必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): Indonesia

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 114.2.91.104
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 40913
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;114.2.91.104.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025022301 1800 900 604800 86400

;; Query time: 14 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Feb 24 03:18:52 CST 2025
;; MSG SIZE  rcvd: 105
HOST信息:
Host 104.91.2.114.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 104.91.2.114.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
180.148.2.26 attackspambots
Unauthorized connection attempt from IP address 180.148.2.26 on Port 445(SMB)
2020-04-22 23:50:37
86.57.176.92 attackspam
Honeypot attack, port: 445, PTR: PTR record not found
2020-04-22 23:58:24
178.159.233.38 attackbots
Unauthorized connection attempt from IP address 178.159.233.38 on Port 445(SMB)
2020-04-22 23:43:19
175.202.27.182 attack
[MK-VM3] Blocked by UFW
2020-04-22 23:58:06
92.85.31.199 attackbotsspam
Unauthorized connection attempt from IP address 92.85.31.199 on Port 445(SMB)
2020-04-23 00:11:47
185.156.73.67 attack
04/22/2020-11:32:24.774704 185.156.73.67 Protocol: 6 ET SCAN NMAP -sS window 1024
2020-04-23 00:03:32
222.186.42.7 attackspam
Apr 22 16:23:25 localhost sshd[65538]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.42.7  user=root
Apr 22 16:23:27 localhost sshd[65538]: Failed password for root from 222.186.42.7 port 64925 ssh2
Apr 22 16:23:29 localhost sshd[65538]: Failed password for root from 222.186.42.7 port 64925 ssh2
Apr 22 16:23:25 localhost sshd[65538]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.42.7  user=root
Apr 22 16:23:27 localhost sshd[65538]: Failed password for root from 222.186.42.7 port 64925 ssh2
Apr 22 16:23:29 localhost sshd[65538]: Failed password for root from 222.186.42.7 port 64925 ssh2
Apr 22 16:23:25 localhost sshd[65538]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.42.7  user=root
Apr 22 16:23:27 localhost sshd[65538]: Failed password for root from 222.186.42.7 port 64925 ssh2
Apr 22 16:23:29 localhost sshd[65538]: Failed password fo
...
2020-04-23 00:25:09
195.223.211.242 attackbots
Apr 22 17:01:27 mail sshd\[20580\]: Invalid user test4 from 195.223.211.242
Apr 22 17:01:27 mail sshd\[20580\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=195.223.211.242
Apr 22 17:01:29 mail sshd\[20580\]: Failed password for invalid user test4 from 195.223.211.242 port 53455 ssh2
...
2020-04-22 23:41:28
183.220.146.248 attackbots
Apr 22 12:12:48 localhost sshd[41711]: Invalid user uc from 183.220.146.248 port 22526
Apr 22 12:12:48 localhost sshd[41711]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=183.220.146.248
Apr 22 12:12:48 localhost sshd[41711]: Invalid user uc from 183.220.146.248 port 22526
Apr 22 12:12:50 localhost sshd[41711]: Failed password for invalid user uc from 183.220.146.248 port 22526 ssh2
Apr 22 12:18:15 localhost sshd[42200]: Invalid user ftpuser from 183.220.146.248 port 49474
...
2020-04-22 23:55:16
103.216.82.2 attack
Unauthorized connection attempt from IP address 103.216.82.2 on Port 445(SMB)
2020-04-22 23:54:32
176.59.209.34 attackbots
20/4/22@08:39:56: FAIL: Alarm-Network address from=176.59.209.34
20/4/22@08:39:56: FAIL: Alarm-Network address from=176.59.209.34
...
2020-04-22 23:39:49
45.7.138.40 attackbotsspam
Apr 22 09:55:04 lanister sshd[28398]: Failed password for invalid user fo from 45.7.138.40 port 56601 ssh2
Apr 22 10:05:23 lanister sshd[28534]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.7.138.40  user=postgres
Apr 22 10:05:24 lanister sshd[28534]: Failed password for postgres from 45.7.138.40 port 46141 ssh2
Apr 22 10:09:49 lanister sshd[28625]: Invalid user yc from 45.7.138.40
2020-04-23 00:08:21
82.62.158.184 attackspam
Unauthorized connection attempt from IP address 82.62.158.184 on Port 445(SMB)
2020-04-22 23:42:32
49.232.131.80 attackbots
Apr 22 09:15:34 dns1 sshd[5708]: Failed password for root from 49.232.131.80 port 43986 ssh2
Apr 22 09:20:22 dns1 sshd[6120]: Failed password for root from 49.232.131.80 port 41952 ssh2
Apr 22 09:25:08 dns1 sshd[6550]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.232.131.80
2020-04-22 23:56:43
14.248.83.163 attackbotsspam
Apr 22 15:02:58 ns381471 sshd[6172]: Failed password for gitlab from 14.248.83.163 port 46108 ssh2
2020-04-23 00:21:43

最近上报的IP列表

98.128.40.7 170.73.154.11 5.169.68.205 166.159.35.104
136.25.192.148 202.110.186.41 246.35.171.210 47.139.206.58
240.184.179.71 222.198.3.26 55.35.74.24 90.43.154.149
253.51.127.196 145.74.227.46 154.21.237.101 95.106.39.78
15.241.231.7 80.237.56.204 129.253.61.221 87.186.221.53