必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): None

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
IP 类型 评论内容 时间
114.100.117.244 attackspambots
FTP/21 MH Probe, BF, Hack -
2019-08-09 21:07:07
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 114.100.117.114
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 35171
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;114.100.117.114.		IN	A

;; AUTHORITY SECTION:
.			33	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022030400 1800 900 604800 86400

;; Query time: 65 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Mar 04 14:18:29 CST 2022
;; MSG SIZE  rcvd: 108
HOST信息:
Host 114.117.100.114.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 114.117.100.114.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
182.180.128.132 attackbotsspam
Jun  9 06:10:30 ws12vmsma01 sshd[30811]: Invalid user dial from 182.180.128.132
Jun  9 06:10:32 ws12vmsma01 sshd[30811]: Failed password for invalid user dial from 182.180.128.132 port 36158 ssh2
Jun  9 06:18:44 ws12vmsma01 sshd[31986]: Invalid user sa from 182.180.128.132
...
2020-06-09 19:39:45
2.134.178.201 attackspam
1591680271 - 06/09/2020 07:24:31 Host: 2.134.178.201/2.134.178.201 Port: 445 TCP Blocked
2020-06-09 19:09:20
101.51.66.54 attackbotsspam
Automatic report - Port Scan Attack
2020-06-09 19:34:12
120.131.13.186 attackbots
Jun  9 11:18:29 abendstille sshd\[4702\]: Invalid user mysql from 120.131.13.186
Jun  9 11:18:29 abendstille sshd\[4702\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=120.131.13.186
Jun  9 11:18:31 abendstille sshd\[4702\]: Failed password for invalid user mysql from 120.131.13.186 port 31256 ssh2
Jun  9 11:21:32 abendstille sshd\[7465\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=120.131.13.186  user=root
Jun  9 11:21:34 abendstille sshd\[7465\]: Failed password for root from 120.131.13.186 port 4262 ssh2
...
2020-06-09 19:17:07
94.102.56.215 attackspambots
1591701679 - 06/09/2020 18:21:19 Host: security.criminalip.com/94.102.56.215 Port: 1 UDP Blocked
...
2020-06-09 19:30:09
89.7.69.188 attackspambots
Automatic report - Port Scan Attack
2020-06-09 19:47:47
114.55.255.215 attack
Automatic report - Port Scan Attack
2020-06-09 19:25:11
210.212.237.67 attack
Failed password for invalid user dbseller from 210.212.237.67 port 46602 ssh2
2020-06-09 19:33:38
94.53.193.8 attackbotsspam
Unauthorized connection attempt detected from IP address 94.53.193.8 to port 23
2020-06-09 19:08:19
36.81.7.84 attackbotsspam
20/6/8@23:48:01: FAIL: Alarm-Network address from=36.81.7.84
...
2020-06-09 19:28:39
200.196.249.170 attackspam
2020-06-09T11:21:18.160035shield sshd\[3828\]: Invalid user vertica from 200.196.249.170 port 48016
2020-06-09T11:21:18.163531shield sshd\[3828\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=200.196.249.170
2020-06-09T11:21:19.742050shield sshd\[3828\]: Failed password for invalid user vertica from 200.196.249.170 port 48016 ssh2
2020-06-09T11:24:31.044861shield sshd\[5304\]: Invalid user celeste from 200.196.249.170 port 35216
2020-06-09T11:24:31.048657shield sshd\[5304\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=200.196.249.170
2020-06-09 19:40:12
200.54.170.198 attack
Jun  9 12:32:17 ArkNodeAT sshd\[5004\]: Invalid user xieyuan from 200.54.170.198
Jun  9 12:32:17 ArkNodeAT sshd\[5004\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=200.54.170.198
Jun  9 12:32:19 ArkNodeAT sshd\[5004\]: Failed password for invalid user xieyuan from 200.54.170.198 port 48340 ssh2
2020-06-09 19:37:03
191.5.55.7 attackspambots
Fail2Ban Ban Triggered (2)
2020-06-09 19:07:29
219.133.158.100 attackbots
Jun  9 06:28:06 mail.srvfarm.net postfix/smtpd[1378604]: NOQUEUE: reject: RCPT from unknown[219.133.158.100]: 554 5.7.1 Service unavailable; Client host [219.133.158.100] blocked using zen.spamhaus.org; https://www.spamhaus.org/query/ip/219.133.158.100; from= to= proto=ESMTP helo=
Jun  9 06:28:06 mail.srvfarm.net postfix/smtpd[1378600]: NOQUEUE: reject: RCPT from unknown[219.133.158.100]: 554 5.7.1 Service unavailable; Client host [219.133.158.100] blocked using zen.spamhaus.org; https://www.spamhaus.org/query/ip/219.133.158.100; from= to= proto=ESMTP helo=
Jun  9 06:28:06 mail.srvfarm.net postfix/smtpd[1377529]: NOQUEUE: reject: RCPT from unknown[219.133.158.100]: 554 5.7.1 Service unavailable; Client host [219.133.158.100] blocked using zen.spamhaus.org; https://www.spamhaus.org/query/ip/219.133.158.100; from= to= proto=ESMTP helo=
Jun
2020-06-09 19:06:46
193.27.228.221 attackbots
 TCP (SYN) 193.27.228.221:55904 -> port 40811, len 44
2020-06-09 19:40:37

最近上报的IP列表

114.100.117.160 114.100.117.121 114.100.116.77 114.100.117.184
114.100.117.183 113.235.117.3 114.100.117.187 114.100.117.12
114.100.117.204 114.100.117.234 114.100.117.233 114.100.117.22
114.100.117.29 113.235.117.44 114.100.117.45 114.100.117.193
114.100.117.64 114.100.117.236 114.100.117.58 42.91.21.37