必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): China

运营商(isp): LiuPanShui County

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): Fixed Line ISP

用户上报:
类型 评论内容 时间
attackspambots
2019-09-12T05:29:18.122369abusebot-7.cloudsearch.cf sshd\[21030\]: Invalid user mother from 114.139.245.220 port 46423
2019-09-12 15:40:49
相同子网IP讨论:
IP 类型 评论内容 时间
114.139.245.66 attackspam
scan z
2019-09-21 04:40:05
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 114.139.245.220
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 55270
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;114.139.245.220.		IN	A

;; AUTHORITY SECTION:
.			3600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019091200 1800 900 604800 86400

;; Query time: 2 msec
;; SERVER: 67.207.67.2#53(67.207.67.2)
;; WHEN: Thu Sep 12 15:40:41 CST 2019
;; MSG SIZE  rcvd: 119
HOST信息:
Host 220.245.139.114.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		67.207.67.2
Address:	67.207.67.2#53

** server can't find 220.245.139.114.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
104.47.70.110 attack
SSH login attempts.
2020-02-17 21:38:06
187.131.127.105 attackspambots
1581915246 - 02/17/2020 05:54:06 Host: 187.131.127.105/187.131.127.105 Port: 445 TCP Blocked
2020-02-17 21:05:48
103.210.144.207 attack
Automatic report - Port Scan Attack
2020-02-17 21:00:08
196.206.204.139 attackspam
MultiHost/MultiPort Probe, Scan, Hack -
2020-02-17 21:31:00
1.64.114.160 attackbots
Honeypot attack, port: 5555, PTR: 1-64-114-160.static.netvigator.com.
2020-02-17 21:07:17
190.55.208.64 attackbots
Brute force attempt
2020-02-17 21:42:59
193.94.138.230 attackspambots
<6 unauthorized SSH connections
2020-02-17 21:16:32
94.181.94.12 attackspam
$f2bV_matches
2020-02-17 20:56:13
194.15.36.253 attack
SSH login attempts.
2020-02-17 21:39:21
157.230.190.1 attack
Feb 17 12:04:27 gw1 sshd[4997]: Failed password for ubuntu from 157.230.190.1 port 40020 ssh2
Feb 17 12:07:13 gw1 sshd[5109]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.230.190.1
...
2020-02-17 21:08:43
49.88.112.68 attack
Tried sshing with brute force.
2020-02-17 21:28:58
196.206.225.136 attackspam
MultiHost/MultiPort Probe, Scan, Hack -
2020-02-17 21:13:40
52.97.189.66 attackbotsspam
SSH login attempts.
2020-02-17 21:31:52
129.154.67.65 attackbotsspam
Feb 16 16:03:18 server sshd\[30278\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=oc-129-154-67-65.compute.oraclecloud.com  user=root
Feb 16 16:03:20 server sshd\[30278\]: Failed password for root from 129.154.67.65 port 26382 ssh2
Feb 17 12:30:36 server sshd\[29641\]: Invalid user jboss from 129.154.67.65
Feb 17 12:30:36 server sshd\[29641\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=oc-129-154-67-65.compute.oraclecloud.com 
Feb 17 12:30:38 server sshd\[29641\]: Failed password for invalid user jboss from 129.154.67.65 port 64666 ssh2
...
2020-02-17 21:37:31
208.87.234.190 attackbots
SSH login attempts.
2020-02-17 20:59:02

最近上报的IP列表

128.71.14.245 108.166.114.131 66.138.134.40 15.218.110.202
184.194.147.68 120.253.200.236 171.221.81.179 94.237.64.47
185.153.198.46 59.153.240.34 75.99.236.86 68.183.11.205
77.40.61.122 129.79.18.153 18.213.86.52 36.71.234.107
35.202.183.69 113.161.6.53 65.218.192.63 85.239.122.45