocked
2019-11-19 07:42:07
118.25.196.31 attackspambots
2019-11-18T23:57:19.809242abusebot-5.cloudsearch.cf sshd\[22214\]: Invalid user 123!@\# from 118.25.196.31 port 36858
2019-11-19 08:00:51
128.199.55.13 attack
SSH invalid-user multiple login attempts
2019-11-19 08:02:38
49.234.60.13 attackspambots
Nov 18 22:45:46 ip-172-31-62-245 sshd\[6671\]: Failed password for backup from 49.234.60.13 port 34868 ssh2\
Nov 18 22:49:44 ip-172-31-62-245 sshd\[6675\]: Invalid user demmel from 49.234.60.13\
Nov 18 22:49:46 ip-172-31-62-245 sshd\[6675\]: Failed password for invalid user demmel from 49.234.60.13 port 40504 ssh2\
Nov 18 22:53:22 ip-172-31-62-245 sshd\[6692\]: Invalid user tomcat1 from 49.234.60.13\
Nov 18 22:53:24 ip-172-31-62-245 sshd\[6692\]: Failed password for invalid user tomcat1 from 49.234.60.13 port 46146 ssh2\
2019-11-19 08:00:37
125.227.13.141 attackspambots
SSH Bruteforce
2019-11-19 08:14:46
106.13.204.251 attackbots
Nov 18 19:40:55 XXX sshd[36174]: Invalid user zurinabi from 106.13.204.251 port 36330
2019-11-19 08:04:43
42.117.244.62 attackbots
port 23 attempt blocked
2019-11-19 07:48:53
180.101.125.226 attackbotsspam
Nov 18 13:23:05 hpm sshd\[30635\]: Invalid user guest from 180.101.125.226
Nov 18 13:23:05 hpm sshd\[30635\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.101.125.226
Nov 18 13:23:07 hpm sshd\[30635\]: Failed password for invalid user guest from 180.101.125.226 port 56206 ssh2
Nov 18 13:27:21 hpm sshd\[30987\]: Invalid user gww from 180.101.125.226
Nov 18 13:27:21 hpm sshd\[30987\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.101.125.226
2019-11-19 08:06:08
116.89.12.18 attackspam
Invalid user pi from 116.89.12.18 port 48900
Invalid user pi from 116.89.12.18 port 48904
pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=116.89.12.18
pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=116.89.12.18
Failed password for invalid user pi from 116.89.12.18 port 48900 ssh2
2019-11-19 07:54:25

最近上报的IP列表

14.249.110.156 14.249.106.4 14.249.127.106 14.249.150.21
14.249.165.1 14.249.167.184 14.249.167.122 14.249.167.200
14.249.167.41 14.249.177.254 14.249.25.122 14.249.167.220
14.249.166.4 14.249.254.154 14.249.180.2 14.249.62.218
14.249.80.105 14.249.204.193 14.250.127.72 14.25.64.94