必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): Japan

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 114.21.240.238
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 8704
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;114.21.240.238.			IN	A

;; AUTHORITY SECTION:
.			288	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2021123001 1800 900 604800 86400

;; Query time: 60 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Dec 31 07:50:04 CST 2021
;; MSG SIZE  rcvd: 107
HOST信息:
238.240.21.114.in-addr.arpa domain name pointer KD114021240238.ppp.prin.ne.jp.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
238.240.21.114.in-addr.arpa	name = KD114021240238.ppp.prin.ne.jp.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
31.14.252.130 attackspambots
Automatic report - Banned IP Access
2019-09-27 04:57:23
222.186.173.201 attackbotsspam
DATE:2019-09-26 22:28:21, IP:222.186.173.201, PORT:ssh SSH brute force auth on honeypot server (honey-neo-dc-bis)
2019-09-27 04:58:06
81.28.100.74 attack
Sep 26 14:31:43 smtp postfix/smtpd[90576]: NOQUEUE: reject: RCPT from grin.car-bluetooth2-cz.com[81.28.100.74]: 554 5.7.1 Service unavailable; Client host [81.28.100.74] blocked using zen.spamhaus.org; https://www.spamhaus.org/sbl/query/SBLCSS; from= to= proto=ESMTP helo=
...
2019-09-27 04:54:15
45.116.232.0 attackbots
Unauthorized connection attempt from IP address 45.116.232.0 on Port 445(SMB)
2019-09-27 04:34:54
177.36.58.182 attackspambots
SSH Brute Force
2019-09-27 04:41:33
91.121.102.44 attackspambots
detected by Fail2Ban
2019-09-27 04:53:01
45.112.43.46 attackbots
Unauthorized connection attempt from IP address 45.112.43.46 on Port 445(SMB)
2019-09-27 04:41:07
77.89.20.2 attack
Unauthorized connection attempt from IP address 77.89.20.2 on Port 445(SMB)
2019-09-27 04:29:11
41.225.16.156 attack
2019-09-26T23:44:04.234851enmeeting.mahidol.ac.th sshd\[19255\]: Invalid user cai from 41.225.16.156 port 33416
2019-09-26T23:44:04.248569enmeeting.mahidol.ac.th sshd\[19255\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=41.225.16.156
2019-09-26T23:44:06.137519enmeeting.mahidol.ac.th sshd\[19255\]: Failed password for invalid user cai from 41.225.16.156 port 33416 ssh2
...
2019-09-27 04:52:33
222.186.175.154 attack
Sep 23 13:53:37 microserver sshd[32433]: Failed password for root from 222.186.175.154 port 7660 ssh2
Sep 23 13:53:37 microserver sshd[32433]: error: maximum authentication attempts exceeded for root from 222.186.175.154 port 7660 ssh2 [preauth]
Sep 23 13:53:45 microserver sshd[32465]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.175.154  user=root
Sep 23 13:53:48 microserver sshd[32465]: Failed password for root from 222.186.175.154 port 12904 ssh2
Sep 23 13:53:51 microserver sshd[32465]: Failed password for root from 222.186.175.154 port 12904 ssh2
Sep 23 13:53:55 microserver sshd[32465]: Failed password for root from 222.186.175.154 port 12904 ssh2
Sep 23 13:54:00 microserver sshd[32465]: Failed password for root from 222.186.175.154 port 12904 ssh2
Sep 23 13:54:04 microserver sshd[32465]: Failed password for root from 222.186.175.154 port 12904 ssh2
Sep 23 13:54:08 microserver sshd[32465]: Failed password for root from 222.186.175.154 port 12904 ssh2
Sep
2019-09-27 04:40:07
167.71.204.94 attackspam
*Port Scan* detected from 167.71.204.94 (SG/Singapore/-). 4 hits in the last 165 seconds
2019-09-27 04:19:25
51.68.230.105 attackspambots
Sep 26 22:35:48 SilenceServices sshd[31968]: Failed password for root from 51.68.230.105 port 55342 ssh2
Sep 26 22:39:31 SilenceServices sshd[1891]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.68.230.105
Sep 26 22:39:32 SilenceServices sshd[1891]: Failed password for invalid user bash from 51.68.230.105 port 39668 ssh2
2019-09-27 04:57:10
178.62.234.122 attackspam
Sep 26 15:34:38 MK-Soft-VM5 sshd[18284]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.62.234.122 
Sep 26 15:34:40 MK-Soft-VM5 sshd[18284]: Failed password for invalid user ie from 178.62.234.122 port 58372 ssh2
...
2019-09-27 04:26:51
45.136.109.192 attackbotsspam
*Port Scan* detected from 45.136.109.192 (DE/Germany/-). 4 hits in the last 295 seconds
2019-09-27 04:57:47
193.188.22.12 attackspam
2019-09-26T20:31:37.904855abusebot-5.cloudsearch.cf sshd\[15364\]: Invalid user ftpuser from 193.188.22.12 port 17057
2019-09-27 04:48:35

最近上报的IP列表

75.213.115.169 205.140.106.156 205.119.134.148 99.194.226.127
11.151.213.30 208.125.195.84 169.186.209.42 226.128.173.16
220.242.199.252 8.42.205.178 13.17.99.26 128.105.164.24
43.137.149.145 252.162.97.136 167.196.190.37 15.20.4.153
106.156.152.3 131.152.243.36 82.175.59.147 137.246.91.79