必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): China

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 114.106.138.147
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 11791
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;114.106.138.147.		IN	A

;; AUTHORITY SECTION:
.			29	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025022801 1800 900 604800 86400

;; Query time: 18 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Mar 01 06:14:24 CST 2025
;; MSG SIZE  rcvd: 108
HOST信息:
Host 147.138.106.114.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 147.138.106.114.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
148.59.128.204 attack
#12507 - [148.59.128.204] Error: 550 5.7.1 Forged HELO hostname detected
#12507 - [148.59.128.204] Error: 550 5.7.1 Forged HELO hostname detected
#12507 - [148.59.128.204] Error: 550 5.7.1 Forged HELO hostname detected
#12507 - [148.59.128.204] Error: 550 5.7.1 Forged HELO hostname detected

........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=148.59.128.204
2020-06-07 20:34:09
35.200.241.227 attackspam
Jun  7 13:55:15 vmd26974 sshd[6047]: Failed password for root from 35.200.241.227 port 43138 ssh2
...
2020-06-07 20:52:34
87.246.7.66 attack
Jun  7 14:53:03 srv01 postfix/smtpd\[12551\]: warning: unknown\[87.246.7.66\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Jun  7 14:53:13 srv01 postfix/smtpd\[12551\]: warning: unknown\[87.246.7.66\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Jun  7 14:53:14 srv01 postfix/smtpd\[15331\]: warning: unknown\[87.246.7.66\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Jun  7 14:53:14 srv01 postfix/smtpd\[15332\]: warning: unknown\[87.246.7.66\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Jun  7 14:53:41 srv01 postfix/smtpd\[12551\]: warning: unknown\[87.246.7.66\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
...
2020-06-07 20:56:27
81.243.0.119 attackbots
07.06.2020 14:09:21 - RDP Login Fail Detected by 
https://www.elinox.de/RDP-Wächter
2020-06-07 20:51:14
185.220.101.134 attack
Probing sign-up form.
2020-06-07 21:02:48
51.38.238.165 attackspambots
Jun  7 08:09:50 mail sshd\[32434\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.38.238.165  user=root
...
2020-06-07 20:22:11
109.72.205.195 attackspambots
Unauthorised access (Jun  7) SRC=109.72.205.195 LEN=52 TTL=108 ID=2281 DF TCP DPT=445 WINDOW=8192 SYN
2020-06-07 20:34:43
91.98.113.181 attackspambots
port scan and connect, tcp 80 (http)
2020-06-07 20:28:11
222.186.15.158 attackbotsspam
Jun  7 14:17:24 legacy sshd[5670]: Failed password for root from 222.186.15.158 port 17114 ssh2
Jun  7 14:17:43 legacy sshd[5675]: Failed password for root from 222.186.15.158 port 37293 ssh2
...
2020-06-07 20:23:01
93.174.95.106 attackspambots
Jun  7 14:09:01 debian-2gb-nbg1-2 kernel: \[13790486.190118\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=93.174.95.106 DST=195.201.40.59 LEN=44 TOS=0x10 PREC=0x00 TTL=120 ID=16217 PROTO=TCP SPT=29011 DPT=5357 WINDOW=40821 RES=0x00 SYN URGP=0
2020-06-07 21:01:00
206.189.32.140 attackspam
chaangnoifulda.de 206.189.32.140 [07/Jun/2020:14:09:18 +0200] "POST /wp-login.php HTTP/1.1" 200 6006 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
chaangnoifulda.de 206.189.32.140 [07/Jun/2020:14:09:19 +0200] "POST /xmlrpc.php HTTP/1.1" 200 4065 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
2020-06-07 20:49:35
121.200.61.37 attackspambots
Brute force attempt
2020-06-07 20:51:42
52.14.59.248 attackbots
Jun  4 11:39:34 xxxx sshd[25436]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=em3-52-14-59-248.us-east-2.compute.amazonaws.com  user=r.r
Jun  4 11:39:35 xxxx sshd[25436]: Failed password for r.r from 52.14.59.248 port 21368 ssh2
Jun  4 12:00:08 xxxx sshd[25467]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=em3-52-14-59-248.us-east-2.compute.amazonaws.com  user=r.r
Jun  4 12:00:10 xxxx sshd[25467]: Failed password for r.r from 52.14.59.248 port 53392 ssh2
Jun  4 12:04:19 xxxx sshd[25475]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=em3-52-14-59-248.us-east-2.compute.amazonaws.com  user=r.r
Jun  4 12:04:21 xxxx sshd[25475]: Failed password for r.r from 52.14.59.248 port 59752 ssh2
Jun  4 12:08:28 xxxx sshd[25481]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=em3-52-14-59-248.us-east-2.compute.amazonaw........
-------------------------------
2020-06-07 20:21:58
112.85.42.188 attackbotsspam
06/07/2020-09:02:04.855115 112.85.42.188 Protocol: 6 ET SCAN Potential SSH Scan
2020-06-07 21:04:31
188.131.204.154 attackbotsspam
2020-06-07T12:00:26.527766abusebot-3.cloudsearch.cf sshd[4530]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.131.204.154  user=root
2020-06-07T12:00:29.015492abusebot-3.cloudsearch.cf sshd[4530]: Failed password for root from 188.131.204.154 port 58224 ssh2
2020-06-07T12:03:33.116774abusebot-3.cloudsearch.cf sshd[4802]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.131.204.154  user=root
2020-06-07T12:03:34.942122abusebot-3.cloudsearch.cf sshd[4802]: Failed password for root from 188.131.204.154 port 33760 ssh2
2020-06-07T12:06:41.729229abusebot-3.cloudsearch.cf sshd[5005]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.131.204.154  user=root
2020-06-07T12:06:44.029625abusebot-3.cloudsearch.cf sshd[5005]: Failed password for root from 188.131.204.154 port 37528 ssh2
2020-06-07T12:09:39.814942abusebot-3.cloudsearch.cf sshd[5166]: pam_unix(sshd:auth): 
...
2020-06-07 20:31:23

最近上报的IP列表

52.117.108.41 57.205.1.115 169.77.76.148 99.78.17.165
47.150.20.127 225.225.11.239 185.145.97.28 84.206.158.32
122.227.180.52 50.213.131.205 34.116.29.1 176.3.6.20
5.191.225.184 215.232.206.83 121.247.112.76 55.166.75.9
199.187.126.46 244.23.70.208 73.182.27.171 38.187.96.247