必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): China

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 106.14.198.132
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 13906
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;106.14.198.132.			IN	A

;; AUTHORITY SECTION:
.			568	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022022500 1800 900 604800 86400

;; Query time: 103 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 25 21:28:45 CST 2022
;; MSG SIZE  rcvd: 107
HOST信息:
Host 132.198.14.106.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 132.198.14.106.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
143.208.180.212 attackbots
Oct 12 16:06:31 ArkNodeAT sshd\[7828\]: Invalid user Admin123\$ from 143.208.180.212
Oct 12 16:06:31 ArkNodeAT sshd\[7828\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=143.208.180.212
Oct 12 16:06:34 ArkNodeAT sshd\[7828\]: Failed password for invalid user Admin123\$ from 143.208.180.212 port 43448 ssh2
2019-10-13 05:29:51
182.184.6.234 attackspambots
Unauthorised access (Oct 12) SRC=182.184.6.234 LEN=52 TOS=0x10 PREC=0x40 TTL=117 ID=11001 DF TCP DPT=445 WINDOW=8192 SYN 
Unauthorised access (Oct 12) SRC=182.184.6.234 LEN=52 TOS=0x10 PREC=0x40 TTL=117 ID=6132 DF TCP DPT=445 WINDOW=8192 SYN
2019-10-13 05:09:13
103.88.76.66 attackbotsspam
Oct 12 09:06:37 mailman postfix/smtpd[21263]: NOQUEUE: reject: RCPT from unknown[103.88.76.66]: 554 5.7.1 Service unavailable; Client host [103.88.76.66] blocked using dnsbl.dronebl.org; Open SOCKS proxy; from= to= proto=ESMTP helo=
Oct 12 09:06:38 mailman postfix/smtpd[21263]: NOQUEUE: reject: RCPT from unknown[103.88.76.66]: 554 5.7.1 Service unavailable; Client host [103.88.76.66] blocked using dnsbl.dronebl.org; Open SOCKS proxy; from= to= proto=ESMTP helo=
2019-10-13 05:25:02
194.182.86.133 attack
Oct 12 17:05:21 Tower sshd[44015]: Connection from 194.182.86.133 port 43960 on 192.168.10.220 port 22
Oct 12 17:05:22 Tower sshd[44015]: Failed password for root from 194.182.86.133 port 43960 ssh2
Oct 12 17:05:23 Tower sshd[44015]: Received disconnect from 194.182.86.133 port 43960:11: Bye Bye [preauth]
Oct 12 17:05:23 Tower sshd[44015]: Disconnected from authenticating user root 194.182.86.133 port 43960 [preauth]
2019-10-13 05:22:38
181.115.181.171 attackbots
Automatic report - Port Scan Attack
2019-10-13 04:58:00
188.123.81.43 attack
IP Ban Report : https://help-dysk.pl/wordpress-firewall-plugins/ip/188.123.81.43/ 
 FR - 1H : (79)  
 Protection Against DDoS WordPress plugin :  
 "odzyskiwanie danych help-dysk" 
 IP Address Ranges by Country : FR 
 NAME ASN : ASN49449 
 
 IP : 188.123.81.43 
 
 CIDR : 188.123.64.0/19 
 
 PREFIX COUNT : 2 
 
 UNIQUE IP COUNT : 9216 
 
 
 WYKRYTE ATAKI Z ASN49449 :  
  1H - 1 
  3H - 1 
  6H - 1 
 12H - 1 
 24H - 1 
 
 DateTime : 2019-10-12 16:07:22 
 
 INFO : Port SSH 22 Scan Detected and Blocked by ADMIN  - data recovery
2019-10-13 04:59:13
223.83.155.77 attackbotsspam
Oct 12 19:04:32 minden010 sshd[29653]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=223.83.155.77
Oct 12 19:04:34 minden010 sshd[29653]: Failed password for invalid user admin from 223.83.155.77 port 51094 ssh2
Oct 12 19:13:23 minden010 sshd[3995]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=223.83.155.77
...
2019-10-13 05:06:20
177.133.42.89 attack
Oct 12 10:30:01 localhost postfix/smtpd[32174]: disconnect from unknown[177.133.42.89] ehlo=1 auth=0/1 quhostname=1 commands=2/3
Oct 12 10:32:18 localhost postfix/smtpd[804]: disconnect from unknown[177.133.42.89] ehlo=1 auth=0/1 quhostname=1 commands=2/3
Oct 12 10:49:04 localhost postfix/smtpd[5406]: disconnect from unknown[177.133.42.89] ehlo=1 auth=0/1 quhostname=1 commands=2/3
Oct 12 10:56:53 localhost postfix/smtpd[7742]: lost connection after EHLO from unknown[177.133.42.89]
Oct 12 11:00:08 localhost postfix/smtpd[7073]: servereout after CONNECT from unknown[177.133.42.89]


