必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): Indonesia

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 114.123.222.14
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 1791
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;114.123.222.14.			IN	A

;; AUTHORITY SECTION:
.			421	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022011001 1800 900 604800 86400

;; Query time: 64 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Jan 11 04:09:12 CST 2022
;; MSG SIZE  rcvd: 107
HOST信息:
Host 14.222.123.114.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 14.222.123.114.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
193.33.111.217 attack
Oct 17 08:09:20 localhost sshd\[10357\]: Invalid user smbuser from 193.33.111.217 port 50822
Oct 17 08:09:20 localhost sshd\[10357\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=193.33.111.217
Oct 17 08:09:22 localhost sshd\[10357\]: Failed password for invalid user smbuser from 193.33.111.217 port 50822 ssh2
2019-10-17 14:18:24
41.214.20.60 attackspambots
Oct 16 19:44:07 hpm sshd\[5965\]: Invalid user S180Y04059993 from 41.214.20.60
Oct 16 19:44:07 hpm sshd\[5965\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=41.214.20.60
Oct 16 19:44:10 hpm sshd\[5965\]: Failed password for invalid user S180Y04059993 from 41.214.20.60 port 41205 ssh2
Oct 16 19:52:01 hpm sshd\[6628\]: Invalid user wja from 41.214.20.60
Oct 16 19:52:01 hpm sshd\[6628\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=41.214.20.60
2019-10-17 13:58:54
188.213.165.47 attackbotsspam
Oct 17 06:21:02 vps58358 sshd\[12163\]: Invalid user !@\#rnd$%\^ from 188.213.165.47Oct 17 06:21:04 vps58358 sshd\[12163\]: Failed password for invalid user !@\#rnd$%\^ from 188.213.165.47 port 43448 ssh2Oct 17 06:24:54 vps58358 sshd\[12180\]: Invalid user sane from 188.213.165.47Oct 17 06:24:55 vps58358 sshd\[12180\]: Failed password for invalid user sane from 188.213.165.47 port 53688 ssh2Oct 17 06:29:00 vps58358 sshd\[12214\]: Invalid user jyk from 188.213.165.47Oct 17 06:29:02 vps58358 sshd\[12214\]: Failed password for invalid user jyk from 188.213.165.47 port 35706 ssh2
...
2019-10-17 14:12:35
209.97.169.136 attackspam
Oct 17 03:02:15 firewall sshd[12238]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=209.97.169.136  user=root
Oct 17 03:02:17 firewall sshd[12238]: Failed password for root from 209.97.169.136 port 38740 ssh2
Oct 17 03:06:51 firewall sshd[12359]: Invalid user payment from 209.97.169.136
...
2019-10-17 14:17:03
222.186.173.180 attack
SSH bruteforce (Triggered fail2ban)
2019-10-17 14:10:32
140.143.36.218 attackbots
Oct 17 07:01:13 icinga sshd[17402]: Failed password for root from 140.143.36.218 port 53762 ssh2
Oct 17 07:22:10 icinga sshd[30443]: Failed password for root from 140.143.36.218 port 53502 ssh2
...
2019-10-17 14:20:31
31.184.218.47 attackbotsspam
10/16/2019-23:54:29.029943 31.184.218.47 Protocol: 6 ET SCAN NMAP -sS window 1024
2019-10-17 14:07:03
218.92.0.191 attack
Oct 17 07:57:59 dcd-gentoo sshd[21071]: User root from 218.92.0.191 not allowed because none of user's groups are listed in AllowGroups
Oct 17 07:58:01 dcd-gentoo sshd[21071]: error: PAM: Authentication failure for illegal user root from 218.92.0.191
Oct 17 07:57:59 dcd-gentoo sshd[21071]: User root from 218.92.0.191 not allowed because none of user's groups are listed in AllowGroups
Oct 17 07:58:01 dcd-gentoo sshd[21071]: error: PAM: Authentication failure for illegal user root from 218.92.0.191
Oct 17 07:57:59 dcd-gentoo sshd[21071]: User root from 218.92.0.191 not allowed because none of user's groups are listed in AllowGroups
Oct 17 07:58:01 dcd-gentoo sshd[21071]: error: PAM: Authentication failure for illegal user root from 218.92.0.191
Oct 17 07:58:01 dcd-gentoo sshd[21071]: Failed keyboard-interactive/pam for invalid user root from 218.92.0.191 port 14605 ssh2
...
2019-10-17 13:59:31
137.74.44.162 attackspambots
Oct 17 01:46:02 TORMINT sshd\[19966\]: Invalid user vs from 137.74.44.162
Oct 17 01:46:02 TORMINT sshd\[19966\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=137.74.44.162
Oct 17 01:46:04 TORMINT sshd\[19966\]: Failed password for invalid user vs from 137.74.44.162 port 58957 ssh2
...
2019-10-17 13:59:07
128.199.88.188 attackbots
Oct 17 08:14:16 legacy sshd[5163]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.199.88.188
Oct 17 08:14:18 legacy sshd[5163]: Failed password for invalid user brysjhhrhl from 128.199.88.188 port 51477 ssh2
Oct 17 08:18:30 legacy sshd[5225]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.199.88.188
...
2019-10-17 14:24:20
201.116.194.210 attack
Oct 17 08:02:11 localhost sshd\[21089\]: Invalid user 10203040 from 201.116.194.210
Oct 17 08:02:11 localhost sshd\[21089\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=201.116.194.210
Oct 17 08:02:13 localhost sshd\[21089\]: Failed password for invalid user 10203040 from 201.116.194.210 port 11359 ssh2
Oct 17 08:06:57 localhost sshd\[21320\]: Invalid user 123456 from 201.116.194.210
Oct 17 08:06:57 localhost sshd\[21320\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=201.116.194.210
...
2019-10-17 14:25:21
92.119.160.107 attack
Oct 17 07:44:41 h2177944 kernel: \[4167033.151028\] \[UFW BLOCK\] IN=venet0 OUT= MAC= SRC=92.119.160.107 DST=85.214.117.9 LEN=40 TOS=0x00 PREC=0x00 TTL=248 ID=12790 PROTO=TCP SPT=48828 DPT=11915 WINDOW=1024 RES=0x00 SYN URGP=0 
Oct 17 07:46:52 h2177944 kernel: \[4167164.090992\] \[UFW BLOCK\] IN=venet0 OUT= MAC= SRC=92.119.160.107 DST=85.214.117.9 LEN=40 TOS=0x00 PREC=0x00 TTL=248 ID=22112 PROTO=TCP SPT=48828 DPT=11714 WINDOW=1024 RES=0x00 SYN URGP=0 
Oct 17 07:47:16 h2177944 kernel: \[4167187.895464\] \[UFW BLOCK\] IN=venet0 OUT= MAC= SRC=92.119.160.107 DST=85.214.117.9 LEN=40 TOS=0x00 PREC=0x00 TTL=249 ID=39639 PROTO=TCP SPT=48828 DPT=12119 WINDOW=1024 RES=0x00 SYN URGP=0 
Oct 17 08:03:32 h2177944 kernel: \[4168163.726790\] \[UFW BLOCK\] IN=venet0 OUT= MAC= SRC=92.119.160.107 DST=85.214.117.9 LEN=40 TOS=0x00 PREC=0x00 TTL=248 ID=8460 PROTO=TCP SPT=48828 DPT=11568 WINDOW=1024 RES=0x00 SYN URGP=0 
Oct 17 08:08:03 h2177944 kernel: \[4168434.567889\] \[UFW BLOCK\] IN=venet0 OUT= MAC= SRC=92.119.160.107 DST=85.2
2019-10-17 14:17:41
179.179.39.158 attackspam
IP Ban Report : https://help-dysk.pl/wordpress-firewall-plugins/ip/179.179.39.158/ 
 BR - 1H : (325)  
 Protection Against DDoS WordPress plugin :  
 "odzyskiwanie danych help-dysk" 
 IP Address Ranges by Country : BR 
 NAME ASN : ASN18881 
 
