必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): Viet Nam

运营商(isp): Vietnam Posts and Telecommunications Group

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
类型 评论内容 时间
attackspambots
(ftpd) Failed FTP login from 14.250.19.93 (VN/Vietnam/static.vnpt.vn): 10 in the last 3600 secs; ID: rub
2020-06-27 16:18:33
相同子网IP讨论:
IP 类型 评论内容 时间
14.250.199.241 attack
1578920573 - 01/13/2020 14:02:53 Host: 14.250.199.241/14.250.199.241 Port: 445 TCP Blocked
2020-01-14 04:29:07
14.250.193.233 attackbots
Unauthorized connection attempt from IP address 14.250.193.233 on Port 445(SMB)
2020-01-03 19:38:12
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 14.250.19.93
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 17246
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;14.250.19.93.			IN	A

;; AUTHORITY SECTION:
.			219	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2020062700 1800 900 604800 86400

;; Query time: 123 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Jun 27 16:18:27 CST 2020
;; MSG SIZE  rcvd: 116
HOST信息:
93.19.250.14.in-addr.arpa domain name pointer static.vnpt.vn.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
93.19.250.14.in-addr.arpa	name = static.vnpt.vn.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
82.209.83.201 attackbots
Honeypot attack, port: 81, PTR: pool-83-201.ptcomm.ru.
2020-02-10 08:56:35
75.89.189.143 attackbotsspam
Honeypot attack, port: 81, PTR: h143.189.89.75.dynamic.ip.windstream.net.
2020-02-10 09:10:31
68.183.31.138 attackspam
" "
2020-02-10 09:13:38
106.52.84.117 attack
Lines containing failures of 106.52.84.117
Feb  7 19:45:58 mx-in-02 sshd[4608]: Invalid user wz from 106.52.84.117 port 45754
Feb  7 19:45:58 mx-in-02 sshd[4608]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.52.84.117 
Feb  7 19:45:59 mx-in-02 sshd[4608]: Failed password for invalid user wz from 106.52.84.117 port 45754 ssh2


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=106.52.84.117
2020-02-10 08:54:16
92.116.57.87 attack
Brute force attempt
2020-02-10 09:28:57
180.76.134.238 attackspam
Feb 10 02:13:09 legacy sshd[32492]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.76.134.238
Feb 10 02:13:12 legacy sshd[32492]: Failed password for invalid user kvq from 180.76.134.238 port 52312 ssh2
Feb 10 02:17:32 legacy sshd[32662]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.76.134.238
...
2020-02-10 09:24:06
74.122.54.78 attackbotsspam
Automatic report - Port Scan Attack
2020-02-10 09:09:46
118.25.63.170 attackbotsspam
Feb  9 22:44:52 PAR-161229 sshd[46779]: Failed password for invalid user qwy from 118.25.63.170 port 16562 ssh2
Feb  9 23:02:50 PAR-161229 sshd[46954]: Failed password for invalid user yhw from 118.25.63.170 port 53471 ssh2
Feb  9 23:06:24 PAR-161229 sshd[46980]: Failed password for invalid user agf from 118.25.63.170 port 23338 ssh2
2020-02-10 09:02:52
185.143.221.55 attackspam
02/10/2020-00:55:36.229725 185.143.221.55 Protocol: 6 ET DROP Dshield Block Listed Source group 1
2020-02-10 09:00:52
83.11.224.118 attackspam
Lines containing failures of 83.11.224.118
Feb  8 22:05:15 shared05 sshd[7394]: Invalid user apd from 83.11.224.118 port 57344
Feb  8 22:05:15 shared05 sshd[7394]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=83.11.224.118
Feb  8 22:05:17 shared05 sshd[7394]: Failed password for invalid user apd from 83.11.224.118 port 57344 ssh2
Feb  8 22:05:17 shared05 sshd[7394]: Received disconnect from 83.11.224.118 port 57344:11: Bye Bye [preauth]
Feb  8 22:05:17 shared05 sshd[7394]: Disconnected from invalid user apd 83.11.224.118 port 57344 [preauth]


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=83.11.224.118
2020-02-10 09:24:26
82.223.14.245 attack
02/09/2020-23:06:24.322700 82.223.14.245 Protocol: 6 ET TOR Known Tor Exit Node Traffic group 82
2020-02-10 09:03:36
119.236.95.229 attackbots
Honeypot attack, port: 5555, PTR: n11923695229.netvigator.com.
2020-02-10 09:34:37
128.199.123.170 attackbotsspam
5x Failed Password
2020-02-10 09:30:23
103.114.104.210 attack
Feb 10 05:06:28 lcl-usvr-02 sshd[9062]: Invalid user support from 103.114.104.210 port 51618
...
2020-02-10 08:57:57
59.125.83.121 attack
Telnet/23 MH Probe, BF, Hack -
2020-02-10 08:56:19

最近上报的IP列表

139.67.210.162 246.217.211.50 92.160.217.85 166.35.89.92
171.236.72.82 201.18.237.242 0.110.204.202 30.87.171.12
5.62.60.179 20.70.131.205 125.250.129.24 160.251.148.107
27.33.200.56 36.79.47.150 171.241.142.186 109.252.80.191
180.76.104.247 188.122.82.215 87.150.123.248 87.199.26.86