必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): Germany

运营商(isp): Contabo GmbH

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): Data Center/Web Hosting/Transit

用户上报:
类型 评论内容 时间
attack
serveres are UTC 
Lines containing failures of 144.91.80.14
Oct  7 05:07:55 tux2 sshd[14134]: Did not receive identification string from 144.91.80.14 port 59935
Oct  7 05:07:56 tux2 sshd[14135]: Invalid user support from 144.91.80.14 port 61166
Oct  7 05:07:56 tux2 sshd[14135]: Failed password for invalid user support from 144.91.80.14 port 61166 ssh2
Oct  7 05:07:56 tux2 sshd[14135]: Disconnected from invalid user support 144.91.80.14 port 61166 [preauth]
Oct  7 07:40:08 tux2 sshd[22401]: Did not receive identification string from 144.91.80.14 port 64981
Oct  7 07:40:09 tux2 sshd[22402]: Invalid user support from 144.91.80.14 port 49742
Oct  7 07:40:09 tux2 sshd[22402]: Failed password for invalid user support from 144.91.80.14 port 49742 ssh2
Oct  7 07:40:10 tux2 sshd[22402]: Disconnected from invalid user support 144.91.80.14 port 49742 [preauth]



........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=144.91.80.14
2019-10-07 21:45:15
相同子网IP讨论:
IP 类型 评论内容 时间
144.91.80.253 attackbots
22/tcp
[2020-03-20]1pkt
2020-03-21 00:21:02
144.91.80.37 attackspam
suspicious action Thu, 27 Feb 2020 11:25:35 -0300
2020-02-28 00:50:59
144.91.80.178 attack
...
2020-02-02 01:58:42
144.91.80.125 attackbotsspam
Unauthorized connection attempt detected from IP address 144.91.80.125 to port 4444
2020-01-09 18:17:28
144.91.80.99 attackbotsspam
Unauthorized connection attempt detected from IP address 144.91.80.99 to port 902 [J]
2020-01-08 06:00:26
144.91.80.99 attackspam
Unauthorized connection attempt detected from IP address 144.91.80.99 to port 3389
2020-01-02 01:41:57
144.91.80.182 attackspam
Blocked for recurring port scan.
Time: Tue Dec 31. 05:42:39 2019 +0100
IP: 144.91.80.182 (DE/Germany/vmi318783.contaboserver.net)

Temporary blocks that triggered the permanent block:
Tue Dec 31 01:41:24 2019 *Port Scan* detected from 144.91.80.182 (DE/Germany/vmi318783.contaboserver.net). 11 hits in the last 70 seconds
Tue Dec 31 02:41:43 2019 *Port Scan* detected from 144.91.80.182 (DE/Germany/vmi318783.contaboserver.net). 11 hits in the last 80 seconds
Tue Dec 31 03:41:59 2019 *Port Scan* detected from 144.91.80.182 (DE/Germany/vmi318783.contaboserver.net). 11 hits in the last 85 seconds
Tue Dec 31 04:42:18 2019 *Port Scan* detected from 144.91.80.182 (DE/Germany/vmi318783.contaboserver.net). 11 hits in the last 95 seconds
Tue Dec 31 05:42:37 2019 *Port Scan* detected from 144.91.80.182 (DE/Germany/vmi318783.contaboserver.net). 11 hits in the last 105 seconds
2019-12-31 13:20:08
144.91.80.99 attack
Unauthorized connection attempt detected from IP address 144.91.80.99 to port 9300
2019-12-31 09:13:17
144.91.80.99 attack
Unauthorized connection attempt detected from IP address 144.91.80.99 to port 1521
2019-12-23 03:50:27
144.91.80.99 attack
IP blocked
2019-12-22 19:04:53
144.91.80.99 attack
Detected by Maltrail
2019-12-22 08:50:49
144.91.80.99 attack
" "
2019-12-21 18:36:21
144.91.80.99 attackbotsspam
--- report ---
Dec 20 13:43:52 sshd: Connection from 144.91.80.99 port 44300
Dec 20 13:43:53 sshd: Did not receive identification string from 144.91.80.99
2019-12-21 05:16:09
144.91.80.99 attackbotsspam
firewall-block, port(s): 21/tcp
2019-12-20 13:52:04
144.91.80.182 attackspam
firewall-block, port(s): 84/tcp
2019-12-10 19:38:18
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 144.91.80.14
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 34378
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;144.91.80.14.			IN	A

