必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): Thailand

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 1.2.133.14
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 43601
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;1.2.133.14.			IN	A

;; AUTHORITY SECTION:
.			467	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022022400 1800 900 604800 86400

;; Query time: 19 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Feb 24 18:15:08 CST 2022
;; MSG SIZE  rcvd: 103
HOST信息:
14.133.2.1.in-addr.arpa domain name pointer node-zy.pool-1-2.dynamic.totinternet.net.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
14.133.2.1.in-addr.arpa	name = node-zy.pool-1-2.dynamic.totinternet.net.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
192.144.158.118 attackspam
SSH brutforce
2019-11-22 04:16:52
75.132.79.87 attackbotsspam
Automatic report - Port Scan Attack
2019-11-22 04:15:56
36.82.98.243 attack
Port 22 Scan, PTR: None
2019-11-22 04:03:04
184.105.139.87 attackspambots
MultiHost/MultiPort Probe, Scan, Hack -
2019-11-22 04:13:13
119.75.44.106 attack
Trying ports that it shouldn't be.
2019-11-22 04:07:45
31.184.254.210 attackbots
Nov x@x
Nov x@x
Nov x@x
Nov x@x
Nov x@x


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=31.184.254.210
2019-11-22 04:03:23
185.137.234.22 attackbots
RDP Brute Force attempt, PTR: None
2019-11-22 04:21:46
193.112.42.13 attack
Nov 21 16:46:27 firewall sshd[13013]: Invalid user japan from 193.112.42.13
Nov 21 16:46:29 firewall sshd[13013]: Failed password for invalid user japan from 193.112.42.13 port 45992 ssh2
Nov 21 16:50:18 firewall sshd[13051]: Invalid user eschen from 193.112.42.13
...
2019-11-22 04:17:35
117.34.25.168 attackspam
MultiHost/MultiPort Probe, Scan, Hack -
2019-11-22 03:48:13
5.101.51.127 attackspam
Nov x@x
Nov x@x
Nov x@x
Nov x@x
Nov x@x


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=5.101.51.127
2019-11-22 03:58:32
49.205.217.211 attackspam
Automatic report - Port Scan Attack
2019-11-22 04:27:07
222.83.218.117 attack
Nov 21 19:36:19 ns3042688 proftpd\[26058\]: 127.0.0.1 \(222.83.218.117\[222.83.218.117\]\) - USER cesumin \(Login failed\): Incorrect password
Nov 21 19:36:22 ns3042688 proftpd\[26076\]: 127.0.0.1 \(222.83.218.117\[222.83.218.117\]\) - USER cesumin \(Login failed\): Incorrect password
Nov 21 19:36:26 ns3042688 proftpd\[26100\]: 127.0.0.1 \(222.83.218.117\[222.83.218.117\]\) - USER cesumin \(Login failed\): Incorrect password
Nov 21 19:36:29 ns3042688 proftpd\[26129\]: 127.0.0.1 \(222.83.218.117\[222.83.218.117\]\) - USER cesumin \(Login failed\): Incorrect password
Nov 21 19:36:32 ns3042688 proftpd\[26161\]: 127.0.0.1 \(222.83.218.117\[222.83.218.117\]\) - USER cesumin \(Login failed\): Incorrect password
...
2019-11-22 03:52:37
37.120.142.165 attackspam
Joomla User : try to access forms...
2019-11-22 03:48:30
118.249.213.133 attackbots
Unauthorized connection attempt from IP address 118.249.213.133 on Port 139(NETBIOS)
2019-11-22 04:06:11
111.93.4.174 attackbots
[ssh] SSH attack
2019-11-22 04:04:21

最近上报的IP列表

1.2.133.122 193.116.168.2 1.2.133.150 1.2.133.152
1.2.133.158 1.2.133.185 1.2.133.189 1.2.133.202
1.2.133.208 1.2.133.228 1.2.133.24 1.2.133.31
1.2.133.34 1.2.133.40 1.2.133.83 1.2.134.104
214.46.240.114 1.2.134.111 1.2.134.130 1.2.141.232