必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): China

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 114.106.72.150
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 36548
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;114.106.72.150.			IN	A

;; AUTHORITY SECTION:
.			569	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022030400 1800 900 604800 86400

;; Query time: 63 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Mar 04 19:32:59 CST 2022
;; MSG SIZE  rcvd: 107
HOST信息:
Host 150.72.106.114.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 150.72.106.114.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
46.38.144.17 attackspam
Nov 26 08:02:35 relay postfix/smtpd\[10545\]: warning: unknown\[46.38.144.17\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Nov 26 08:02:54 relay postfix/smtpd\[22871\]: warning: unknown\[46.38.144.17\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Nov 26 08:03:11 relay postfix/smtpd\[11709\]: warning: unknown\[46.38.144.17\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Nov 26 08:03:31 relay postfix/smtpd\[11984\]: warning: unknown\[46.38.144.17\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Nov 26 08:03:49 relay postfix/smtpd\[4953\]: warning: unknown\[46.38.144.17\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
...
2019-11-26 15:10:34
217.149.7.251 attack
Nov 26 11:53:46 vibhu-HP-Z238-Microtower-Workstation sshd\[10782\]: Invalid user target from 217.149.7.251
Nov 26 11:53:46 vibhu-HP-Z238-Microtower-Workstation sshd\[10782\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=217.149.7.251
Nov 26 11:53:47 vibhu-HP-Z238-Microtower-Workstation sshd\[10782\]: Failed password for invalid user target from 217.149.7.251 port 45562 ssh2
Nov 26 12:00:09 vibhu-HP-Z238-Microtower-Workstation sshd\[11105\]: Invalid user 111111 from 217.149.7.251
Nov 26 12:00:09 vibhu-HP-Z238-Microtower-Workstation sshd\[11105\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=217.149.7.251
...
2019-11-26 14:50:37
132.248.52.241 attackspambots
Nov 26 09:04:02 site3 sshd\[114169\]: Invalid user zebulen from 132.248.52.241
Nov 26 09:04:02 site3 sshd\[114169\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=132.248.52.241
Nov 26 09:04:04 site3 sshd\[114169\]: Failed password for invalid user zebulen from 132.248.52.241 port 45770 ssh2
Nov 26 09:12:44 site3 sshd\[114286\]: Invalid user veneice from 132.248.52.241
Nov 26 09:12:44 site3 sshd\[114286\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=132.248.52.241
...
2019-11-26 15:22:58
41.210.12.37 attackbotsspam
2019-11-26T06:29:52.956594abusebot.cloudsearch.cf sshd\[23757\]: Invalid user admin from 41.210.12.37 port 40281
2019-11-26 15:11:56
52.225.132.3 attackspam
52.225.132.3 - - [26/Nov/2019:07:29:46 +0100] "POST /wp-login.php HTTP/1.1" 200 3123 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
52.225.132.3 - - [26/Nov/2019:07:29:47 +0100] "POST /wp-login.php HTTP/1.1" 200 3102 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
...
2019-11-26 15:14:50
194.61.26.34 attack
Nov 26 07:14:58 ip-172-31-62-245 sshd\[28500\]: Invalid user admin from 194.61.26.34\
Nov 26 07:15:00 ip-172-31-62-245 sshd\[28500\]: Failed password for invalid user admin from 194.61.26.34 port 54247 ssh2\
Nov 26 07:15:00 ip-172-31-62-245 sshd\[28502\]: Invalid user admin from 194.61.26.34\
Nov 26 07:15:02 ip-172-31-62-245 sshd\[28502\]: Failed password for invalid user admin from 194.61.26.34 port 55748 ssh2\
Nov 26 07:15:02 ip-172-31-62-245 sshd\[28509\]: Invalid user admin from 194.61.26.34\
2019-11-26 15:21:00
218.92.0.176 attack
2019-11-26T06:45:47.780822abusebot.cloudsearch.cf sshd\[23888\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.176  user=root
2019-11-26 14:49:31
60.250.149.19 attackbotsspam
2019-11-26T07:44:01.119816scmdmz1 sshd\[25329\]: Invalid user koseki from 60.250.149.19 port 59396
2019-11-26T07:44:01.122526scmdmz1 sshd\[25329\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=60-250-149-19.hinet-ip.hinet.net
2019-11-26T07:44:02.550960scmdmz1 sshd\[25329\]: Failed password for invalid user koseki from 60.250.149.19 port 59396 ssh2
...
2019-11-26 15:02:23
86.61.66.59 attackbotsspam
Nov 26 01:30:08 TORMINT sshd\[25333\]: Invalid user uftp from 86.61.66.59
Nov 26 01:30:08 TORMINT sshd\[25333\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=86.61.66.59
Nov 26 01:30:10 TORMINT sshd\[25333\]: Failed password for invalid user uftp from 86.61.66.59 port 41374 ssh2
...
2019-11-26 14:59:46
185.232.67.6 attackspam
Nov 26 08:12:33 dedicated sshd[12951]: Invalid user admin from 185.232.67.6 port 44769
2019-11-26 15:13:50
111.12.151.51 attackbotsspam
2019-11-26T06:30:00.384553abusebot-5.cloudsearch.cf sshd\[1734\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.12.151.51  user=root
2019-11-26 15:09:59
175.100.181.43 attack
Unauthorized connection attempt from IP address 175.100.181.43 on Port 445(SMB)
2019-11-26 15:05:02
218.92.0.184 attackbotsspam
Oct 11 13:48:41 microserver sshd[10764]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.184  user=root
Oct 11 13:48:43 microserver sshd[10764]: Failed password for root from 218.92.0.184 port 48646 ssh2
Oct 11 13:48:45 microserver sshd[10764]: Failed password for root from 218.92.0.184 port 48646 ssh2
Oct 11 13:48:49 microserver sshd[10764]: Failed password for root from 218.92.0.184 port 48646 ssh2
Oct 11 13:48:51 microserver sshd[10764]: Failed password for root from 218.92.0.184 port 48646 ssh2
Oct 19 17:52:05 microserver sshd[39479]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.184  user=root
Oct 19 17:52:07 microserver sshd[39479]: Failed password for root from 218.92.0.184 port 7292 ssh2
Oct 19 17:52:10 microserver sshd[39479]: Failed password for root from 218.92.0.184 port 7292 ssh2
Oct 19 17:52:13 microserver sshd[39479]: Failed password for root from 218.92.0.184 port 7292 ssh2
Oct 19 17:52:15 micro
2019-11-26 14:48:41
80.55.9.254 attack
IP Ban Report :  
 https://help-dysk.pl/wordpress-firewall-plugins/ip/80.55.9.254/ 
 