 IP : 179.179.39.158 
 
 CIDR : 179.179.32.0/19 
 
 PREFIX COUNT : 938 
 
 UNIQUE IP COUNT : 4233472 
 
 
 WYKRYTE ATAKI Z ASN18881 :  
  1H - 5 
  3H - 14 
  6H - 17 
 12H - 22 
 24H - 43 
 
 DateTime : 2019-10-17 05:54:22 
 
 INFO : Port Scan TELNET Detected and Blocked by ADMIN  - data recovery
2019-10-17 14:09:03
196.218.177.170 attackspambots
Telnet Server BruteForce Attack
2019-10-17 14:35:45
92.119.160.106 attackbotsspam
Oct 17 08:01:34 mc1 kernel: \[2578463.197691\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:11:a9:7b:d2:74:7f:6e:37:e3:08:00 SRC=92.119.160.106 DST=159.69.205.51 LEN=40 TOS=0x00 PREC=0x00 TTL=244 ID=48393 PROTO=TCP SPT=48793 DPT=10605 WINDOW=1024 RES=0x00 SYN URGP=0 
Oct 17 08:02:24 mc1 kernel: \[2578512.482817\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:11:a9:7b:d2:74:7f:6e:37:e3:08:00 SRC=92.119.160.106 DST=159.69.205.51 LEN=40 TOS=0x00 PREC=0x00 TTL=244 ID=54572 PROTO=TCP SPT=48793 DPT=11065 WINDOW=1024 RES=0x00 SYN URGP=0 
Oct 17 08:03:05 mc1 kernel: \[2578554.109557\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:11:a9:7b:d2:74:7f:6e:37:e3:08:00 SRC=92.119.160.106 DST=159.69.205.51 LEN=40 TOS=0x00 PREC=0x00 TTL=243 ID=10710 PROTO=TCP SPT=48793 DPT=10814 WINDOW=1024 RES=0x00 SYN URGP=0 
...
2019-10-17 14:32:40

最近上报的IP列表

235.106.118.222 227.207.139.97 140.87.134.130 159.134.104.50
243.46.171.56 155.175.240.223 117.196.70.42 100.216.252.254
45.150.161.123 21.29.247.241 165.95.165.13 151.194.147.4
140.130.48.205 218.202.105.243 173.151.102.143 147.217.121.139
105.69.181.84 13.109.39.58 101.95.42.73 208.129.22.212