必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): China

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 106.14.8.74
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 23160
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;106.14.8.74.			IN	A

;; AUTHORITY SECTION:
.			287	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022022500 1800 900 604800 86400

;; Query time: 59 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 25 21:33:26 CST 2022
;; MSG SIZE  rcvd: 104
HOST信息:
Host 74.8.14.106.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 74.8.14.106.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
58.241.46.14 attackbotsspam
2019-12-28T19:32:14.116147vps751288.ovh.net sshd\[16094\]: Invalid user dunia from 58.241.46.14 port 12817
2019-12-28T19:32:14.125843vps751288.ovh.net sshd\[16094\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=58.241.46.14
2019-12-28T19:32:16.323781vps751288.ovh.net sshd\[16094\]: Failed password for invalid user dunia from 58.241.46.14 port 12817 ssh2
2019-12-28T19:33:30.785306vps751288.ovh.net sshd\[16114\]: Invalid user guest from 58.241.46.14 port 30978
2019-12-28T19:33:30.793468vps751288.ovh.net sshd\[16114\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=58.241.46.14
2019-12-29 06:30:12
119.254.155.187 attackspambots
Dec 28 23:55:06 mout sshd[28531]: Invalid user games3333 from 119.254.155.187 port 1261
2019-12-29 06:55:33
163.172.204.185 attack
2019-12-29T09:24:43.564437luisaranguren sshd[3078130]: Connection from 163.172.204.185 port 41973 on 10.10.10.6 port 22 rdomain ""
2019-12-29T09:24:44.989904luisaranguren sshd[3078130]: Invalid user dathan from 163.172.204.185 port 41973
2019-12-29T09:24:44.996848luisaranguren sshd[3078130]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=163.172.204.185
2019-12-29T09:24:43.564437luisaranguren sshd[3078130]: Connection from 163.172.204.185 port 41973 on 10.10.10.6 port 22 rdomain ""
2019-12-29T09:24:44.989904luisaranguren sshd[3078130]: Invalid user dathan from 163.172.204.185 port 41973
2019-12-29T09:24:47.288198luisaranguren sshd[3078130]: Failed password for invalid user dathan from 163.172.204.185 port 41973 ssh2
...
2019-12-29 06:35:51
150.223.21.177 attackspambots
Invalid user asjeet from 150.223.21.177 port 54148
2019-12-29 06:29:13
61.244.196.102 attackbots
C1,DEF GET /wp-login.php
2019-12-29 07:02:30
80.82.77.139 attack
Unauthorized connection attempt detected from IP address 80.82.77.139 to port 4949
2019-12-29 06:55:57
1.53.116.251 attack
19/12/28@17:37:44: FAIL: Alarm-Telnet address from=1.53.116.251
...
2019-12-29 07:08:00
31.179.144.190 attackbots
Dec 28 17:37:48 Tower sshd[11114]: Connection from 31.179.144.190 port 34118 on 192.168.10.220 port 22 rdomain ""
Dec 28 17:37:49 Tower sshd[11114]: Invalid user toyota from 31.179.144.190 port 34118
Dec 28 17:37:49 Tower sshd[11114]: error: Could not get shadow information for NOUSER
Dec 28 17:37:49 Tower sshd[11114]: Failed password for invalid user toyota from 31.179.144.190 port 34118 ssh2
Dec 28 17:37:50 Tower sshd[11114]: Received disconnect from 31.179.144.190 port 34118:11: Bye Bye [preauth]
Dec 28 17:37:50 Tower sshd[11114]: Disconnected from invalid user toyota 31.179.144.190 port 34118 [preauth]
2019-12-29 06:54:14
2.93.22.164 attack
1577572670 - 12/28/2019 23:37:50 Host: 2.93.22.164/2.93.22.164 Port: 445 TCP Blocked
2019-12-29 07:03:27
82.146.48.235 attackbotsspam
Dec 28 23:37:43 grey postfix/smtpd\[12783\]: NOQUEUE: reject: RCPT from unknown\[82.146.48.235\]: 554 5.7.1 Service unavailable\; Client host \[82.146.48.235\] blocked using db.wpbl.info\; Spam source - http://wpbl.info/record\?ip=82.146.48.235\; from=\ to=\ proto=ESMTP helo=\
...
2019-12-29 07:09:35
1.160.78.244 attackbotsspam
port 23
2019-12-29 06:52:00
164.132.62.233 attack
Dec 28 20:27:36 srv206 sshd[28662]: Invalid user uunko from 164.132.62.233
...
2019-12-29 06:31:01
177.11.234.233 attackbots
Automatic report - Port Scan Attack
2019-12-29 06:47:18
93.148.209.74 attack
Invalid user baldick from 93.148.209.74 port 35214
2019-12-29 07:00:31
107.150.117.77 attack
Triggered: repeated knocking on closed ports.
2019-12-29 06:37:09

最近上报的IP列表

106.14.77.222 106.14.79.6 106.14.8.161 106.14.79.59
106.14.80.125 106.14.80.23 106.14.80.244 106.14.80.206
106.14.79.80 106.14.80.169 106.14.80.7 106.14.80.81
106.14.81.104 101.254.149.11 106.14.81.110 106.14.81.195
106.14.81.39 106.14.81.70 106.14.81.79 106.14.81.138