;; AUTHORITY SECTION:
.			526	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019100701 1800 900 604800 86400

;; Query time: 102 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Oct 07 21:45:13 CST 2019
;; MSG SIZE  rcvd: 116
HOST信息:
14.80.91.144.in-addr.arpa domain name pointer vmi305498.contaboserver.net.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
14.80.91.144.in-addr.arpa	name = vmi305498.contaboserver.net.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
148.70.81.36 attackbots
$f2bV_matches
2019-10-24 22:08:50
106.12.87.178 attackspam
Oct 24 14:41:31 nextcloud sshd\[23083\]: Invalid user df from 106.12.87.178
Oct 24 14:41:31 nextcloud sshd\[23083\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.87.178
Oct 24 14:41:33 nextcloud sshd\[23083\]: Failed password for invalid user df from 106.12.87.178 port 34554 ssh2
...
2019-10-24 22:46:37
103.28.36.44 attackspambots
Invalid user mikeb from 103.28.36.44 port 46471
2019-10-24 22:17:20
175.211.105.99 attackspambots
frenzy
2019-10-24 22:34:08
116.196.82.52 attackbotsspam
Oct 24 12:11:43 work-partkepr sshd\[29142\]: Invalid user usuario from 116.196.82.52 port 53542
Oct 24 12:11:43 work-partkepr sshd\[29142\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=116.196.82.52
...
2019-10-24 22:41:49
111.231.201.103 attack
Invalid user jboss from 111.231.201.103 port 50542
2019-10-24 22:43:17
113.160.186.221 attackspambots
Invalid user system from 113.160.186.221 port 62921
2019-10-24 22:13:42
185.105.121.55 attackbotsspam
Invalid user admin from 185.105.121.55 port 39173
2019-10-24 22:05:46
221.176.241.48 attack
Invalid user admin from 221.176.241.48 port 2881
2019-10-24 22:29:28
106.124.137.103 attackbots
Invalid user interalt from 106.124.137.103 port 35029
2019-10-24 22:45:09
170.245.49.126 attack
Invalid user pi from 170.245.49.126 port 42292
2019-10-24 22:34:55
152.170.17.204 attack
Invalid user admin from 152.170.17.204 port 44546
2019-10-24 22:36:30
51.38.37.128 attackspambots
Oct 24 16:09:47 SilenceServices sshd[28226]: Failed password for root from 51.38.37.128 port 35202 ssh2
Oct 24 16:13:26 SilenceServices sshd[29174]: Failed password for root from 51.38.37.128 port 55530 ssh2
2019-10-24 22:25:00
185.175.25.53 attack
$f2bV_matches
2019-10-24 22:32:31
119.196.83.30 attackbotsspam
2019-10-24T14:00:42.405411abusebot-5.cloudsearch.cf sshd\[20919\]: Invalid user hp from 119.196.83.30 port 48132
2019-10-24 22:12:12

最近上报的IP列表

211.20.151.172 101.72.41.180 75.152.46.77 178.35.143.118
94.125.61.196 84.115.242.173 41.32.99.226 194.5.94.160
182.61.187.206 45.118.49.127 174.26.87.219 118.225.165.159
116.174.135.35 134.13.18.163 42.194.67.154 111.222.156.66
121.129.97.216 105.111.222.137 186.222.31.8 35.52.120.19