必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): None

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
IP 类型 评论内容 时间
104.131.149.33 attack
$f2bV_matches
2020-08-31 07:02:25
104.131.14.14 attack
SSH Brute Force
2020-04-29 13:39:20
104.131.14.14 attackbots
(sshd) Failed SSH login from 104.131.14.14 (US/United States/nyxstudios.moe): 5 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: Feb 23 15:16:23 srv sshd[11650]: Invalid user work from 104.131.14.14 port 48203
Feb 23 15:16:24 srv sshd[11650]: Failed password for invalid user work from 104.131.14.14 port 48203 ssh2
Feb 23 15:22:06 srv sshd[11768]: Invalid user bitrix from 104.131.14.14 port 38228
Feb 23 15:22:09 srv sshd[11768]: Failed password for invalid user bitrix from 104.131.14.14 port 38228 ssh2
Feb 23 15:27:27 srv sshd[11843]: Invalid user redmine from 104.131.14.14 port 52984
2020-02-24 00:05:44
104.131.148.158 attackbotsspam
Unauthorized connection attempt detected from IP address 104.131.148.158 to port 2220 [J]
2020-02-03 13:23:03
104.131.148.158 attack
Unauthorized connection attempt detected from IP address 104.131.148.158 to port 2220 [J]
2020-01-26 17:30:50
104.131.14.14 attackspam
Unauthorized connection attempt detected from IP address 104.131.14.14 to port 2220 [J]
2020-01-25 14:02:46
104.131.148.158 attackspam
Unauthorized connection attempt detected from IP address 104.131.148.158 to port 2220 [J]
2020-01-13 19:56:10
104.131.14.14 attackbots
Automatic report - SSH Brute-Force Attack
2019-12-24 15:39:27
104.131.14.14 attackbots
Dec 16 18:15:01 vpn01 sshd[15710]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.131.14.14
Dec 16 18:15:04 vpn01 sshd[15710]: Failed password for invalid user yank from 104.131.14.14 port 37409 ssh2
...
2019-12-17 01:44:09
104.131.14.14 attack
Dec 14 07:16:43 xeon sshd[56111]: Failed password for invalid user squid from 104.131.14.14 port 45780 ssh2
2019-12-14 14:43:11
104.131.14.14 attackbotsspam
2019-12-09T15:43:25.807341abusebot-6.cloudsearch.cf sshd\[9681\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=nyxstudios.moe  user=root
2019-12-10 00:05:30
104.131.149.33 attack
Automatic report - XMLRPC Attack
2019-11-28 16:08:43
104.131.14.14 attack
Nov 28 05:56:43 * sshd[2356]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.131.14.14
Nov 28 05:56:45 * sshd[2356]: Failed password for invalid user diego from 104.131.14.14 port 33840 ssh2
2019-11-28 14:13:59
104.131.14.14 attackbots
Nov 13 07:29:11 vmanager6029 sshd\[7398\]: Invalid user schmelmeier from 104.131.14.14 port 51611
Nov 13 07:29:11 vmanager6029 sshd\[7398\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.131.14.14
Nov 13 07:29:13 vmanager6029 sshd\[7398\]: Failed password for invalid user schmelmeier from 104.131.14.14 port 51611 ssh2
2019-11-13 15:22:48
104.131.14.14 attack
2019-11-08T06:31:31.056327abusebot-5.cloudsearch.cf sshd\[28638\]: Invalid user wang from 104.131.14.14 port 52938
2019-11-08 14:45:33
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.131.14.72
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 54898
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;104.131.14.72.			IN	A

;; AUTHORITY SECTION:
.			523	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022032101 1800 900 604800 86400

;; Query time: 18 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Mar 22 06:05:10 CST 2022
;; MSG SIZE  rcvd: 106
HOST信息:
72.14.131.104.in-addr.arpa domain name pointer 127863.cloudwaysapps.com.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
72.14.131.104.in-addr.arpa	name = 127863.cloudwaysapps.com.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
86.211.42.77 attackspam
Unauthorized connection attempt detected from IP address 86.211.42.77 to port 23
2020-05-30 00:40:50
168.228.204.10 attackbots
Unauthorized connection attempt detected from IP address 168.228.204.10 to port 23
2020-05-30 01:13:28
212.88.119.186 attackspam
Unauthorized connection attempt detected from IP address 212.88.119.186 to port 445
2020-05-30 00:56:52
178.62.39.189 attackbotsspam
" "
2020-05-30 01:10:08
187.74.118.238 attackbotsspam
Unauthorized connection attempt detected from IP address 187.74.118.238 to port 9530
2020-05-30 01:05:35
168.232.163.62 attack
Unauthorized connection attempt detected from IP address 168.232.163.62 to port 445
2020-05-30 00:33:31
161.35.28.193 attackbotsspam
Port Scan
2020-05-30 01:14:23
171.208.78.50 attackbotsspam
Unauthorized connection attempt detected from IP address 171.208.78.50 to port 445
2020-05-30 01:12:21
150.109.231.90 attackbots
Unauthorized connection attempt detected from IP address 150.109.231.90 to port 1026
2020-05-30 01:14:41
125.135.15.220 attack
Unauthorized connection attempt detected from IP address 125.135.15.220 to port 5555
2020-05-30 01:16:41
74.68.133.81 attackspambots
Unauthorized connection attempt detected from IP address 74.68.133.81 to port 5555
2020-05-30 00:44:19
139.170.174.154 attackspam
Unauthorized connection attempt detected from IP address 139.170.174.154 to port 2323
2020-05-30 00:34:42
187.147.105.104 attackbotsspam
Unauthorized connection attempt detected from IP address 187.147.105.104 to port 445
2020-05-30 01:04:59
198.108.66.248 attackspambots
Unauthorized connection attempt detected from IP address 198.108.66.248 to port 12161
2020-05-30 00:59:57
2.226.156.242 attackbots
Unauthorized connection attempt detected from IP address 2.226.156.242 to port 23
2020-05-30 00:52:53

最近上报的IP列表

104.131.109.216 104.131.152.66 104.131.160.180 104.131.46.53
104.143.152.195 104.144.219.2 104.145.231.8 104.149.35.233
104.152.208.12 104.154.106.177 104.154.70.188 104.16.12.9
104.16.120.89 104.16.124.90 104.16.125.90 104.16.127.100
104.16.128.131 104.16.13.102 104.16.135.11 104.16.143.87