必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): None

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 1.117.14.0
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 37947
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;1.117.14.0.			IN	A

;; AUTHORITY SECTION:
.			222	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022092501 1800 900 604800 86400

;; Query time: 73 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Sep 26 05:46:30 CST 2022
;; MSG SIZE  rcvd: 103
HOST信息:
0.14.117.1.in-addr.arpa has no PTR record
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
*** Can't find 0.14.117.1.in-addr.arpa.: No answer

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
222.186.42.136 attackbotsspam
14.01.2020 14:11:43 SSH access blocked by firewall
2020-01-14 22:12:23
103.78.238.223 attack
port scan and connect, tcp 1433 (ms-sql-s)
2020-01-14 22:36:08
110.53.234.105 attackbots
ICMP MH Probe, Scan /Distributed -
2020-01-14 22:38:45
64.225.74.145 attack
Jan 14 14:26:18 pi sshd[22432]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=64.225.74.145 
Jan 14 14:26:20 pi sshd[22432]: Failed password for invalid user butter from 64.225.74.145 port 58618 ssh2
2020-01-14 22:37:10
62.65.9.86 attackbotsspam
Jan 14 13:51:22 xxx sshd[13511]: Did not receive identification string from 62.65.9.86
Jan 14 13:51:22 xxx sshd[13509]: Did not receive identification string from 62.65.9.86
Jan 14 13:51:22 xxx sshd[13510]: Did not receive identification string from 62.65.9.86
Jan 14 13:51:22 xxx sshd[13512]: Did not receive identification string from 62.65.9.86
Jan 14 13:51:22 xxx sshd[13513]: Did not receive identification string from 62.65.9.86


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=62.65.9.86
2020-01-14 22:47:19
14.29.182.168 attackspam
Jan 14 13:21:33 nandi sshd[1439]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=14.29.182.168  user=r.r
Jan 14 13:21:34 nandi sshd[1439]: Failed password for r.r from 14.29.182.168 port 40676 ssh2
Jan 14 13:21:37 nandi sshd[1439]: Received disconnect from 14.29.182.168: 11: Bye Bye [preauth]
Jan 14 13:36:14 nandi sshd[11351]: Invalid user test1234 from 14.29.182.168
Jan 14 13:36:14 nandi sshd[11351]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=14.29.182.168 
Jan 14 13:36:16 nandi sshd[11351]: Failed password for invalid user test1234 from 14.29.182.168 port 48594 ssh2
Jan 14 13:36:16 nandi sshd[11351]: Received disconnect from 14.29.182.168: 11: Bye Bye [preauth]
Jan 14 13:40:03 nandi sshd[13383]: Invalid user tpuser from 14.29.182.168
Jan 14 13:40:03 nandi sshd[13383]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=14.29.182.168 


........
-------------------------------------------
2020-01-14 22:05:33
91.199.38.159 attackbotsspam
Jan 14 15:09:04 * sshd[24605]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=91.199.38.159
Jan 14 15:09:06 * sshd[24605]: Failed password for invalid user softcont from 91.199.38.159 port 47464 ssh2
2020-01-14 22:17:18
77.42.73.40 attack
Automatic report - Port Scan Attack
2020-01-14 22:30:06
165.22.69.88 attack
Unauthorized connection attempt detected from IP address 165.22.69.88 to port 443 [J]
2020-01-14 22:09:06
106.13.25.242 attackspambots
Unauthorized connection attempt detected from IP address 106.13.25.242 to port 2220 [J]
2020-01-14 22:18:58
115.159.3.221 attackbotsspam
Jan 14 14:04:20 vmanager6029 sshd\[5412\]: Invalid user monitor from 115.159.3.221 port 44314
Jan 14 14:04:20 vmanager6029 sshd\[5412\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=115.159.3.221
Jan 14 14:04:22 vmanager6029 sshd\[5412\]: Failed password for invalid user monitor from 115.159.3.221 port 44314 ssh2
2020-01-14 22:06:25
217.111.239.37 attackspambots
pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=217.111.239.37  user=root
Failed password for root from 217.111.239.37 port 32986 ssh2
Invalid user apache from 217.111.239.37 port 36752
pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=217.111.239.37
Failed password for invalid user apache from 217.111.239.37 port 36752 ssh2
2020-01-14 22:11:32
45.134.179.15 attack
Port scan: Attack repeated for 24 hours
2020-01-14 22:23:46
154.118.219.29 attackbotsspam
Jan 14 13:51:37 *** sshd[7406]: refused connect from 154.118.219.29 (15=
4.118.219.29)


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=154.118.219.29
2020-01-14 22:48:40
110.53.234.106 attack
ICMP MH Probe, Scan /Distributed -
2020-01-14 22:35:16

最近上报的IP列表

1.117.53.6 1.117.42.76 0.109.148.203 0.108.237.164
0.249.161.157 1.119.182.231 0.248.2.116 1.117.170.181
1.119.23.192 1.116.75.145 0.108.186.47 1.116.25.53
1.116.57.77 0.248.238.222 0.25.165.218 0.249.137.122
0.106.67.13 0.108.51.228 0.249.166.176 0.109.105.254