必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): Korea Republic of

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 114.199.14.78
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 27298
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;114.199.14.78.			IN	A

;; AUTHORITY SECTION:
.			600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022011101 1800 900 604800 86400

;; Query time: 15 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Jan 12 01:47:21 CST 2022
;; MSG SIZE  rcvd: 106
HOST信息:
Host 78.14.199.114.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 78.14.199.114.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
200.160.106.241 attackspam
Aug 19 13:49:01 web9 sshd\[3175\]: Invalid user agustin from 200.160.106.241
Aug 19 13:49:01 web9 sshd\[3175\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=200.160.106.241
Aug 19 13:49:03 web9 sshd\[3175\]: Failed password for invalid user agustin from 200.160.106.241 port 57267 ssh2
Aug 19 13:54:38 web9 sshd\[4361\]: Invalid user redmine from 200.160.106.241
Aug 19 13:54:38 web9 sshd\[4361\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=200.160.106.241
2019-08-20 08:03:26
200.116.160.38 attackspam
Aug 19 23:57:17 web8 sshd\[12181\]: Invalid user jenkins from 200.116.160.38
Aug 19 23:57:17 web8 sshd\[12181\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=200.116.160.38
Aug 19 23:57:19 web8 sshd\[12181\]: Failed password for invalid user jenkins from 200.116.160.38 port 37768 ssh2
Aug 20 00:02:52 web8 sshd\[14869\]: Invalid user bea from 200.116.160.38
Aug 20 00:02:52 web8 sshd\[14869\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=200.116.160.38
2019-08-20 08:44:11
220.202.15.68 attackbots
Aug 20 00:10:35 www_kotimaassa_fi sshd[6198]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=220.202.15.68
Aug 20 00:10:37 www_kotimaassa_fi sshd[6198]: Failed password for invalid user foc from 220.202.15.68 port 30434 ssh2
...
2019-08-20 08:13:10
58.64.209.254 attackbots
Aug 18 03:42:56 localhost kernel: [17358370.144497] iptables_INPUT_denied: IN=eth0 OUT= MAC=f2:3c:91:84:83:95:84:78:ac:57:a8:41:08:00 SRC=58.64.209.254 DST=[mungedIP2] LEN=40 TOS=0x00 PREC=0x00 TTL=244 ID=173 PROTO=TCP SPT=55509 DPT=445 WINDOW=1024 RES=0x00 SYN URGP=0 
Aug 18 03:42:56 localhost kernel: [17358370.144528] iptables_INPUT_denied: IN=eth0 OUT= MAC=f2:3c:91:84:83:95:84:78:ac:57:a8:41:08:00 SRC=58.64.209.254 DST=[mungedIP2] LEN=40 TOS=0x00 PREC=0x00 TTL=244 ID=173 PROTO=TCP SPT=55509 DPT=445 SEQ=121332078 ACK=0 WINDOW=1024 RES=0x00 SYN URGP=0 
Aug 19 14:52:55 localhost kernel: [17484968.820589] iptables_INPUT_denied: IN=eth0 OUT= MAC=f2:3c:91:84:83:95:84:78:ac:57:aa:c1:08:00 SRC=58.64.209.254 DST=[mungedIP2] LEN=40 TOS=0x00 PREC=0x00 TTL=244 ID=59340 PROTO=TCP SPT=52049 DPT=445 WINDOW=1024 RES=0x00 SYN URGP=0 
Aug 19 14:52:55 localhost kernel: [17484968.820613] iptables_INPUT_denied: IN=eth0 OUT= MAC=f2:3c:91:84:83:95:84:78:ac:57:aa:c1:08:00 SRC=58.64.209.254 DST=[mungedIP2] LEN=40 TOS=0x00 PREC=0x0
2019-08-20 07:59:07
174.138.20.134 attack
Aug 19 14:17:21 hpm sshd\[14883\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=174.138.20.134  user=root
Aug 19 14:17:23 hpm sshd\[14883\]: Failed password for root from 174.138.20.134 port 34412 ssh2
Aug 19 14:24:46 hpm sshd\[15437\]: Invalid user legal1 from 174.138.20.134
Aug 19 14:24:46 hpm sshd\[15437\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=174.138.20.134
Aug 19 14:24:48 hpm sshd\[15437\]: Failed password for invalid user legal1 from 174.138.20.134 port 56734 ssh2
2019-08-20 08:31:53
196.1.99.12 attack
