必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): China

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 114.218.103.54
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 11239
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;114.218.103.54.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025021300 1800 900 604800 86400

;; Query time: 12 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Feb 13 22:14:12 CST 2025
;; MSG SIZE  rcvd: 107
HOST信息:
Host 54.103.218.114.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 54.103.218.114.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
52.172.148.60 attackspam
SSH/22 MH Probe, BF, Hack -
2020-06-01 18:59:26
101.91.200.186 attack
2020-06-01T06:47:54.846555randservbullet-proofcloud-66.localdomain sshd[13322]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=101.91.200.186  user=root
2020-06-01T06:47:56.386463randservbullet-proofcloud-66.localdomain sshd[13322]: Failed password for root from 101.91.200.186 port 34988 ssh2
2020-06-01T07:02:25.379868randservbullet-proofcloud-66.localdomain sshd[13410]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=101.91.200.186  user=root
2020-06-01T07:02:27.828479randservbullet-proofcloud-66.localdomain sshd[13410]: Failed password for root from 101.91.200.186 port 35168 ssh2
...
2020-06-01 18:35:25
36.72.167.52 attackbots
Unauthorized connection attempt from IP address 36.72.167.52 on Port 445(SMB)
2020-06-01 18:30:42
122.51.17.106 attackbotsspam
Jun  1 12:42:52 vps687878 sshd\[6915\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.51.17.106  user=root
Jun  1 12:42:54 vps687878 sshd\[6915\]: Failed password for root from 122.51.17.106 port 41332 ssh2
Jun  1 12:46:09 vps687878 sshd\[7389\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.51.17.106  user=root
Jun  1 12:46:11 vps687878 sshd\[7389\]: Failed password for root from 122.51.17.106 port 51792 ssh2
Jun  1 12:49:23 vps687878 sshd\[7644\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.51.17.106  user=root
...
2020-06-01 18:50:27
162.62.29.207 attackspambots
Lines containing failures of 162.62.29.207
Jun  1 04:42:07 shared01 sshd[11493]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=162.62.29.207  user=r.r
Jun  1 04:42:09 shared01 sshd[11493]: Failed password for r.r from 162.62.29.207 port 43124 ssh2
Jun  1 04:42:09 shared01 sshd[11493]: Received disconnect from 162.62.29.207 port 43124:11: Bye Bye [preauth]
Jun  1 04:42:09 shared01 sshd[11493]: Disconnected from authenticating user r.r 162.62.29.207 port 43124 [preauth]
Jun  1 04:49:19 shared01 sshd[13545]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=162.62.29.207  user=r.r
Jun  1 04:49:21 shared01 sshd[13545]: Failed password for r.r from 162.62.29.207 port 38844 ssh2
Jun  1 04:49:21 shared01 sshd[13545]: Received disconnect from 162.62.29.207 port 38844:11: Bye Bye [preauth]
Jun  1 04:49:21 shared01 sshd[13545]: Disconnected from authenticating user r.r 162.62.29.207 port 38844 [preauth........
------------------------------
2020-06-01 18:44:41
129.45.70.234 attack
Unauthorized connection attempt from IP address 129.45.70.234 on Port 445(SMB)
2020-06-01 18:47:17
14.186.40.177 attack
20/5/31@23:46:38: FAIL: Alarm-Network address from=14.186.40.177
20/5/31@23:46:38: FAIL: Alarm-Network address from=14.186.40.177
...
2020-06-01 18:26:46
14.29.35.47 attackspam
2020-06-01T05:42:48.4873301240 sshd\[30992\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=14.29.35.47  user=root
2020-06-01T05:42:50.7011281240 sshd\[30992\]: Failed password for root from 14.29.35.47 port 35056 ssh2
