必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): Turkey

运营商(isp): Superonline Iletisim Hizmetleri A.S.

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): Fixed Line ISP

用户上报:
类型 评论内容 时间
attackspam
Unauthorized connection attempt from IP address 213.14.216.51 on Port 445(SMB)
2020-09-05 02:34:45
attackbots
Unauthorized connection attempt from IP address 213.14.216.51 on Port 445(SMB)
2020-09-04 18:01:32
attack
unauthorized connection attempt
2020-01-12 17:51:44
attack
@LucianNitescu Personal Honeypot Network <<<>>> Donate at paypal.me/LNitescu <<<>>> 2019-09-06 02:21:12,827 INFO [amun_request_handler] PortScan Detected on Port: 445 (213.14.216.51)
2019-09-06 18:53:57
相同子网IP讨论:
IP 类型 评论内容 时间
213.14.216.253 attackspambots
Unauthorized connection attempt from IP address 213.14.216.253 on Port 445(SMB)
2020-08-01 03:26:26
213.14.216.41 attackspambots
20/6/25@16:43:34: FAIL: Alarm-Network address from=213.14.216.41
...
2020-06-26 08:58:36
213.14.216.41 attackspambots
Unauthorized connection attempt detected from IP address 213.14.216.41 to port 445
2020-06-13 07:40:47
213.14.216.41 attackbotsspam
Unauthorized connection attempt from IP address 213.14.216.41 on Port 445(SMB)
2020-02-29 00:20:20
213.14.216.175 attackspam
Unauthorized connection attempt from IP address 213.14.216.175 on Port 445(SMB)
2020-01-15 06:59:22
213.14.216.253 attack
@LucianNitescu Personal Honeypot Network <<<>>> Donate at paypal.me/LNitescu <<<>>> 2019-08-28 22:07:17,436 INFO [amun_request_handler] PortScan Detected on Port: 445 (213.14.216.253)
2019-08-29 11:55:00
213.14.216.253 attackbots
Unauthorized connection attempt from IP address 213.14.216.253 on Port 445(SMB)
2019-08-05 20:54:29
213.14.216.41 attackbotsspam
[SMB remote code execution attempt: port tcp/445]
*(RWIN=8192)(08041230)
2019-08-05 00:43:28
213.14.216.41 attackbotsspam
Portscanning on different or same port(s).
2019-06-22 01:36:18
WHOIS信息:
b
DIG信息:

; <<>> DiG 9.10.3-P4-Ubuntu <<>> 213.14.216.51
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 37908
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;213.14.216.51.			IN	A

;; AUTHORITY SECTION:
.			1205	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019051601 1800 900 604800 86400

;; Query time: 1 msec
;; SERVER: 67.207.67.2#53(67.207.67.2)
;; WHEN: Fri May 17 10:54:56 CST 2019
;; MSG SIZE  rcvd: 117

HOST信息:
51.216.14.213.in-addr.arpa domain name pointer host-213-14-216-51.reverse.superonline.net.
NSLOOKUP信息:
Server:		67.207.67.2
Address:	67.207.67.2#53

Non-authoritative answer:
51.216.14.213.in-addr.arpa	name = host-213-14-216-51.reverse.superonline.net.

Authoritative answers can be found from:

相关IP信息:
最新评论:
IP 类型 评论内容 时间
181.118.161.114 attack
Unauthorized connection attempt from IP address 181.118.161.114 on Port 445(SMB)
2019-12-06 02:46:02
5.240.33.40 attack
Somehow accessed my email and changed my password, bypassing my Gmail verification
2019-12-06 02:20:45
122.51.167.241 attackbots
Dec  5 23:59:56 areeb-Workstation sshd[1966]: Failed password for postgres from 122.51.167.241 port 41686 ssh2
Dec  6 00:06:00 areeb-Workstation sshd[2446]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.51.167.241 
...
2019-12-06 02:39:25
206.81.8.14 attack
Dec  5 18:46:40 icinga sshd[25029]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=206.81.8.14
Dec  5 18:46:42 icinga sshd[25029]: Failed password for invalid user test from 206.81.8.14 port 59330 ssh2
...
2019-12-06 02:30:46
201.90.40.1 attackbotsspam
fake amazonaws.com ad web worker/avoid all sponsored products/electronics especially -recommendations unhinged -relative XFORT - tampered and duplicated Master locks -left one here/back/cut the chain and replaced with is own/so use the ladders to get into the windows/tampered velux
2019-12-06 02:06:10
217.115.183.228 attackbotsspam
Dec  5 18:10:44 sso sshd[11071]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=217.115.183.228
Dec  5 18:10:46 sso sshd[11071]: Failed password for invalid user user from 217.115.183.228 port 52950 ssh2
...
2019-12-06 02:10:48
180.247.181.222 attack
Unauthorized connection attempt from IP address 180.247.181.222 on Port 445(SMB)
2019-12-06 02:11:42
81.28.163.250 attack
Unauthorized connection attempt from IP address 81.28.163.250 on Port 445(SMB)
2019-12-06 02:44:02
123.16.144.69 attackbotsspam
Unauthorized connection attempt from IP address 123.16.144.69 on Port 445(SMB)
2019-12-06 02:01:18
186.208.216.198 attack
Unauthorized connection attempt from IP address 186.208.216.198 on Port 445(SMB)
2019-12-06 02:40:44
184.105.139.118 attackspambots
Unauthorized connection attempt from IP address 184.105.139.118 on Port 3389(RDP)
2019-12-06 02:00:10
194.182.82.52 attackbotsspam
2019-12-05T18:37:11.974784abusebot-3.cloudsearch.cf sshd\[25391\]: Invalid user hjl from 194.182.82.52 port 43740
2019-12-06 02:46:58
201.208.208.82 attackspambots
Unauthorized connection attempt from IP address 201.208.208.82 on Port 445(SMB)
2019-12-06 02:37:31
104.248.167.159 attackbots
Lines containing failures of 104.248.167.159
Dec  5 09:28:09 metroid sshd[22977]: User r.r from 104.248.167.159 not allowed because listed in DenyUsers
Dec  5 09:28:09 metroid sshd[22977]: Received disconnect from 104.248.167.159 port 43124:11: Bye Bye [preauth]
Dec  5 09:28:09 metroid sshd[22977]: Disconnected from invalid user r.r 104.248.167.159 port 43124 [preauth]


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=104.248.167.159
2019-12-06 02:37:07
31.155.110.165 attack
Unauthorized connection attempt from IP address 31.155.110.165 on Port 445(SMB)
2019-12-06 02:34:30

最近上报的IP列表

195.56.253.49 42.61.24.202 197.230.238.34 89.28.252.214
59.124.36.104 60.246.1.74 121.78.147.194 59.124.13.72
117.4.90.95 41.65.3.130 118.70.178.121 175.111.142.116
238.156.199.81 213.14.88.82 195.9.186.139 193.227.50.220
180.216.206.243 189.211.188.47 115.74.250.176 113.176.84.72