必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): Tamuning

省份(region): unknown

国家(country): Guam

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 114.142.220.118
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 30758
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;114.142.220.118.		IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2024112101 1800 900 604800 86400

;; Query time: 14 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Nov 22 02:54:08 CST 2024
;; MSG SIZE  rcvd: 108
HOST信息:
118.220.142.114.in-addr.arpa domain name pointer 114-142-220-118.dsl.teleguam.net.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
118.220.142.114.in-addr.arpa	name = 114-142-220-118.dsl.teleguam.net.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
89.248.168.176 attackbotsspam
09/25/2019-04:38:36.348035 89.248.168.176 Protocol: 6 ET CINS Active Threat Intelligence Poor Reputation IP group 98
2019-09-25 17:43:51
163.47.39.70 attack
Sep 25 05:53:21 TORMINT sshd\[9252\]: Invalid user ubnt from 163.47.39.70
Sep 25 05:53:21 TORMINT sshd\[9252\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=163.47.39.70
Sep 25 05:53:23 TORMINT sshd\[9252\]: Failed password for invalid user ubnt from 163.47.39.70 port 21956 ssh2
...
2019-09-25 17:54:17
177.184.133.41 attackbots
Sep 25 12:12:59 server sshd\[25864\]: Invalid user test from 177.184.133.41 port 49311
Sep 25 12:12:59 server sshd\[25864\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=177.184.133.41
Sep 25 12:13:01 server sshd\[25864\]: Failed password for invalid user test from 177.184.133.41 port 49311 ssh2
Sep 25 12:18:00 server sshd\[10548\]: Invalid user office from 177.184.133.41 port 41363
Sep 25 12:18:00 server sshd\[10548\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=177.184.133.41
2019-09-25 17:27:37
89.39.6.193 attack
Automatic report - Port Scan Attack
2019-09-25 17:40:36
146.0.133.4 attack
Sep 25 03:26:16 vtv3 sshd\[18919\]: Invalid user aamra from 146.0.133.4 port 42718
Sep 25 03:26:16 vtv3 sshd\[18919\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=146.0.133.4
Sep 25 03:26:17 vtv3 sshd\[18919\]: Failed password for invalid user aamra from 146.0.133.4 port 42718 ssh2
Sep 25 03:32:56 vtv3 sshd\[22053\]: Invalid user operator from 146.0.133.4 port 55638
Sep 25 03:32:56 vtv3 sshd\[22053\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=146.0.133.4
Sep 25 03:44:40 vtv3 sshd\[28081\]: Invalid user xq from 146.0.133.4 port 53266
Sep 25 03:44:40 vtv3 sshd\[28081\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=146.0.133.4
Sep 25 03:44:42 vtv3 sshd\[28081\]: Failed password for invalid user xq from 146.0.133.4 port 53266 ssh2
Sep 25 03:50:58 vtv3 sshd\[31553\]: Invalid user stefan from 146.0.133.4 port 37954
Sep 25 03:50:58 vtv3 sshd\[31553\]: pam_unix\(sshd:auth\): au
2019-09-25 17:25:40
167.114.0.23 attackspam
2019-09-25T06:27:34.720265abusebot-8.cloudsearch.cf sshd\[26218\]: Invalid user airaghi from 167.114.0.23 port 41642
2019-09-25 17:32:36
46.61.235.111 attackspam
Sep 24 22:03:39 aiointranet sshd\[8400\]: Invalid user hal from 46.61.235.111
Sep 24 22:03:39 aiointranet sshd\[8400\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=46.61.235.111
Sep 24 22:03:41 aiointranet sshd\[8400\]: Failed password for invalid user hal from 46.61.235.111 port 52894 ssh2
Sep 24 22:08:01 aiointranet sshd\[8747\]: Invalid user kjohnson from 46.61.235.111
Sep 24 22:08:01 aiointranet sshd\[8747\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=46.61.235.111
2019-09-25 17:34:53
117.108.80.105 attackbotsspam
Unauthorised access (Sep 25) SRC=117.108.80.105 LEN=40 PREC=0x20 TTL=39 ID=15880 TCP DPT=8080 WINDOW=21555 SYN 
Unauthorised access (Sep 24) SRC=117.108.80.105 LEN=40 PREC=0x20 TTL=42 ID=50556 TCP DPT=8080 WINDOW=21555 SYN 
Unauthorised access (Sep 24) SRC=117.108.80.105 LEN=40 PREC=0x20 TTL=42 ID=36796 TCP DPT=8080 WINDOW=21555 SYN 
Unauthorised access (Sep 24) SRC=117.108.80.105 LEN=40 PREC=0x20 TTL=42 ID=55271 TCP DPT=8080 WINDOW=21555 SYN 
Unauthorised access (Sep 23) SRC=117.108.80.105 LEN=40 PREC=0x20 TTL=42 ID=8830 TCP DPT=8080 WINDOW=21555 SYN 
Unauthorised access (Sep 23) SRC=117.108.80.105 LEN=40 PREC=0x20 TTL=42 ID=242 TCP DPT=8080 WINDOW=21555 SYN
2019-09-25 17:21:01
45.55.176.173 attackbots
2019-09-25T09:16:30.232440abusebot-5.cloudsearch.cf sshd\[9070\]: Invalid user Juhana from 45.55.176.173 port 42984
2019-09-25 17:16:46
200.54.242.46 attackbotsspam
$f2bV_matches
2019-09-25 17:27:04
222.186.180.8 attackbotsspam
Sep 25 11:33:53 fr01 sshd[14964]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.180.8  user=root
Sep 25 11:33:55 fr01 sshd[14964]: Failed password for root from 222.186.180.8 port 5156 ssh2
Sep 25 11:33:58 fr01 sshd[14964]: Failed password for root from 222.186.180.8 port 5156 ssh2
Sep 25 11:34:02 fr01 sshd[14964]: Failed password for root from 222.186.180.8 port 5156 ssh2
Sep 25 11:34:06 fr01 sshd[14964]: Failed password for root from 222.186.180.8 port 5156 ssh2
Sep 25 11:34:10 fr01 sshd[14964]: Failed password for root from 222.186.180.8 port 5156 ssh2
Sep 25 11:34:10 fr01 sshd[14964]: error: maximum authentication attempts exceeded for root from 222.186.180.8 port 5156 ssh2 [preauth]
...
2019-09-25 17:35:19
88.247.250.200 attackspam
Lines containing failures of 88.247.250.200
Sep 24 20:43:03 metroid sshd[4594]: warning: /etc/hosts.deny, line 18: can't verify hostname: getaddrinfo(88.247.250.200.static.ttnet.com.tr, AF_INET) failed
Sep 24 20:43:04 metroid sshd[4594]: Invalid user Adminixxxr from 88.247.250.200 port 36435
Sep 24 20:43:04 metroid sshd[4594]: Received disconnect from 88.247.250.200 port 36435:11: Bye Bye [preauth]
Sep 24 20:43:04 metroid sshd[4594]: Disconnected from invalid user Adminixxxr 88.247.250.200 port 36435 [preauth]