2020-06-01T05:46:13.9996021240 sshd\[31170\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=14.29.35.47  user=root
...
2020-06-01 18:45:50
165.227.46.89 attack
Lines containing failures of 165.227.46.89
Jun  1 02:07:56 kmh-wmh-001-nbg01 sshd[18523]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.227.46.89  user=r.r
Jun  1 02:07:58 kmh-wmh-001-nbg01 sshd[18523]: Failed password for r.r from 165.227.46.89 port 35906 ssh2
Jun  1 02:07:58 kmh-wmh-001-nbg01 sshd[18523]: Received disconnect from 165.227.46.89 port 35906:11: Bye Bye [preauth]
Jun  1 02:07:58 kmh-wmh-001-nbg01 sshd[18523]: Disconnected from authenticating user r.r 165.227.46.89 port 35906 [preauth]
Jun  1 02:17:17 kmh-wmh-001-nbg01 sshd[19646]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.227.46.89  user=r.r
Jun  1 02:17:20 kmh-wmh-001-nbg01 sshd[19646]: Failed password for r.r from 165.227.46.89 port 38652 ssh2
Jun  1 02:17:22 kmh-wmh-001-nbg01 sshd[19646]: Received disconnect from 165.227.46.89 port 38652:11: Bye Bye [preauth]
Jun  1 02:17:22 kmh-wmh-001-nbg01 sshd[19646]: Dis........
------------------------------
2020-06-01 18:34:53
51.161.51.150 attack
2020-06-01T00:48:10.145196server.mjenks.net sshd[2662604]: Failed password for invalid user \r from 51.161.51.150 port 44378 ssh2
2020-06-01T00:51:20.674468server.mjenks.net sshd[2662980]: Invalid user qwe123321\r from 51.161.51.150 port 49252
2020-06-01T00:51:20.681785server.mjenks.net sshd[2662980]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.161.51.150
2020-06-01T00:51:20.674468server.mjenks.net sshd[2662980]: Invalid user qwe123321\r from 51.161.51.150 port 49252
2020-06-01T00:51:21.951108server.mjenks.net sshd[2662980]: Failed password for invalid user qwe123321\r from 51.161.51.150 port 49252 ssh2
...
2020-06-01 18:25:56
122.225.62.141 attackbotsspam
Unauthorized connection attempt from IP address 122.225.62.141 on Port 445(SMB)
2020-06-01 18:47:48
218.69.19.150 attack
Jun  1 03:16:43 euve59663 sshd[6922]: pam_unix(sshd:auth): authenticati=
on failure; logname=3D uid=3D0 euid=3D0 tty=3Dssh ruser=3D rhost=3D218.=
69.19.150  user=3Dr.r
Jun  1 03:16:46 euve59663 sshd[6922]: Failed password for r.r from 218=
.69.19.150 port 38230 ssh2
Jun  1 03:16:46 euve59663 sshd[6922]: Received disconnect from 218.69.1=
9.150: 11: Bye Bye [preauth]
Jun  1 03:20:12 euve59663 sshd[7022]: pam_unix(sshd:auth): authenticati=
on failure; logname=3D uid=3D0 euid=3D0 tty=3Dssh ruser=3D rhost=3D218.=
69.19.150  user=3Dr.r
Jun  1 03:20:13 euve59663 sshd[7022]: Failed password for r.r from 218=
.69.19.150 port 57182 ssh2
Jun  1 03:20:13 euve59663 sshd[7022]: Received disconnect from 218.69.1=
9.150: 11: Bye Bye [preauth]
Jun  1 03:23:58 euve59663 sshd[7094]: pam_unix(sshd:auth): authenticati=
on failure; logname=3D uid=3D0 euid=3D0 tty=3Dssh ruser=3D rhost=3D218.=
69.19.150  user=3Dr.r
Jun  1 03:24:00 euve59663 sshd[7094]: Failed password for r.r from 218=
.69.19........
-------------------------------
2020-06-01 18:57:06
222.124.139.163 attackspambots
Unauthorized connection attempt from IP address 222.124.139.163 on Port 445(SMB)
2020-06-01 18:40:07
212.154.69.54 attackspam
Brute forcing RDP port 3389
2020-06-01 18:41:58
36.71.232.174 attack
Attempted connection to port 445.
2020-06-01 19:02:13

最近上报的IP列表

228.33.229.241 236.123.238.147 233.193.70.66 62.238.114.43
130.153.158.30 228.104.183.40 149.209.228.128 203.89.57.94
70.157.215.141 59.123.22.150 59.129.46.246 198.110.232.202
233.253.164.116 81.107.232.70 18.231.125.91 207.172.225.43
255.243.171.146 189.46.207.163 36.87.220.57 57.9.38.126