 PL - 1H : (120)  
 Protection Against DDoS WordPress plugin :  
 "odzyskiwanie danych help-dysk" 
 IP Address Ranges by Country : PL 
 NAME ASN : ASN5617 
 
 IP : 80.55.9.254 
 
 CIDR : 80.55.0.0/16 
 
 PREFIX COUNT : 183 
 
 UNIQUE IP COUNT : 5363456 
 
 
 ATTACKS DETECTED ASN5617 :  
  1H - 3 
  3H - 6 
  6H - 10 
 12H - 26 
 24H - 51 
 
 DateTime : 2019-11-26 07:30:14 
 
 INFO : Port Scan TELNET Detected and Blocked by ADMIN  - data recovery
2019-11-26 15:00:29
51.83.73.160 attackbots
Nov 26 07:22:03 Invalid user admin from 51.83.73.160 port 42794
2019-11-26 15:06:38

最近上报的IP列表

116.58.247.46 116.58.247.44 116.58.247.52 116.58.247.50
116.58.247.56 116.58.247.48 116.58.247.42 116.58.247.58
116.58.247.54 114.106.72.157 114.106.72.163 114.106.72.165
114.106.72.166 114.106.72.186 114.106.72.193 116.58.250.39
116.58.250.204 116.58.250.244 116.58.250.214 116.58.250.88