必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): China

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 114.138.160.69
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 43309
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;114.138.160.69.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025020602 1800 900 604800 86400

;; Query time: 36 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 07 06:20:46 CST 2025
;; MSG SIZE  rcvd: 107
HOST信息:
Host 69.160.138.114.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 69.160.138.114.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
80.20.14.250 attack
20 attempts against mh-ssh on echoip
2020-10-04 05:09:33
104.131.110.155 attack
web-1 [ssh] SSH Attack
2020-10-04 04:44:08
111.229.12.69 attackbots
Invalid user coin from 111.229.12.69 port 56698
2020-10-04 05:15:31
191.23.113.164 attackbotsspam
(sshd) Failed SSH login from 191.23.113.164 (BR/Brazil/Espírito Santo/Cariacica/191-23-113-164.user.vivozap.com.br): 5 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: Oct  3 16:56:39 atlas sshd[30998]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=191.23.113.164  user=root
Oct  3 16:56:41 atlas sshd[30998]: Failed password for root from 191.23.113.164 port 51906 ssh2
Oct  3 16:56:43 atlas sshd[31045]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=191.23.113.164  user=root
Oct  3 16:56:45 atlas sshd[31045]: Failed password for root from 191.23.113.164 port 52064 ssh2
Oct  3 16:56:46 atlas sshd[31070]: Invalid user ubnt from 191.23.113.164 port 52158
2020-10-04 05:01:30
170.239.226.27 attackspambots
Oct  2 16:26:59 josie sshd[27931]: Did not receive identification string from 170.239.226.27
Oct  2 16:26:59 josie sshd[27930]: Did not receive identification string from 170.239.226.27
Oct  2 16:26:59 josie sshd[27932]: Did not receive identification string from 170.239.226.27
Oct  2 16:26:59 josie sshd[27933]: Did not receive identification string from 170.239.226.27
Oct  2 16:27:04 josie sshd[27961]: Invalid user admina from 170.239.226.27
Oct  2 16:27:04 josie sshd[27959]: Invalid user admina from 170.239.226.27
Oct  2 16:27:04 josie sshd[27956]: Invalid user admina from 170.239.226.27
Oct  2 16:27:04 josie sshd[27958]: Invalid user admina from 170.239.226.27
Oct  2 16:27:04 josie sshd[27961]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=170.239.226.27 
Oct  2 16:27:04 josie sshd[27959]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=170.239.226.27 
Oct  2 16:27:04 josie sshd[27956]:........
-------------------------------
2020-10-04 04:42:55
165.22.98.186 attackspambots
Cowrie Honeypot: 3 unauthorised SSH/Telnet login attempts between 2020-10-03T15:04:51Z and 2020-10-03T15:15:01Z
2020-10-04 04:46:14
5.200.241.104 attackbotsspam
1601671289 - 10/02/2020 22:41:29 Host: 5.200.241.104/5.200.241.104 Port: 445 TCP Blocked
2020-10-04 04:49:03
46.101.8.39 attack
20 attempts against mh-ssh on comet
2020-10-04 04:50:03
222.186.42.57 attackbots
Oct  3 22:36:08 vps639187 sshd\[6862\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.42.57  user=root
Oct  3 22:36:10 vps639187 sshd\[6862\]: Failed password for root from 222.186.42.57 port 25794 ssh2
Oct  3 22:36:13 vps639187 sshd\[6862\]: Failed password for root from 222.186.42.57 port 25794 ssh2
...
2020-10-04 04:43:21
92.50.249.166 attack
Invalid user root01 from 92.50.249.166 port 49586
2020-10-04 05:00:48
93.228.3.210 attackbots
Oct  2 22:34:48 srv1 sshd[20997]: Did not receive identification string from 93.228.3.210
Oct  2 22:34:50 srv1 sshd[20998]: Invalid user thostname0nich from 93.228.3.210
Oct  2 22:34:52 srv1 sshd[20998]: Failed password for invalid user thostname0nich from 93.228.3.210 port 53545 ssh2
Oct  2 22:34:53 srv1 sshd[20999]: Connection closed by 93.228.3.210


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=93.228.3.210
2020-10-04 05:11:07
195.54.167.152 attackbotsspam
Cowrie Honeypot: 10 unauthorised SSH/Telnet login attempts between 2020-10-03T18:13:48Z and 2020-10-03T20:13:36Z
2020-10-04 04:43:36
51.195.47.153 attackbots
Oct  3 21:05:39 amit sshd\[29952\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.195.47.153  user=root
Oct  3 21:05:42 amit sshd\[29952\]: Failed password for root from 51.195.47.153 port 35024 ssh2
Oct  3 21:11:11 amit sshd\[30046\]: Invalid user testuser from 51.195.47.153
...
2020-10-04 04:47:05
183.166.170.133 attackbotsspam
Oct  2 22:30:45 srv01 postfix/smtpd\[1755\]: warning: unknown\[183.166.170.133\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Oct  2 22:34:11 srv01 postfix/smtpd\[6490\]: warning: unknown\[183.166.170.133\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Oct  2 22:37:37 srv01 postfix/smtpd\[11183\]: warning: unknown\[183.166.170.133\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Oct  2 22:41:03 srv01 postfix/smtpd\[11183\]: warning: unknown\[183.166.170.133\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Oct  2 22:41:14 srv01 postfix/smtpd\[11183\]: warning: unknown\[183.166.170.133\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
...
2020-10-04 04:56:08
140.143.207.57 attack
Oct  3 22:20:48 cho sshd[4146872]: Failed password for invalid user lucas from 140.143.207.57 port 33944 ssh2
Oct  3 22:25:26 cho sshd[4147200]: Invalid user noc from 140.143.207.57 port 59114
Oct  3 22:25:26 cho sshd[4147200]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=140.143.207.57 
Oct  3 22:25:26 cho sshd[4147200]: Invalid user noc from 140.143.207.57 port 59114
Oct  3 22:25:29 cho sshd[4147200]: Failed password for invalid user noc from 140.143.207.57 port 59114 ssh2
...
2020-10-04 04:57:12

最近上报的IP列表

171.86.195.125 59.185.187.49 89.250.202.21 229.32.75.81
98.254.73.52 30.102.26.141 170.43.63.150 121.195.114.53
73.107.37.188 3.36.165.48 63.67.182.22 181.183.236.160
74.156.168.178 196.238.219.240 233.118.39.23 130.247.191.142
122.212.176.90 154.31.8.239 146.17.151.176 91.255.243.115