必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): Viet Nam

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 14.253.42.249
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 48251
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;14.253.42.249.			IN	A

;; AUTHORITY SECTION:
.			305	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022030803 1800 900 604800 86400

;; Query time: 26 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Mar 09 08:58:25 CST 2022
;; MSG SIZE  rcvd: 106
HOST信息:
249.42.253.14.in-addr.arpa domain name pointer static.vnpt.vn.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
249.42.253.14.in-addr.arpa	name = static.vnpt.vn.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
150.158.193.244 attackbotsspam
Brute%20Force%20SSH
2020-10-07 12:20:04
191.30.24.44 attackbotsspam
Unauthorized connection attempt from IP address 191.30.24.44 on Port 445(SMB)
2020-10-07 12:44:49
122.194.229.54 attack
fail2ban -- 122.194.229.54
...
2020-10-07 12:55:15
88.250.202.65 attackbotsspam
Unauthorized connection attempt from IP address 88.250.202.65 on Port 445(SMB)
2020-10-07 12:26:46
188.166.144.207 attackbots
Oct  7 04:49:06 jane sshd[18495]: Failed password for root from 188.166.144.207 port 52566 ssh2
...
2020-10-07 12:25:11
180.76.148.87 attackspambots
Oct  7 03:49:49 ns382633 sshd\[27518\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.76.148.87  user=root
Oct  7 03:49:51 ns382633 sshd\[27518\]: Failed password for root from 180.76.148.87 port 41596 ssh2
Oct  7 03:52:08 ns382633 sshd\[27736\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.76.148.87  user=root
Oct  7 03:52:11 ns382633 sshd\[27736\]: Failed password for root from 180.76.148.87 port 53445 ssh2
Oct  7 03:53:24 ns382633 sshd\[27789\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.76.148.87  user=root
2020-10-07 12:26:32
47.30.178.158 attack
1602017105 - 10/06/2020 22:45:05 Host: 47.30.178.158/47.30.178.158 Port: 445 TCP Blocked
2020-10-07 12:43:41
218.92.0.205 attack
Oct  7 00:59:46 shivevps sshd[11753]: Failed password for root from 218.92.0.205 port 61595 ssh2
Oct  7 01:01:26 shivevps sshd[11827]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.205  user=root
Oct  7 01:01:28 shivevps sshd[11827]: Failed password for root from 218.92.0.205 port 39535 ssh2
...
2020-10-07 12:36:54
193.112.118.128 attackbots
Brute-force attempt banned
2020-10-07 12:54:42
202.83.42.202 attackbotsspam
Unwanted checking 80 or 443 port
...
2020-10-07 12:45:48
200.146.75.58 attackbotsspam
SSH brute-force attempt
2020-10-07 12:51:07
190.248.146.90 attack
Unauthorized connection attempt from IP address 190.248.146.90 on Port 445(SMB)
2020-10-07 12:32:51
61.177.172.168 attackbots
Oct  7 06:50:45 amit sshd\[30860\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.172.168  user=root
Oct  7 06:50:47 amit sshd\[30860\]: Failed password for root from 61.177.172.168 port 27678 ssh2
Oct  7 06:51:05 amit sshd\[30867\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.172.168  user=root
...
2020-10-07 12:58:00
31.173.151.114 attackspambots
Unauthorized connection attempt from IP address 31.173.151.114 on Port 445(SMB)
2020-10-07 12:32:21
175.139.1.34 attackbots
2020-10-06T23:52:01.243255mail.broermann.family sshd[23786]: Failed password for root from 175.139.1.34 port 36824 ssh2
2020-10-06T23:54:30.712035mail.broermann.family sshd[24026]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=175.139.1.34  user=root
2020-10-06T23:54:32.870658mail.broermann.family sshd[24026]: Failed password for root from 175.139.1.34 port 47438 ssh2
2020-10-06T23:57:00.759520mail.broermann.family sshd[24216]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=175.139.1.34  user=root
2020-10-06T23:57:02.845134mail.broermann.family sshd[24216]: Failed password for root from 175.139.1.34 port 58054 ssh2
...
2020-10-07 12:28:02

最近上报的IP列表

14.253.77.28 14.253.87.210 14.253.88.192 14.254.1.95
14.254.103.224 118.69.196.215 14.254.108.200 14.254.108.97
14.254.105.123 14.254.124.58 14.254.129.74 14.254.154.18
14.254.148.148 14.254.148.111 14.254.16.201 14.254.185.222
14.254.181.163 14.254.188.164 118.69.196.78 14.254.21.207