必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): None

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 114.142.199.67
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 50678
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;114.142.199.67.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025021902 1800 900 604800 86400

;; Query time: 11 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Feb 20 06:16:06 CST 2025
;; MSG SIZE  rcvd: 107
HOST信息:
67.199.142.114.in-addr.arpa domain name pointer 114-142-199-67.dsl.teleguam.net.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
67.199.142.114.in-addr.arpa	name = 114-142-199-67.dsl.teleguam.net.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
23.129.64.162 attackbots
Automatic report - Banned IP Access
2019-10-17 01:49:57
40.73.76.163 attack
Oct 16 17:58:12 localhost sshd\[38829\]: Invalid user zd from 40.73.76.163 port 42936
Oct 16 17:58:12 localhost sshd\[38829\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=40.73.76.163
Oct 16 17:58:14 localhost sshd\[38829\]: Failed password for invalid user zd from 40.73.76.163 port 42936 ssh2
Oct 16 18:03:12 localhost sshd\[38963\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=40.73.76.163  user=root
Oct 16 18:03:13 localhost sshd\[38963\]: Failed password for root from 40.73.76.163 port 55152 ssh2
...
2019-10-17 02:05:00
62.83.197.11 attack
Fail2Ban Ban Triggered
2019-10-17 02:06:29
122.224.203.228 attack
Oct 16 19:06:12 vpn01 sshd[8733]: Failed password for root from 122.224.203.228 port 53858 ssh2
...
2019-10-17 02:12:55
51.75.70.30 attackspambots
SSH Brute Force, server-1 sshd[31532]: Failed password for invalid user password123 from 51.75.70.30 port 51903 ssh2
2019-10-17 01:44:52
81.177.174.10 attack
WordPress wp-login brute force :: 81.177.174.10 0.136 BYPASS [17/Oct/2019:03:12:01  1100] [censored_1] "POST /wp-login.php HTTP/1.1" 200 3972 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
2019-10-17 01:56:58
197.44.72.58 attack
MultiHost/MultiPort Probe, Scan, Hack -
2019-10-17 01:47:13
46.245.179.222 attackbotsspam
Oct 16 11:21:30 Tower sshd[4765]: Connection from 46.245.179.222 port 60384 on 192.168.10.220 port 22
Oct 16 11:21:31 Tower sshd[4765]: Failed password for root from 46.245.179.222 port 60384 ssh2
Oct 16 11:21:31 Tower sshd[4765]: Received disconnect from 46.245.179.222 port 60384:11: Bye Bye [preauth]
Oct 16 11:21:31 Tower sshd[4765]: Disconnected from authenticating user root 46.245.179.222 port 60384 [preauth]
2019-10-17 02:18:29
184.105.247.220 attack
3389BruteforceFW21
2019-10-17 02:01:43
106.13.201.63 attack
Oct 16 16:49:38 marvibiene sshd[33468]: Invalid user osborn from 106.13.201.63 port 60808
Oct 16 16:49:38 marvibiene sshd[33468]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.201.63
Oct 16 16:49:38 marvibiene sshd[33468]: Invalid user osborn from 106.13.201.63 port 60808
Oct 16 16:49:40 marvibiene sshd[33468]: Failed password for invalid user osborn from 106.13.201.63 port 60808 ssh2
...
2019-10-17 01:54:30
154.120.242.70 attack
Oct 16 19:15:02 ArkNodeAT sshd\[20255\]: Invalid user sou from 154.120.242.70
Oct 16 19:15:02 ArkNodeAT sshd\[20255\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=154.120.242.70
Oct 16 19:15:04 ArkNodeAT sshd\[20255\]: Failed password for invalid user sou from 154.120.242.70 port 36800 ssh2
2019-10-17 01:52:32
165.227.210.71 attackbotsspam
Oct 16 15:20:43 * sshd[21614]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.227.210.71
Oct 16 15:20:45 * sshd[21614]: Failed password for invalid user ionut from 165.227.210.71 port 54172 ssh2
2019-10-17 02:00:17
47.75.172.46 attackspambots
www.goldgier.de 47.75.172.46 \[16/Oct/2019:14:56:41 +0200\] "POST /wp-login.php HTTP/1.1" 200 8727 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0"
www.goldgier.de 47.75.172.46 \[16/Oct/2019:14:56:43 +0200\] "POST /wp-login.php HTTP/1.1" 200 8727 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0"
2019-10-17 01:59:20
201.48.65.147 attackspam
Oct 16 13:38:15 vps01 sshd[29251]: Failed password for root from 201.48.65.147 port 33012 ssh2
2019-10-17 01:47:40
37.203.208.3 attack
Automatic report - SSH Brute-Force Attack
2019-10-17 02:19:11

最近上报的IP列表

38.229.108.248 90.103.55.201 247.137.147.84 12.228.27.48
182.111.70.231 73.105.144.202 57.161.76.201 141.16.107.101
52.68.48.200 125.156.104.175 42.240.244.130 139.46.236.226
132.13.190.68 138.34.160.41 29.75.187.229 212.126.174.255
161.65.15.26 2.191.179.180 156.190.155.163 175.237.132.181