必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): Japan

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 114.190.199.99
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 29339
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;114.190.199.99.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025012501 1800 900 604800 86400

;; Query time: 15 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Jan 26 05:23:58 CST 2025
;; MSG SIZE  rcvd: 107
HOST信息:
99.199.190.114.in-addr.arpa domain name pointer i114-190-199-99.s41.a045.ap.plala.or.jp.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
99.199.190.114.in-addr.arpa	name = i114-190-199-99.s41.a045.ap.plala.or.jp.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
132.148.150.158 attackbotsspam
Automatic report - XMLRPC Attack
2019-12-16 22:20:23
85.105.74.194 attackbotsspam
Unauthorized connection attempt from IP address 85.105.74.194 on Port 445(SMB)
2019-12-16 22:48:54
193.32.163.44 attackbotsspam
firewall-block, port(s): 3387/tcp
2019-12-16 22:46:08
106.12.107.17 attack
2019-12-16T14:39:44.538942shield sshd\[1058\]: Invalid user viggo from 106.12.107.17 port 54558
2019-12-16T14:39:44.542032shield sshd\[1058\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.107.17
2019-12-16T14:39:46.065782shield sshd\[1058\]: Failed password for invalid user viggo from 106.12.107.17 port 54558 ssh2
2019-12-16T14:45:56.412172shield sshd\[3109\]: Invalid user frey from 106.12.107.17 port 41926
2019-12-16T14:45:56.416445shield sshd\[3109\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.107.17
2019-12-16 22:52:23
192.241.135.34 attackbotsspam
Dec 16 11:49:49 MK-Soft-VM7 sshd[6881]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=192.241.135.34 
Dec 16 11:49:51 MK-Soft-VM7 sshd[6881]: Failed password for invalid user qw123e from 192.241.135.34 port 58091 ssh2
...
2019-12-16 22:36:03
104.236.214.8 attack
Dec 16 15:09:27 legacy sshd[32504]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.236.214.8
Dec 16 15:09:29 legacy sshd[32504]: Failed password for invalid user yourmom from 104.236.214.8 port 39315 ssh2
Dec 16 15:18:22 legacy sshd[526]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.236.214.8
...
2019-12-16 22:24:27
182.61.37.144 attackspam
2019-12-16T14:00:20.456751shield sshd\[20808\]: Invalid user mailnull from 182.61.37.144 port 57910
2019-12-16T14:00:20.461122shield sshd\[20808\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.61.37.144
2019-12-16T14:00:22.115610shield sshd\[20808\]: Failed password for invalid user mailnull from 182.61.37.144 port 57910 ssh2
2019-12-16T14:05:19.954303shield sshd\[22104\]: Invalid user yorgos from 182.61.37.144 port 42432
2019-12-16T14:05:19.958493shield sshd\[22104\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.61.37.144
2019-12-16 22:15:18
113.181.84.49 attackbotsspam
Lines containing failures of 113.181.84.49
Dec 16 14:58:45 shared05 sshd[31345]: Invalid user  from 113.181.84.49 port 49189
Dec 16 14:58:46 shared05 sshd[31345]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=113.181.84.49
Dec 16 14:58:48 shared05 sshd[31345]: Failed password for invalid user  from 113.181.84.49 port 49189 ssh2
Dec 16 14:58:48 shared05 sshd[31345]: Connection closed by invalid user  113.181.84.49 port 49189 [preauth]


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=113.181.84.49
2019-12-16 22:14:07
122.157.156.156 attack
Scanning
2019-12-16 22:30:34
178.33.234.234 attackspam
Dec 16 15:34:47 vserver sshd\[17998\]: Invalid user nyfvo from 178.33.234.234Dec 16 15:34:49 vserver sshd\[17998\]: Failed password for invalid user nyfvo from 178.33.234.234 port 58928 ssh2Dec 16 15:42:04 vserver sshd\[18086\]: Invalid user sai from 178.33.234.234Dec 16 15:42:05 vserver sshd\[18086\]: Failed password for invalid user sai from 178.33.234.234 port 35664 ssh2
...
2019-12-16 22:45:17
113.160.134.187 attackbotsspam
Unauthorized connection attempt from IP address 113.160.134.187 on Port 445(SMB)
2019-12-16 22:26:42
46.32.70.248 attackspambots
SSH Brute Force, server-1 sshd[12067]: Failed password for root from 46.32.70.248 port 43679 ssh2
2019-12-16 22:21:50
202.83.172.249 attackspambots
Dec 16 14:24:20 game-panel sshd[30731]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=202.83.172.249
Dec 16 14:24:22 game-panel sshd[30731]: Failed password for invalid user eo from 202.83.172.249 port 53702 ssh2
Dec 16 14:31:44 game-panel sshd[30993]: Failed password for root from 202.83.172.249 port 60076 ssh2
2019-12-16 22:35:41
112.216.25.139 attackbots
Unauthorized connection attempt from IP address 112.216.25.139 on Port 445(SMB)
2019-12-16 22:50:23
188.166.236.211 attack
Dec 16 14:49:07 server sshd\[21883\]: Invalid user web from 188.166.236.211
Dec 16 14:49:07 server sshd\[21883\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.166.236.211 
Dec 16 14:49:09 server sshd\[21883\]: Failed password for invalid user web from 188.166.236.211 port 42418 ssh2
Dec 16 14:59:38 server sshd\[25269\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.166.236.211  user=root
Dec 16 14:59:40 server sshd\[25269\]: Failed password for root from 188.166.236.211 port 58343 ssh2
...
2019-12-16 22:29:15

最近上报的IP列表

143.4.69.98 81.168.51.38 82.179.122.240 225.233.208.33
14.237.221.73 219.208.134.196 73.208.162.38 31.144.148.86
82.25.146.81 119.36.230.63 167.188.216.211 16.42.31.175
32.205.125.184 180.18.125.129 169.89.218.104 66.126.165.60
63.141.253.189 190.122.24.152 198.37.156.134 70.56.247.41