必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): None

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 114.104.138.4
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 14697
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;114.104.138.4.			IN	A

;; AUTHORITY SECTION:
.			594	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022030400 1800 900 604800 86400

;; Query time: 52 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Mar 04 14:34:19 CST 2022
;; MSG SIZE  rcvd: 106
HOST信息:
Host 4.138.104.114.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 4.138.104.114.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
183.87.203.124 attackspam
Trying ports that it shouldn't be.
2019-08-26 01:28:56
106.13.39.193 attack
F2B jail: sshd. Time: 2019-08-25 11:54:04, Reported by: VKReport
2019-08-26 01:09:31
58.150.135.178 attackspam
2019-08-25T16:53:15.501391abusebot-5.cloudsearch.cf sshd\[8987\]: Invalid user nick from 58.150.135.178 port 18430
2019-08-26 01:08:14
49.232.6.214 attackbots
Aug 25 04:13:07 aat-srv002 sshd[6507]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.232.6.214
Aug 25 04:13:09 aat-srv002 sshd[6507]: Failed password for invalid user system from 49.232.6.214 port 42222 ssh2
Aug 25 04:18:06 aat-srv002 sshd[6646]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.232.6.214
Aug 25 04:18:09 aat-srv002 sshd[6646]: Failed password for invalid user shop from 49.232.6.214 port 50752 ssh2
...
2019-08-26 01:22:16
93.170.109.28 attack
Aug 25 17:03:38 MK-Soft-VM3 sshd\[15662\]: Invalid user supervisor from 93.170.109.28 port 41090
Aug 25 17:03:38 MK-Soft-VM3 sshd\[15662\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=93.170.109.28
Aug 25 17:03:41 MK-Soft-VM3 sshd\[15662\]: Failed password for invalid user supervisor from 93.170.109.28 port 41090 ssh2
...
2019-08-26 01:14:32
45.73.12.218 attack
Aug 25 17:12:54 lnxweb61 sshd[7023]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.73.12.218
2019-08-26 01:21:49
61.161.236.202 attackspam
Aug 25 19:55:04 srv-4 sshd\[22545\]: Invalid user test from 61.161.236.202
Aug 25 19:55:04 srv-4 sshd\[22545\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.161.236.202
Aug 25 19:55:06 srv-4 sshd\[22545\]: Failed password for invalid user test from 61.161.236.202 port 40327 ssh2
...
2019-08-26 00:56:27
201.69.200.201 attackbots
Automatic report - Banned IP Access
2019-08-26 00:55:03
107.6.164.206 attackbotsspam
SMTP: Too many logon attempts
2019-08-26 01:35:31
51.83.46.178 attackspambots
Aug 25 13:57:47 www2 sshd\[42395\]: Invalid user kravi from 51.83.46.178Aug 25 13:57:49 www2 sshd\[42395\]: Failed password for invalid user kravi from 51.83.46.178 port 47470 ssh2Aug 25 14:01:51 www2 sshd\[42918\]: Invalid user public from 51.83.46.178
...
2019-08-26 00:50:23
159.89.165.127 attackbotsspam
...
2019-08-26 01:35:12
51.254.123.131 attackspam
Aug 25 18:02:51 mail sshd\[28688\]: Failed password for invalid user remote from 51.254.123.131 port 35338 ssh2
Aug 25 18:18:25 mail sshd\[29074\]: Invalid user janitor from 51.254.123.131 port 48832
Aug 25 18:18:25 mail sshd\[29074\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.254.123.131
...
2019-08-26 01:26:05
158.69.194.115 attackspam
Aug 25 13:37:22 SilenceServices sshd[4455]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=158.69.194.115
Aug 25 13:37:24 SilenceServices sshd[4455]: Failed password for invalid user thaiset from 158.69.194.115 port 46469 ssh2
Aug 25 13:41:55 SilenceServices sshd[6381]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=158.69.194.115
2019-08-26 01:03:32
104.248.181.156 attack
Aug 24 21:54:24 auw2 sshd\[4728\]: Invalid user dana from 104.248.181.156
Aug 24 21:54:24 auw2 sshd\[4728\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.248.181.156
Aug 24 21:54:26 auw2 sshd\[4728\]: Failed password for invalid user dana from 104.248.181.156 port 45108 ssh2
Aug 24 21:58:22 auw2 sshd\[5134\]: Invalid user taras from 104.248.181.156
Aug 24 21:58:22 auw2 sshd\[5134\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.248.181.156
2019-08-26 00:45:33
59.120.19.40 attackbots
Aug 25 12:16:32 www sshd\[29756\]: Invalid user project from 59.120.19.40Aug 25 12:16:34 www sshd\[29756\]: Failed password for invalid user project from 59.120.19.40 port 52027 ssh2Aug 25 12:21:54 www sshd\[29779\]: Invalid user cal from 59.120.19.40
...
2019-08-26 01:00:02

最近上报的IP列表

113.251.175.91 114.104.138.68 114.104.138.77 114.104.138.79
114.104.138.81 114.104.138.8 114.104.138.83 114.104.138.71
114.104.138.85 114.104.138.91 114.104.138.74 114.104.138.84
114.104.138.88 114.104.138.92 113.251.216.10 114.104.138.94
114.104.138.96 114.104.139.100 114.104.138.87 114.104.139.103