必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): Hiroshima

省份(region): Hirosima (Hiroshima)

国家(country): Japan

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 114.189.131.117
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 10591
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;114.189.131.117.		IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025021301 1800 900 604800 86400

;; Query time: 15 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 14 13:00:06 CST 2025
;; MSG SIZE  rcvd: 108
HOST信息:
117.131.189.114.in-addr.arpa domain name pointer i114-189-131-117.s41.a034.ap.plala.or.jp.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
117.131.189.114.in-addr.arpa	name = i114-189-131-117.s41.a034.ap.plala.or.jp.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
167.71.189.145 attackbots
*Port Scan* detected from 167.71.189.145 (US/United States/-). 4 hits in the last 140 seconds
2019-09-24 14:54:01
27.115.115.218 attackbots
Sep 24 08:18:07 vps691689 sshd[29615]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=27.115.115.218
Sep 24 08:18:08 vps691689 sshd[29615]: Failed password for invalid user jojo from 27.115.115.218 port 50096 ssh2
Sep 24 08:22:56 vps691689 sshd[29700]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=27.115.115.218
...
2019-09-24 14:31:10
183.80.154.60 attackbotsspam
Unauthorised access (Sep 24) SRC=183.80.154.60 LEN=40 TTL=47 ID=15589 TCP DPT=8080 WINDOW=50201 SYN 
Unauthorised access (Sep 24) SRC=183.80.154.60 LEN=40 TTL=47 ID=12999 TCP DPT=8080 WINDOW=47991 SYN 
Unauthorised access (Sep 23) SRC=183.80.154.60 LEN=40 TTL=47 ID=33424 TCP DPT=8080 WINDOW=14036 SYN
2019-09-24 14:23:21
138.197.129.38 attackbotsspam
Sep 23 20:21:32 sachi sshd\[4009\]: Invalid user richard from 138.197.129.38
Sep 23 20:21:32 sachi sshd\[4009\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.197.129.38
Sep 23 20:21:35 sachi sshd\[4009\]: Failed password for invalid user richard from 138.197.129.38 port 52150 ssh2
Sep 23 20:25:44 sachi sshd\[4371\]: Invalid user rancid from 138.197.129.38
Sep 23 20:25:44 sachi sshd\[4371\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.197.129.38
2019-09-24 14:45:08
147.135.208.234 attack
Sep 24 06:55:27 www5 sshd\[29619\]: Invalid user mailserver from 147.135.208.234
Sep 24 06:55:27 www5 sshd\[29619\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=147.135.208.234
Sep 24 06:55:29 www5 sshd\[29619\]: Failed password for invalid user mailserver from 147.135.208.234 port 37248 ssh2
...
2019-09-24 14:34:44
35.186.145.141 attackbotsspam
Automatic report - Banned IP Access
2019-09-24 14:31:37
106.13.142.212 attackbotsspam
2019-09-24T13:02:45.671707enmeeting.mahidol.ac.th sshd\[28673\]: Invalid user cservice from 106.13.142.212 port 42612
2019-09-24T13:02:45.690136enmeeting.mahidol.ac.th sshd\[28673\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.142.212
2019-09-24T13:02:47.319103enmeeting.mahidol.ac.th sshd\[28673\]: Failed password for invalid user cservice from 106.13.142.212 port 42612 ssh2
...
2019-09-24 14:33:17
167.71.237.250 attackbotsspam
Sep 24 02:29:37 plusreed sshd[13524]: Invalid user kk from 167.71.237.250
...
2019-09-24 14:34:14
207.180.254.179 attackbots
Sep 24 08:30:45 OPSO sshd\[1885\]: Invalid user proxy from 207.180.254.179 port 57954
Sep 24 08:30:45 OPSO sshd\[1885\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=207.180.254.179
Sep 24 08:30:48 OPSO sshd\[1885\]: Failed password for invalid user proxy from 207.180.254.179 port 57954 ssh2
Sep 24 08:34:21 OPSO sshd\[2302\]: Invalid user frederic from 207.180.254.179 port 37572
Sep 24 08:34:21 OPSO sshd\[2302\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=207.180.254.179
2019-09-24 14:43:56
188.166.236.211 attackspam
Sep 24 07:18:42 localhost sshd\[19281\]: Invalid user vf from 188.166.236.211 port 57239
Sep 24 07:18:42 localhost sshd\[19281\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.166.236.211
Sep 24 07:18:45 localhost sshd\[19281\]: Failed password for invalid user vf from 188.166.236.211 port 57239 ssh2
2019-09-24 14:50:03
120.150.216.161 attackspam
Sep 24 05:55:03 [munged] sshd[9832]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=120.150.216.161
2019-09-24 14:58:08
117.186.84.30 attackbotsspam
Unauthorised access (Sep 24) SRC=117.186.84.30 LEN=40 TTL=49 ID=14940 TCP DPT=23 WINDOW=57589 SYN
2019-09-24 14:43:17
200.133.39.24 attack
Sep 24 05:31:27 ip-172-31-62-245 sshd\[2985\]: Invalid user svn from 200.133.39.24\
Sep 24 05:31:29 ip-172-31-62-245 sshd\[2985\]: Failed password for invalid user svn from 200.133.39.24 port 50210 ssh2\
Sep 24 05:36:05 ip-172-31-62-245 sshd\[3004\]: Invalid user owen from 200.133.39.24\
Sep 24 05:36:07 ip-172-31-62-245 sshd\[3004\]: Failed password for invalid user owen from 200.133.39.24 port 34404 ssh2\
Sep 24 05:40:56 ip-172-31-62-245 sshd\[3122\]: Failed password for www-data from 200.133.39.24 port 46826 ssh2\
2019-09-24 14:30:38
122.152.116.200 attackbotsspam
32AfSjUoGQYwyhp5o3E2h7tgTxRFDsgeeZ
2019-09-24 14:36:19
178.150.143.109 attackspambots
MultiHost/MultiPort Probe, Scan, Hack -
2019-09-24 14:50:31

最近上报的IP列表

62.95.1.0 165.79.120.246 151.46.241.191 148.189.65.50
195.80.125.225 137.159.194.19 217.111.218.214 176.4.109.81
29.0.160.155 104.0.234.228 96.207.88.76 193.16.114.219
172.120.37.63 17.218.232.230 97.243.225.178 200.220.72.10
57.178.20.67 116.48.19.20 180.149.255.112 198.67.16.63