必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): Nanjing

省份(region): Jiangsu

国家(country): China

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 114.220.128.220
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 15643
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;114.220.128.220.		IN	A

;; AUTHORITY SECTION:
.			346	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2020033102 1800 900 604800 86400

;; Query time: 55 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Apr 01 17:44:37 CST 2020
;; MSG SIZE  rcvd: 119
HOST信息:
Host 220.128.220.114.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 220.128.220.114.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
174.138.26.48 attackspambots
Nov 10 15:08:32 webhost01 sshd[7528]: Failed password for root from 174.138.26.48 port 57536 ssh2
...
2019-11-10 16:29:12
81.25.226.142 attackspambots
" "
2019-11-10 16:14:24
185.56.182.122 attackspam
Automatic report - Port Scan Attack
2019-11-10 16:20:41
200.110.174.137 attack
Jun 19 21:35:00 microserver sshd[40096]: Invalid user lou from 200.110.174.137 port 46456
Jun 19 21:35:00 microserver sshd[40096]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=200.110.174.137
Jun 19 21:35:01 microserver sshd[40096]: Failed password for invalid user lou from 200.110.174.137 port 46456 ssh2
Jun 19 21:35:55 microserver sshd[40493]: Invalid user 130 from 200.110.174.137 port 59950
Jun 19 21:35:55 microserver sshd[40493]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=200.110.174.137
Nov 10 09:44:23 microserver sshd[63344]: Invalid user admin from 200.110.174.137 port 34650
Nov 10 09:44:23 microserver sshd[63344]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=200.110.174.137
Nov 10 09:44:25 microserver sshd[63344]: Failed password for invalid user admin from 200.110.174.137 port 34650 ssh2
Nov 10 09:48:51 microserver sshd[63983]: pam_unix(sshd:auth): authentication failure;
2019-11-10 16:05:34
103.129.98.170 attackspam
Nov 10 07:05:54 OneL sshd\[9985\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.129.98.170  user=root
Nov 10 07:05:57 OneL sshd\[9985\]: Failed password for root from 103.129.98.170 port 34648 ssh2
Nov 10 07:10:51 OneL sshd\[10120\]: Invalid user postgres from 103.129.98.170 port 45138
Nov 10 07:10:51 OneL sshd\[10120\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.129.98.170
Nov 10 07:10:53 OneL sshd\[10120\]: Failed password for invalid user postgres from 103.129.98.170 port 45138 ssh2
...
2019-11-10 15:56:03
106.75.122.81 attackbotsspam
Nov  9 22:13:26 hpm sshd\[15858\]: Invalid user Brasil1@3 from 106.75.122.81
Nov  9 22:13:26 hpm sshd\[15858\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.75.122.81
Nov  9 22:13:28 hpm sshd\[15858\]: Failed password for invalid user Brasil1@3 from 106.75.122.81 port 57706 ssh2
Nov  9 22:18:26 hpm sshd\[16247\]: Invalid user fu from 106.75.122.81
Nov  9 22:18:26 hpm sshd\[16247\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.75.122.81
2019-11-10 16:21:21
54.38.184.10 attackbotsspam
Port 22 Scan, PTR: None
2019-11-10 15:58:37
167.71.187.187 attack
2019-11-10T07:02:18.111135abusebot-8.cloudsearch.cf sshd\[16884\]: Invalid user 123!@\#qwe from 167.71.187.187 port 51584
2019-11-10 16:10:25
187.16.255.99 attackbotsspam
Nov 10 07:53:07 game-panel sshd[25479]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=187.16.255.99
Nov 10 07:53:09 game-panel sshd[25479]: Failed password for invalid user hdm777 from 187.16.255.99 port 35316 ssh2
Nov 10 07:57:42 game-panel sshd[25590]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=187.16.255.99
2019-11-10 16:07:17
210.183.21.48 attackspam
2019-11-10T07:02:23.907193abusebot-5.cloudsearch.cf sshd\[22830\]: Invalid user cui from 210.183.21.48 port 27638
2019-11-10 16:04:45
210.245.8.110 attackbots
Automatic report - XMLRPC Attack
2019-11-10 15:51:52
172.245.252.236 attackspambots
1,23-04/04 [bc03/m148] PostRequest-Spammer scoring: paris
2019-11-10 16:10:00
49.235.209.223 attackbotsspam
2019-11-10T08:25:04.537219scmdmz1 sshd\[4801\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.235.209.223  user=root
2019-11-10T08:25:05.983647scmdmz1 sshd\[4801\]: Failed password for root from 49.235.209.223 port 40026 ssh2
2019-11-10T08:29:33.349240scmdmz1 sshd\[5121\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.235.209.223  user=root
...
2019-11-10 15:48:25
186.193.19.170 attack
Unauthorized connection attempt from IP address 186.193.19.170 on Port 445(SMB)
2019-11-10 16:08:06
151.40.209.27 attack
Automatic report - Port Scan Attack
2019-11-10 15:54:36

最近上报的IP列表

54.0.7.25 16.207.234.132 160.69.69.190 196.187.184.185
31.51.116.185 223.57.45.7 131.157.238.102 114.237.109.81
91.112.205.139 165.199.106.204 179.234.208.5 180.127.77.155
40.52.120.162 222.213.244.198 159.228.16.37 124.58.128.17
87.80.116.43 167.116.12.176 37.106.203.60 79.89.114.143