必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): United States of America (the)

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 11.71.114.244
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 26678
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;11.71.114.244.			IN	A

;; AUTHORITY SECTION:
.			599	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2024010601 1800 900 604800 86400

;; Query time: 91 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Jan 07 04:09:14 CST 2024
;; MSG SIZE  rcvd: 106
HOST信息:
Host 244.114.71.11.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 244.114.71.11.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
113.232.138.144 attack
UTC: 2019-12-07 port: 23/tcp
2019-12-08 20:34:12
201.49.127.212 attackbotsspam
sshd jail - ssh hack attempt
2019-12-08 21:01:49
222.186.169.192 attackbotsspam
pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.169.192  user=root
Failed password for root from 222.186.169.192 port 6728 ssh2
Failed password for root from 222.186.169.192 port 6728 ssh2
Failed password for root from 222.186.169.192 port 6728 ssh2
Failed password for root from 222.186.169.192 port 6728 ssh2
2019-12-08 20:35:34
35.240.217.103 attack
Dec  8 02:11:41 php1 sshd\[8883\]: Invalid user http from 35.240.217.103
Dec  8 02:11:41 php1 sshd\[8883\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=35.240.217.103
Dec  8 02:11:43 php1 sshd\[8883\]: Failed password for invalid user http from 35.240.217.103 port 57274 ssh2
Dec  8 02:17:51 php1 sshd\[9422\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=35.240.217.103  user=root
Dec  8 02:17:53 php1 sshd\[9422\]: Failed password for root from 35.240.217.103 port 38228 ssh2
2019-12-08 20:26:47
106.13.87.145 attack
Dec  8 01:00:30 server sshd\[792\]: Failed password for invalid user server from 106.13.87.145 port 48210 ssh2
Dec  8 12:19:10 server sshd\[30483\]: Invalid user nejo from 106.13.87.145
Dec  8 12:19:10 server sshd\[30483\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.87.145 
Dec  8 12:19:12 server sshd\[30483\]: Failed password for invalid user nejo from 106.13.87.145 port 57896 ssh2
Dec  8 12:26:22 server sshd\[544\]: Invalid user kolter from 106.13.87.145
Dec  8 12:26:22 server sshd\[544\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.87.145 
...
2019-12-08 20:36:55
77.82.28.135 attack
trying to brutforce my nas
2019-12-08 20:50:28
186.136.207.241 attack
Fail2Ban - SSH Bruteforce Attempt
2019-12-08 20:19:03
49.48.160.35 attackbotsspam
UTC: 2019-12-07 port: 26/tcp
2019-12-08 20:48:24
193.19.178.168 attackspambots
Dec  8 09:18:09 sso sshd[24926]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=193.19.178.168
Dec  8 09:18:11 sso sshd[24926]: Failed password for invalid user jeill from 193.19.178.168 port 42194 ssh2
...
2019-12-08 20:35:55
112.1.81.34 attack
Host Scan
2019-12-08 20:32:20
66.45.239.130 attackspambots
SSH User Authentication Brute Force Attempt, PTR: server.hostalbania.com.
2019-12-08 20:54:40
167.99.155.36 attack
Dec  8 13:16:20 vpn01 sshd[759]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.99.155.36
Dec  8 13:16:22 vpn01 sshd[759]: Failed password for invalid user server from 167.99.155.36 port 36596 ssh2
...
2019-12-08 20:36:28
182.61.163.131 attack
Dec  8 10:18:21 microserver sshd[45942]: Invalid user apache from 182.61.163.131 port 17574
Dec  8 10:18:21 microserver sshd[45942]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.61.163.131
Dec  8 10:18:23 microserver sshd[45942]: Failed password for invalid user apache from 182.61.163.131 port 17574 ssh2
Dec  8 10:26:05 microserver sshd[47350]: Invalid user pi from 182.61.163.131 port 50273
Dec  8 10:26:05 microserver sshd[47350]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.61.163.131
2019-12-08 20:38:46
211.78.85.196 attackbotsspam
1575786372 - 12/08/2019 07:26:12 Host: 211.78.85.196/211.78.85.196 Port: 6001 TCP Blocked
2019-12-08 20:24:16
54.39.193.26 attackbots
Dec  8 07:26:00 vmd17057 sshd\[12437\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=54.39.193.26  user=root
Dec  8 07:26:03 vmd17057 sshd\[12437\]: Failed password for root from 54.39.193.26 port 42284 ssh2
Dec  8 07:26:03 vmd17057 sshd\[12502\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=54.39.193.26  user=root
...
2019-12-08 20:41:32

最近上报的IP列表

11.72.247.84 11.70.195.59 11.74.23.94 11.71.182.190
11.72.118.123 11.71.190.136 11.7.71.75 11.70.76.151
11.70.233.137 11.72.79.211 11.70.97.41 11.70.79.117
11.71.150.148 11.70.161.66 11.72.116.100 11.72.237.149
11.70.120.140 11.71.116.55 11.72.76.32 11.7.225.191