必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): Slough

省份(region): England

国家(country): United Kingdom

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2026, American Registry for Internet Numbers, Ltd.
#


NetRange:       104.244.212.0 - 104.244.215.255
CIDR:           104.244.212.0/22
NetName:        LUCERA-NETWORK
NetHandle:      NET-104-244-212-0-1
Parent:         NET104 (NET-104-0-0-0-0)
NetType:        Direct Allocation
OriginAS:       
Organization:   Lucera Financial Infrastructures, LLC (LFIL-1)
RegDate:        2014-12-11
Updated:        2021-12-14
Ref:            https://rdap.arin.net/registry/ip/104.244.212.0


OrgName:        Lucera Financial Infrastructures, LLC
OrgId:          LFIL-1
Address:        805 3rd Avenue
Address:        19th Floor
City:           New York
StateProv:      NY
PostalCode:     10022
Country:        US
RegDate:        2014-08-13
Updated:        2020-04-05
Ref:            https://rdap.arin.net/registry/entity/LFIL-1


OrgAbuseHandle: SYSTE501-ARIN
OrgAbuseName:   System Administrator
OrgAbusePhone:  +1-855-893-2231 
OrgAbuseEmail:  kmcnicholas@lucera.com
OrgAbuseRef:    https://rdap.arin.net/registry/entity/SYSTE501-ARIN

OrgTechHandle: SYSTE501-ARIN
OrgTechName:   System Administrator
OrgTechPhone:  +1-855-893-2231 
OrgTechEmail:  kmcnicholas@lucera.com
OrgTechRef:    https://rdap.arin.net/registry/entity/SYSTE501-ARIN

OrgNOCHandle: SYSTE501-ARIN
OrgNOCName:   System Administrator
OrgNOCPhone:  +1-855-893-2231 
OrgNOCEmail:  kmcnicholas@lucera.com
OrgNOCRef:    https://rdap.arin.net/registry/entity/SYSTE501-ARIN


#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2026, American Registry for Internet Numbers, Ltd.
#
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.244.214.14
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 23823
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;104.244.214.14.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2026032702 1800 900 604800 86400

;; Query time: 6 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Mar 28 09:53:18 CST 2026
;; MSG SIZE  rcvd: 107
HOST信息:
Host 14.214.244.104.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 14.214.244.104.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
102.188.90.45 attackspam
SSH 102.188.90.45 [25/Sep/2020:02:46:47 "http://hargahino-truk.com/wp-login.php" "GET /wp-login.php 200 4503
102.188.90.45 [25/Sep/2020:02:46:50 "-" "GET /wp-login.php 200 4503
102.188.90.45 [25/Sep/2020:02:46:54 "-" "POST /wp-login.php 200 4922
2020-09-25 11:02:05
179.108.187.133 attackbotsspam
bruteforce detected
2020-09-25 10:43:23
3.22.213.156 attack
Connection to SSH Honeypot - Detected by HoneypotDB
2020-09-25 11:01:45
161.35.164.49 attackspambots
20 attempts against mh-ssh on water
2020-09-25 11:00:08
37.228.227.113 attack
Email rejected due to spam filtering
2020-09-25 10:55:33
106.53.19.186 attackbotsspam
Invalid user guest from 106.53.19.186 port 57854
2020-09-25 10:38:37
91.233.250.106 attackspambots
Sep 24 21:51:04 lavrea wordpress(yvoictra.com)[179189]: XML-RPC authentication attempt for unknown user admin from 91.233.250.106
...
2020-09-25 10:32:02
40.84.227.152 attack
Sep 24 09:59:23 mx sshd[19286]: Failed password for root from 40.84.227.152 port 39053 ssh2
2020-09-25 10:42:20
51.144.73.94 attack
(sshd) Failed SSH login from 51.144.73.94 (NL/Netherlands/-): 5 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: Sep 24 21:51:00 optimus sshd[421]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.144.73.94  user=root
Sep 24 21:51:00 optimus sshd[422]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.144.73.94  user=root
Sep 24 21:51:00 optimus sshd[424]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.144.73.94  user=root
Sep 24 21:51:00 optimus sshd[425]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.144.73.94  user=root
Sep 24 21:51:00 optimus sshd[420]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.144.73.94  user=root
2020-09-25 10:30:13
118.24.107.179 attack
Sep 24 16:48:20 ny01 sshd[12574]: Failed password for root from 118.24.107.179 port 36128 ssh2
Sep 24 16:52:57 ny01 sshd[13164]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.24.107.179
Sep 24 16:52:59 ny01 sshd[13164]: Failed password for invalid user it from 118.24.107.179 port 34728 ssh2
2020-09-25 10:29:16
51.145.255.7 attack
Multiple SSH authentication failures from 51.145.255.7
2020-09-25 11:00:37
51.68.198.75 attackbotsspam
Sep 25 02:21:00 email sshd\[18385\]: Invalid user tanya from 51.68.198.75
Sep 25 02:21:00 email sshd\[18385\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.68.198.75
Sep 25 02:21:01 email sshd\[18385\]: Failed password for invalid user tanya from 51.68.198.75 port 49284 ssh2
Sep 25 02:24:44 email sshd\[19062\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.68.198.75  user=root
Sep 25 02:24:46 email sshd\[19062\]: Failed password for root from 51.68.198.75 port 59714 ssh2
...
2020-09-25 10:33:58
52.252.109.221 attackbots
Sep 25 01:54:41 web1 sshd[8682]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=52.252.109.221  user=root
Sep 25 01:54:43 web1 sshd[8682]: Failed password for root from 52.252.109.221 port 28048 ssh2
Sep 25 01:54:41 web1 sshd[8681]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=52.252.109.221  user=root
Sep 25 01:54:43 web1 sshd[8681]: Failed password for root from 52.252.109.221 port 28043 ssh2
Sep 25 02:47:39 web1 sshd[26659]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=52.252.109.221  user=root
Sep 25 02:47:41 web1 sshd[26659]: Failed password for root from 52.252.109.221 port 21117 ssh2
Sep 25 02:47:39 web1 sshd[26660]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=52.252.109.221  user=root
Sep 25 02:47:41 web1 sshd[26660]: Failed password for root from 52.252.109.221 port 21122 ssh2
Sep 25 12:27:35 web1 sshd[976]: 
...
2020-09-25 10:32:20
128.199.88.188 attackbotsspam
Sep 24 21:09:36 firewall sshd[19030]: Invalid user kontol from 128.199.88.188
Sep 24 21:09:37 firewall sshd[19030]: Failed password for invalid user kontol from 128.199.88.188 port 54576 ssh2
Sep 24 21:11:55 firewall sshd[19076]: Invalid user 2wsx#EDC4rfv from 128.199.88.188
...
2020-09-25 10:44:16
62.162.38.6 attackspambots
Email rejected due to spam filtering
2020-09-25 10:59:47

最近上报的IP列表

122.247.1.131 20.118.32.59 109.162.246.179 2606:4700:10::6814:8159
2606:4700:10::6814:6111 2606:4700:10::6816:2007 2606:4700:10::6816:1846 2606:4700:10::6814:6511
2606:4700:10::6816:4482 2606:4700:10::6814:6011 2606:4700:10::6816:4035 2606:4700:10::6816:1964
110.78.154.203 2606:4700:10::6816:387d 2606:4700:10::6816:3947 40.169.159.147
119.192.26.145 37.122.220.207 122.193.247.47 122.193.247.135