必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): China

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): CERNET2 IX at Shandong University

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 114.214.22.20
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 13927
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;114.214.22.20.			IN	A

;; AUTHORITY SECTION:
.			3600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019071900 1800 900 604800 86400

;; Query time: 3 msec
;; SERVER: 67.207.67.2#53(67.207.67.2)
;; WHEN: Sat Jul 20 00:30:06 CST 2019
;; MSG SIZE  rcvd: 117
HOST信息:
Host 20.22.214.114.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		67.207.67.2
Address:	67.207.67.2#53

** server can't find 20.22.214.114.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
185.176.27.166 attackspam
Dec 11 15:00:01 debian-2gb-nbg1-2 kernel: \[24354344.847573\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=185.176.27.166 DST=195.201.40.59 LEN=40 TOS=0x00 PREC=0x00 TTL=243 ID=47325 PROTO=TCP SPT=55825 DPT=1864 WINDOW=1024 RES=0x00 SYN URGP=0
2019-12-11 22:05:41
152.32.146.169 attackspambots
Dec 11 03:59:19 php1 sshd\[2508\]: Invalid user http from 152.32.146.169
Dec 11 03:59:19 php1 sshd\[2508\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=152.32.146.169
Dec 11 03:59:21 php1 sshd\[2508\]: Failed password for invalid user http from 152.32.146.169 port 33136 ssh2
Dec 11 04:05:51 php1 sshd\[3109\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=152.32.146.169  user=root
Dec 11 04:05:52 php1 sshd\[3109\]: Failed password for root from 152.32.146.169 port 41072 ssh2
2019-12-11 22:09:07
188.246.236.122 attackbots
Automatic report - Banned IP Access
2019-12-11 22:26:08
23.254.55.94 attackbots
Unauthorized access detected from banned ip
2019-12-11 22:15:56
156.96.61.124 attack
Postfix SMTP rejection
...
2019-12-11 22:32:10
41.202.220.2 attackbots
Honeypot attack, port: 445, PTR: PTR record not found
2019-12-11 22:19:09
220.176.78.18 attackspambots
Honeypot attack, port: 445, PTR: PTR record not found
2019-12-11 22:12:42
218.76.52.29 attackspambots
Dec 11 14:40:46 MK-Soft-VM6 sshd[2982]: Failed password for mysql from 218.76.52.29 port 58390 ssh2
...
2019-12-11 22:13:12
167.160.65.45 attack
Unauthorized access detected from banned ip
2019-12-11 22:10:46
162.246.107.56 attackbots
Dec 11 11:31:10 firewall sshd[670]: Invalid user weblogic from 162.246.107.56
Dec 11 11:31:11 firewall sshd[670]: Failed password for invalid user weblogic from 162.246.107.56 port 38708 ssh2
Dec 11 11:37:55 firewall sshd[880]: Invalid user faster from 162.246.107.56
...
2019-12-11 22:38:55
106.12.108.32 attackspambots
Dec 11 14:58:31 microserver sshd[39821]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.108.32  user=root
Dec 11 14:58:32 microserver sshd[39821]: Failed password for root from 106.12.108.32 port 32780 ssh2
Dec 11 15:04:54 microserver sshd[40731]: Invalid user keanni from 106.12.108.32 port 60996
Dec 11 15:04:54 microserver sshd[40731]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.108.32
Dec 11 15:04:57 microserver sshd[40731]: Failed password for invalid user keanni from 106.12.108.32 port 60996 ssh2
Dec 11 15:17:56 microserver sshd[42962]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.108.32  user=root
Dec 11 15:17:58 microserver sshd[42962]: Failed password for root from 106.12.108.32 port 32776 ssh2
Dec 11 15:24:23 microserver sshd[43871]: Invalid user sk from 106.12.108.32 port 60982
Dec 11 15:24:23 microserver sshd[43871]: pam_unix(sshd:auth): authentication
2019-12-11 22:11:11
167.71.215.72 attackbotsspam
Dec  9 09:24:11 heissa sshd\[28547\]: Invalid user yenerich from 167.71.215.72 port 16887
Dec  9 09:24:12 heissa sshd\[28547\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.71.215.72
Dec  9 09:24:14 heissa sshd\[28547\]: Failed password for invalid user yenerich from 167.71.215.72 port 16887 ssh2
Dec  9 09:32:20 heissa sshd\[29841\]: Invalid user tom from 167.71.215.72 port 50763
Dec  9 09:32:20 heissa sshd\[29841\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.71.215.72
2019-12-11 22:36:24
122.49.219.98 attack
Unauthorized connection attempt detected from IP address 122.49.219.98 to port 445
2019-12-11 22:28:18
171.236.50.195 attack
firewall-block, port(s): 445/tcp
2019-12-11 22:29:55
61.69.254.46 attack
Dec 11 14:40:14 ns3042688 sshd\[30209\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.69.254.46  user=root
Dec 11 14:40:15 ns3042688 sshd\[30209\]: Failed password for root from 61.69.254.46 port 39338 ssh2
Dec 11 14:48:29 ns3042688 sshd\[1148\]: Invalid user jalali from 61.69.254.46
Dec 11 14:48:29 ns3042688 sshd\[1148\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.69.254.46 
Dec 11 14:48:31 ns3042688 sshd\[1148\]: Failed password for invalid user jalali from 61.69.254.46 port 52714 ssh2
...
2019-12-11 22:01:27

最近上报的IP列表

202.62.92.189 67.148.38.22 118.163.146.240 79.186.97.53
163.164.113.85 81.205.204.205 85.10.56.138 119.204.253.64
176.228.255.175 40.77.167.163 124.106.194.181 66.236.11.23
36.225.229.171 110.249.171.152 60.58.63.43 87.123.252.129
5.3.155.156 16.109.244.185 2003:d2:df2c:46a5:8de3:64dc:1839:2c7a 174.119.206.112