必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): San Antonio

省份(region): Texas

国家(country): United States

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.214.27.114
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 5148
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;104.214.27.114.			IN	A

;; AUTHORITY SECTION:
.			352	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022032801 1800 900 604800 86400

;; Query time: 97 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Mar 29 12:26:33 CST 2022
;; MSG SIZE  rcvd: 107
HOST信息:
Host 114.27.214.104.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 114.27.214.104.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
51.83.74.126 attackbots
Sep 19 07:28:08 rotator sshd\[19095\]: Invalid user csserver from 51.83.74.126Sep 19 07:28:10 rotator sshd\[19095\]: Failed password for invalid user csserver from 51.83.74.126 port 44032 ssh2Sep 19 07:32:07 rotator sshd\[19916\]: Invalid user nagios from 51.83.74.126Sep 19 07:32:08 rotator sshd\[19916\]: Failed password for invalid user nagios from 51.83.74.126 port 55740 ssh2Sep 19 07:36:05 rotator sshd\[20751\]: Invalid user user from 51.83.74.126Sep 19 07:36:07 rotator sshd\[20751\]: Failed password for invalid user user from 51.83.74.126 port 39212 ssh2
...
2020-09-19 15:18:11
81.12.72.3 attack
Unauthorized connection attempt from IP address 81.12.72.3 on Port 445(SMB)
2020-09-19 15:05:31
178.137.168.177 attack
Automatic report - Banned IP Access
2020-09-19 15:19:56
34.73.40.158 attackbotsspam
Sep 19 08:05:05 marvibiene sshd[24735]: Failed password for root from 34.73.40.158 port 55316 ssh2
2020-09-19 15:27:18
112.85.42.172 attackbots
2020-09-19T09:30:46.524605afi-git.jinr.ru sshd[1587]: Failed password for root from 112.85.42.172 port 19784 ssh2
2020-09-19T09:30:50.161818afi-git.jinr.ru sshd[1587]: Failed password for root from 112.85.42.172 port 19784 ssh2
2020-09-19T09:30:53.378338afi-git.jinr.ru sshd[1587]: Failed password for root from 112.85.42.172 port 19784 ssh2
2020-09-19T09:30:53.378478afi-git.jinr.ru sshd[1587]: error: maximum authentication attempts exceeded for root from 112.85.42.172 port 19784 ssh2 [preauth]
2020-09-19T09:30:53.378492afi-git.jinr.ru sshd[1587]: Disconnecting: Too many authentication failures [preauth]
...
2020-09-19 14:55:29
167.71.93.165 attackbotsspam
2020-09-19T04:59:11.224243vps-d63064a2 sshd[25237]: User root from 167.71.93.165 not allowed because not listed in AllowUsers
2020-09-19T04:59:13.306771vps-d63064a2 sshd[25237]: Failed password for invalid user root from 167.71.93.165 port 43772 ssh2
2020-09-19T05:03:10.860203vps-d63064a2 sshd[25289]: User root from 167.71.93.165 not allowed because not listed in AllowUsers
2020-09-19T05:03:10.888278vps-d63064a2 sshd[25289]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.71.93.165  user=root
2020-09-19T05:03:10.860203vps-d63064a2 sshd[25289]: User root from 167.71.93.165 not allowed because not listed in AllowUsers
2020-09-19T05:03:13.417690vps-d63064a2 sshd[25289]: Failed password for invalid user root from 167.71.93.165 port 56212 ssh2
...
2020-09-19 15:28:25
112.85.42.67 attackbots
September 19 2020, 03:23:34 [sshd] - Banned from the Mad Pony WordPress hosting platform by Fail2ban.
2020-09-19 15:29:04
49.233.183.15 attackspam
Sep 19 03:41:56 fhem-rasp sshd[7981]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.233.183.15  user=root
Sep 19 03:41:59 fhem-rasp sshd[7981]: Failed password for root from 49.233.183.15 port 49904 ssh2
...
2020-09-19 15:13:47
188.218.143.247 attackbots
Automatic report - Banned IP Access
2020-09-19 14:50:48
103.146.63.44 attackbots
$f2bV_matches
2020-09-19 14:52:02
103.89.176.73 attackbotsspam
Sep 19 06:19:10 ip-172-31-16-56 sshd\[29965\]: Failed password for root from 103.89.176.73 port 55750 ssh2\
Sep 19 06:23:19 ip-172-31-16-56 sshd\[29981\]: Invalid user admin from 103.89.176.73\
Sep 19 06:23:21 ip-172-31-16-56 sshd\[29981\]: Failed password for invalid user admin from 103.89.176.73 port 58572 ssh2\
Sep 19 06:28:00 ip-172-31-16-56 sshd\[30052\]: Invalid user www from 103.89.176.73\
Sep 19 06:28:02 ip-172-31-16-56 sshd\[30052\]: Failed password for invalid user www from 103.89.176.73 port 33172 ssh2\
2020-09-19 14:52:31
116.233.94.219 attackspam
SSH bruteforce
2020-09-19 14:59:49
178.62.227.247 attack
2020-09-19T00:37:40.033653mail.thespaminator.com sshd[21887]: Invalid user user from 178.62.227.247 port 51547
2020-09-19T00:37:42.215012mail.thespaminator.com sshd[21887]: Failed password for invalid user user from 178.62.227.247 port 51547 ssh2
...
2020-09-19 15:02:45
117.173.67.119 attackspam
Sep 19 04:04:54 nopemail auth.info sshd[14959]: Disconnected from authenticating user root 117.173.67.119 port 4967 [preauth]
...
2020-09-19 15:21:02
123.241.194.29 attackbots
Sep 18 17:01:04 ssh2 sshd[28672]: User root from 123.241.194.29 not allowed because not listed in AllowUsers
Sep 18 17:01:04 ssh2 sshd[28672]: Failed password for invalid user root from 123.241.194.29 port 40608 ssh2
Sep 18 17:01:04 ssh2 sshd[28672]: Connection closed by invalid user root 123.241.194.29 port 40608 [preauth]
...
2020-09-19 15:12:19

最近上报的IP列表

104.214.229.172 104.214.77.90 104.215.1.17 104.215.250.127
104.215.62.158 104.216.17.35 104.218.48.179 104.218.50.252
104.218.51.242 104.218.53.71 104.219.55.10 104.22.0.15
104.22.1.15 104.22.1.42 104.22.10.152 104.22.11.152
104.22.12.164 104.22.12.239 213.60.137.56 104.22.13.164