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=88.247.250.200
2019-09-25 17:22:43
43.247.156.168 attackspambots
Sep 25 12:41:27 server sshd\[10927\]: Invalid user tb from 43.247.156.168 port 33133
Sep 25 12:41:27 server sshd\[10927\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.247.156.168
Sep 25 12:41:29 server sshd\[10927\]: Failed password for invalid user tb from 43.247.156.168 port 33133 ssh2
Sep 25 12:46:44 server sshd\[26393\]: Invalid user love123 from 43.247.156.168 port 53494
Sep 25 12:46:44 server sshd\[26393\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.247.156.168
2019-09-25 17:50:20
183.90.237.2 attack
Scanning and Vuln Attempts
2019-09-25 17:53:50
117.255.216.106 attack
Sep 25 07:43:36 localhost sshd\[22000\]: Invalid user gk from 117.255.216.106 port 62072
Sep 25 07:43:36 localhost sshd\[22000\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=117.255.216.106
Sep 25 07:43:39 localhost sshd\[22000\]: Failed password for invalid user gk from 117.255.216.106 port 62072 ssh2
...
2019-09-25 17:56:21

最近上报的IP列表

170.171.140.114 4.208.253.169 210.34.168.181 20.55.200.192
194.110.170.239 160.4.200.140 169.254.169.204 149.144.170.69
16.196.67.23 43.142.37.108 146.9.39.0 43.11.234.99
172.169.86.72 63.80.72.229 103.218.97.99 140.150.76.27
129.186.66.216 172.194.255.14 255.109.134.0 237.216.248.12