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=177.133.42.89
2019-10-13 05:09:48
218.92.0.207 attack
2019-10-12T20:59:58.689421abusebot-7.cloudsearch.cf sshd\[13357\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.207  user=root
2019-10-13 05:06:53
65.19.174.248 attackspambots
SMB Server BruteForce Attack
2019-10-13 05:01:24
104.131.3.165 attackspam
[munged]::443 104.131.3.165 - - [12/Oct/2019:22:26:21 +0200] "POST /[munged]: HTTP/1.1" 200 9080 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
[munged]::443 104.131.3.165 - - [12/Oct/2019:22:26:23 +0200] "POST /[munged]: HTTP/1.1" 200 9080 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
[munged]::443 104.131.3.165 - - [12/Oct/2019:22:26:24 +0200] "POST /[munged]: HTTP/1.1" 200 9080 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
[munged]::443 104.131.3.165 - - [12/Oct/2019:22:26:26 +0200] "POST /[munged]: HTTP/1.1" 200 9080 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
[munged]::443 104.131.3.165 - - [12/Oct/2019:22:26:27 +0200] "POST /[munged]: HTTP/1.1" 200 9080 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
[munged]::443 104.131.3.165 - - [12/Oct/2019:22:26:28 +0200] "POST /[munged]: HTTP/1.1" 200 9080 "-" "Mozilla/5.0 (X11; Ubun
2019-10-13 04:52:49
37.76.151.254 attackbotsspam
IP Ban Report : https://help-dysk.pl/wordpress-firewall-plugins/ip/37.76.151.254/ 
 RU - 1H : (115)  
 Protection Against DDoS WordPress plugin :  
 "odzyskiwanie danych help-dysk" 
 IP Address Ranges by Country : RU 
 NAME ASN : ASN12389 
 
 IP : 37.76.151.254 
 
 CIDR : 37.76.128.0/19 
 
 PREFIX COUNT : 2741 
 
 UNIQUE IP COUNT : 8699648 
 
 
 WYKRYTE ATAKI Z ASN12389 :  
  1H - 5 
  3H - 9 
  6H - 12 
 12H - 21 
 24H - 53 
 
 DateTime : 2019-10-12 16:06:48 
 
 INFO : Port SSH 22 Scan Detected and Blocked by ADMIN  - data recovery
2019-10-13 05:18:45
185.209.0.14 attackbotsspam
RDP Bruteforce
2019-10-13 05:10:57
198.98.52.141 attackspam
Oct 12 06:09:49 *** sshd[30917]: Failed password for invalid user jenkins from 198.98.52.141 port 35398 ssh2
Oct 12 06:09:49 *** sshd[30923]: Failed password for invalid user tomcat from 198.98.52.141 port 35520 ssh2
Oct 12 06:09:49 *** sshd[30930]: Failed password for invalid user mysql from 198.98.52.141 port 35588 ssh2
Oct 12 06:09:49 *** sshd[30934]: Failed password for invalid user openms from 198.98.52.141 port 35568 ssh2
Oct 12 06:09:49 *** sshd[30927]: Failed password for invalid user user from 198.98.52.141 port 35550 ssh2
Oct 12 06:09:49 *** sshd[30929]: Failed password for invalid user guest from 198.98.52.141 port 35554 ssh2
Oct 12 06:09:49 *** sshd[30925]: Failed password for invalid user vagrant from 198.98.52.141 port 35566 ssh2
Oct 12 06:09:49 *** sshd[30924]: Failed password for invalid user vsftpd from 198.98.52.141 port 35580 ssh2
Oct 12 06:09:49 *** sshd[30926]: Failed password for invalid user admin from 198.98.52.141 port 35542 ssh2
Oct 12 06:09:49 *** sshd[30919]: Failed password for in
2019-10-13 05:14:07
198.50.200.80 attackspambots
2019-10-12T15:23:25.685223abusebot-6.cloudsearch.cf sshd\[21011\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=ip80.ip-198-50-200.net  user=root
2019-10-13 05:21:05

最近上报的IP列表

106.14.198.124 106.14.198.121 106.14.198.219 106.14.198.125
106.14.198.167 106.14.198.222 106.14.198.234 106.14.198.24
106.14.198.227 106.14.198.220 106.14.198.248 106.14.198.3
101.247.173.47 106.14.198.37 106.14.198.39 106.14.198.244
106.14.198.40 106.14.198.46 106.14.198.57 106.14.198.60