必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): unknown

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 14.253.168.242
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 44644
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;14.253.168.242.			IN	A

;; AUTHORITY SECTION:
.			392	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022030803 1800 900 604800 86400

;; Query time: 65 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Mar 09 08:58:21 CST 2022
;; MSG SIZE  rcvd: 107
HOST信息:
242.168.253.14.in-addr.arpa domain name pointer static.vnpt.vn.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
242.168.253.14.in-addr.arpa	name = static.vnpt.vn.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
178.62.214.85 attackspambots
Jul 13 23:35:30 dev0-dcde-rnet sshd[5334]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.62.214.85
Jul 13 23:35:32 dev0-dcde-rnet sshd[5334]: Failed password for invalid user hub from 178.62.214.85 port 39502 ssh2
Jul 13 23:41:48 dev0-dcde-rnet sshd[5480]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.62.214.85
2020-07-14 06:35:24
176.193.147.242 attackspambots
firewall-block, port(s): 23/tcp
2020-07-14 06:38:19
95.137.132.203 attack
Unauthorized connection attempt from IP address 95.137.132.203 on Port 445(SMB)
2020-07-14 06:58:41
185.189.121.8 attack
Unauthorized connection attempt from IP address 185.189.121.8 on Port 445(SMB)
2020-07-14 06:38:44
173.236.224.115 attackspambots
GET /wp-login.php HTTP/1.1 404 455 - Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0
2020-07-14 06:45:45
200.70.31.138 attackspambots
Unauthorized connection attempt from IP address 200.70.31.138 on Port 445(SMB)
2020-07-14 07:02:48
94.255.247.17 attack
Auto Detect Rule!
proto TCP (SYN), 94.255.247.17:8877->gjan.info:23, len 40
2020-07-14 06:50:27
218.92.0.202 attackspambots
Jul 13 23:31:09 santamaria sshd\[16169\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.202  user=root
Jul 13 23:31:11 santamaria sshd\[16169\]: Failed password for root from 218.92.0.202 port 51364 ssh2
Jul 13 23:32:40 santamaria sshd\[16191\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.202  user=root
...
2020-07-14 06:32:14
165.227.86.14 attack
165.227.86.14 - - [13/Jul/2020:21:30:14 +0100] "POST /wp-login.php HTTP/1.1" 200 1867 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
165.227.86.14 - - [13/Jul/2020:21:30:15 +0100] "POST /wp-login.php HTTP/1.1" 200 1844 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
165.227.86.14 - - [13/Jul/2020:21:30:16 +0100] "POST /xmlrpc.php HTTP/1.1" 403 219 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
...
2020-07-14 06:40:36
81.68.90.230 attackspam
(sshd) Failed SSH login from 81.68.90.230 (CN/China/-): 5 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: Jul 13 23:39:04 s1 sshd[23518]: Invalid user redmine from 81.68.90.230 port 41032
Jul 13 23:39:06 s1 sshd[23518]: Failed password for invalid user redmine from 81.68.90.230 port 41032 ssh2
Jul 13 23:48:36 s1 sshd[23771]: Invalid user arash from 81.68.90.230 port 55424
Jul 13 23:48:37 s1 sshd[23771]: Failed password for invalid user arash from 81.68.90.230 port 55424 ssh2
Jul 13 23:53:46 s1 sshd[24177]: Invalid user guillem from 81.68.90.230 port 52500
2020-07-14 06:39:23
20.185.47.152 attackbotsspam
2020-07-13T23:47:15.676416ks3355764 sshd[3747]: Invalid user dmg from 20.185.47.152 port 44526
2020-07-13T23:47:17.845145ks3355764 sshd[3747]: Failed password for invalid user dmg from 20.185.47.152 port 44526 ssh2
...
2020-07-14 06:53:27
185.234.219.226 attackbotsspam
2020-07-13T14:30:30.792918linuxbox-skyline auth[945908]: pam_unix(dovecot:auth): authentication failure; logname= uid=0 euid=0 tty=dovecot ruser=mailer rhost=185.234.219.226
...
2020-07-14 06:24:24
218.92.0.215 attackspambots
Repeated brute force against a port
2020-07-14 06:29:00
114.44.245.122 attackspam
firewall-block, port(s): 80/tcp
2020-07-14 06:49:56
125.99.46.50 attack
Invalid user admin from 125.99.46.50 port 47128
2020-07-14 06:44:30

最近上报的IP列表

14.253.101.232 14.253.12.165 118.69.194.68 14.253.116.135
14.253.106.245 14.253.152.67 14.253.154.44 14.253.194.112
14.253.178.77 14.253.22.122 14.253.206.51 14.253.218.122
14.253.221.185 14.253.221.221 14.253.222.5 14.253.231.123
14.253.239.1 14.253.227.56 14.253.243.248 14.253.32.161