Aug 20 02:06:15 mail sshd[27950]: Invalid user test from 196.1.99.12
...
2019-08-20 08:15:28
118.24.246.193 attackspam
Aug 20 01:42:56 www sshd\[16310\]: Invalid user gggg from 118.24.246.193
Aug 20 01:42:56 www sshd\[16310\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.24.246.193
Aug 20 01:42:59 www sshd\[16310\]: Failed password for invalid user gggg from 118.24.246.193 port 45768 ssh2
...
2019-08-20 08:35:01
181.46.161.145 attack
Autoban   181.46.161.145 AUTH/CONNECT
2019-08-20 08:34:18
190.244.214.179 attackbotsspam
Aug 20 01:05:39 ubuntu-2gb-nbg1-dc3-1 sshd[32453]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=190.244.214.179
Aug 20 01:05:41 ubuntu-2gb-nbg1-dc3-1 sshd[32453]: Failed password for invalid user bitnami from 190.244.214.179 port 57608 ssh2
...
2019-08-20 07:58:36
103.233.76.254 attack
Aug 19 22:05:14 XXX sshd[49130]: Invalid user test from 103.233.76.254 port 42938
2019-08-20 08:32:58
152.136.72.17 attackspambots
Aug 19 20:52:41 cvbmail sshd\[4591\]: Invalid user oracle from 152.136.72.17
Aug 19 20:52:41 cvbmail sshd\[4591\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=152.136.72.17
Aug 19 20:52:43 cvbmail sshd\[4591\]: Failed password for invalid user oracle from 152.136.72.17 port 60536 ssh2
2019-08-20 08:06:48
103.126.100.120 attackspambots
Aug 19 14:18:09 lcdev sshd\[329\]: Invalid user fedor from 103.126.100.120
Aug 19 14:18:09 lcdev sshd\[329\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.126.100.120
Aug 19 14:18:11 lcdev sshd\[329\]: Failed password for invalid user fedor from 103.126.100.120 port 35590 ssh2
Aug 19 14:24:12 lcdev sshd\[917\]: Invalid user sentry from 103.126.100.120
Aug 19 14:24:12 lcdev sshd\[917\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.126.100.120
2019-08-20 08:24:19
50.209.162.166 attack
Aug 19 09:06:00 amida sshd[431214]: Invalid user bsnl from 50.209.162.166
Aug 19 09:06:00 amida sshd[431214]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=50.209.162.166 
Aug 19 09:06:02 amida sshd[431214]: Failed password for invalid user bsnl from 50.209.162.166 port 45176 ssh2
Aug 19 09:06:03 amida sshd[431214]: Received disconnect from 50.209.162.166: 11: Bye Bye [preauth]
Aug 19 09:35:11 amida sshd[439373]: Invalid user hn from 50.209.162.166
Aug 19 09:35:11 amida sshd[439373]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=50.209.162.166 
Aug 19 09:35:12 amida sshd[439373]: Failed password for invalid user hn from 50.209.162.166 port 54818 ssh2
Aug 19 09:35:13 amida sshd[439373]: Received disconnect from 50.209.162.166: 11: Bye Bye [preauth]
Aug 19 09:42:54 amida sshd[441651]: Connection closed by 50.209.162.166 [preauth]
Aug 19 09:50:43 amida sshd[444442]: Invalid user wizard from........
-------------------------------
2019-08-20 08:04:45
181.48.116.50 attack
Aug 19 21:52:17 srv-4 sshd\[4707\]: Invalid user iva from 181.48.116.50
Aug 19 21:52:17 srv-4 sshd\[4707\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=181.48.116.50
Aug 19 21:52:19 srv-4 sshd\[4707\]: Failed password for invalid user iva from 181.48.116.50 port 45532 ssh2
...
2019-08-20 08:27:18
94.21.243.204 attackspam
Aug 20 01:30:04 rpi sshd[12280]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=94.21.243.204 
Aug 20 01:30:06 rpi sshd[12280]: Failed password for invalid user operador from 94.21.243.204 port 52055 ssh2
2019-08-20 08:37:44

最近上报的IP列表

223.201.163.129 236.37.28.0 170.33.186.33 231.124.28.231
119.165.45.212 106.169.181.219 177.204.188.55 19.27.99.121
150.25.97.177 221.246.135.75 48.62.29.216 226.78.133.203
74.201.67.113 149.198.217.166 179.50.71.180 16.113.216.125
68.123.231.193 49.122.93.210 6.231.114.117 1.11.163.105