必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): China

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 1.117.75.14
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 19293
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;1.117.75.14.			IN	A

;; AUTHORITY SECTION:
.			539	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022100602 1800 900 604800 86400

;; Query time: 58 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Oct 07 05:09:15 CST 2022
;; MSG SIZE  rcvd: 104
HOST信息:
14.75.117.1.in-addr.arpa has no PTR record
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
*** Can't find 14.75.117.1.in-addr.arpa.: No answer

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
124.239.168.74 attackbotsspam
Unauthorized connection attempt detected from IP address 124.239.168.74 to port 2220 [J]
2020-01-26 16:59:44
181.188.166.82 attackspambots
Automatic report - XMLRPC Attack
2020-01-26 17:02:41
157.245.192.245 attack
Jan 26 10:45:24 www sshd\[54203\]: Invalid user stefan from 157.245.192.245
Jan 26 10:45:24 www sshd\[54203\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.245.192.245
Jan 26 10:45:27 www sshd\[54203\]: Failed password for invalid user stefan from 157.245.192.245 port 50048 ssh2
...
2020-01-26 16:52:44
92.255.95.242 attackbots
Jan 25 20:08:49 server sshd\[4849\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=92-255-95-242.customer.comfortel.pro 
Jan 25 20:08:56 server sshd\[4849\]: Failed password for invalid user ftp_user from 92.255.95.242 port 44680 ssh2
Jan 26 11:23:51 server sshd\[30714\]: Invalid user sybase from 92.255.95.242
Jan 26 11:23:51 server sshd\[30714\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=92-255-95-242.customer.comfortel.pro 
Jan 26 11:23:53 server sshd\[30714\]: Failed password for invalid user sybase from 92.255.95.242 port 36038 ssh2
...
2020-01-26 16:50:49
182.140.233.9 attackbotsspam
01/26/2020-05:48:43.671020 182.140.233.9 Protocol: 6 ET SCAN Suspicious inbound to MSSQL port 1433
2020-01-26 16:42:55
46.38.144.22 attack
Jan 26 09:54:52 v22019058497090703 postfix/smtpd[19680]: warning: unknown[46.38.144.22]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Jan 26 09:55:49 v22019058497090703 postfix/smtpd[19680]: warning: unknown[46.38.144.22]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Jan 26 09:57:45 v22019058497090703 postfix/smtpd[19680]: warning: unknown[46.38.144.22]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Jan 26 09:58:43 v22019058497090703 postfix/smtpd[19680]: warning: unknown[46.38.144.22]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Jan 26 09:59:41 v22019058497090703 postfix/smtpd[19816]: warning: unknown[46.38.144.22]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
...
2020-01-26 17:01:34
84.76.125.85 attack
Unauthorized connection attempt detected from IP address 84.76.125.85 to port 2220 [J]
2020-01-26 17:15:20
87.222.97.100 attackbots
Jan 26 09:46:55 OPSO sshd\[12942\]: Invalid user robyn from 87.222.97.100 port 44271
Jan 26 09:46:55 OPSO sshd\[12942\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=87.222.97.100
Jan 26 09:46:57 OPSO sshd\[12942\]: Failed password for invalid user robyn from 87.222.97.100 port 44271 ssh2
Jan 26 09:49:50 OPSO sshd\[13832\]: Invalid user tim from 87.222.97.100 port 58531
Jan 26 09:49:50 OPSO sshd\[13832\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=87.222.97.100
2020-01-26 17:06:41
89.248.162.136 attackspam
Port 4596 scan denied
2020-01-26 16:44:58
106.12.56.143 attackspam
Jan 26 07:51:22 MainVPS sshd[26851]: Invalid user bella from 106.12.56.143 port 54140
Jan 26 07:51:22 MainVPS sshd[26851]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.56.143
Jan 26 07:51:22 MainVPS sshd[26851]: Invalid user bella from 106.12.56.143 port 54140
Jan 26 07:51:24 MainVPS sshd[26851]: Failed password for invalid user bella from 106.12.56.143 port 54140 ssh2
Jan 26 07:54:38 MainVPS sshd[32696]: Invalid user yang from 106.12.56.143 port 50138
...
2020-01-26 16:50:20
205.205.150.59 attackspam
205.205.150.59 was recorded 182 times by 1 hosts attempting to connect to the following ports: 9600,9869,9943,9944,13,6666,389,9981,5060,5985,503,8010,1741,9999,5986,6667,10000,17,515,3001,8069,19,444,6000,21,8080,1962,5222,8081,5269,6001,2000,548,10243,7000,465,6060,8086,554,6379,12345,502,8089,26,5357,8090,11300,3460,5432,631,3541,13579,2082,5555,636,7548,2083,14147,5560,3542,2086,7657,8099,666,5577,16010,2087,7777,53,17000,8112,3689,5672,18245,774,8126,7779,18246,8129,3749,79,8000,19150,3780,5900,8181,20000,873,2323,8333,3790,5938,20547,902,8001,8334,8443,21025,992,993,2376,21379,8008,2379,84,2404,23023,1010,88,23424,7,2425,4063,1023,1025,8880,2455,1098,8888,27015,1099,1177,8889,104,8899,1200,4443,1234,9000,27017,111,1311,4444,1400,113,1433,4567,4730,9001,9002,123,9042,4840,129,9051,4848,9080,1521,9100,4911,135,9151,9160,5000,5001,9191,5002,143,9390,5003,161,9418,175,9443,5007,179,9595,195,5009,311,5019,323. Incident counter (4h, 24h, all-time): 182, 182, 881
2020-01-26 17:08:34
167.62.124.193 attackspambots
Telnet/23 MH Probe, BF, Hack -
2020-01-26 16:46:29
58.18.91.190 attackspam
Jan 26 10:41:42 journals dovecot: pop3-login: Aborted login \(auth failed, 1 attempts in 4 secs\): user=\, method=PLAIN, rip=58.18.91.190, lip=212.111.212.230, session=\<37qS9Qadn4s6Elu+\>
Jan 26 10:41:51 journals dovecot: pop3-login: Aborted login \(auth failed, 1 attempts in 7 secs\): user=\, method=PLAIN, rip=58.18.91.190, lip=212.111.212.230, session=\
Jan 26 10:42:05 journals dovecot: pop3-login: Aborted login \(auth failed, 1 attempts in 12 secs\): user=\, method=PLAIN, rip=58.18.91.190, lip=212.111.212.230, session=\
Jan 26 10:43:12 journals dovecot: pop3-login: Aborted login \(auth failed, 1 attempts in 4 secs\): user=\, method=PLAIN, rip=58.18.91.190, lip=212.111.212.230, session=\
Jan 26 10:43:21 journals dovecot: pop3-login: Aborted login \(auth failed, 1 attempts in 7 secs\): user=\, method=PLAIN, rip=58.18.91.190, lip=212.111.2
...
2020-01-26 16:51:19
128.14.133.58 attackbotsspam
Unauthorized connection attempt detected from IP address 128.14.133.58 to port 21 [J]
2020-01-26 16:49:27
119.206.5.25 attackspambots
Unauthorized connection attempt detected from IP address 119.206.5.25 to port 4873 [J]
2020-01-26 17:04:34

最近上报的IP列表

185.207.105.124 198.27.67.100 3.83.231.143 185.30.46.250
85.209.149.207 83.238.80.15 175.199.163.82 130.211.17.240
207.254.248.33 194.165.17.19 198.251.68.171 114.217.117.43
223.10.8.241 117.73.8.67 77.29.245.201 153.92.4.27
157.230.123.168 157.245.133.116 138.199.42.179 156.146.45.114