必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): None

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 114.221.20.254
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 54022
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;114.221.20.254.			IN	A

;; AUTHORITY SECTION:
.			502	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022030400 1800 900 604800 86400

;; Query time: 20 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Mar 05 03:09:19 CST 2022
;; MSG SIZE  rcvd: 107
HOST信息:
Host 254.20.221.114.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 254.20.221.114.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
220.190.8.110 attackspambots
CN China 110.8.190.220.broad.wz.zj.dynamic.163data.com.cn Failures: 20 ftpd
2020-04-02 18:56:47
86.62.81.50 attack
$f2bV_matches
2020-04-02 18:47:01
157.230.255.37 attack
2020-04-01 UTC: (34x) - 123,123123,123@qaz,@dm!n1,AA@123321,AQ1SW2DE3,P@$$w0rt1234,P@$$word04,PAssw0rd,Server@2017,U_tywg_2008,ZXCVB,abc357,admiadmin,admin;,bf123,chenx,china666IDC,fe123,idc!QW@#ER$%T,moonshine,nproc(4x),p@$$word12,root(4x),vice,vps2014,vps2048,weezer
2020-04-02 18:25:02
144.217.178.249 attackspambots
CA Canada ip249.ip-144-217-178.net Failures: 5 smtpauth
2020-04-02 18:44:01
120.29.158.173 attackbots
Apr  1 23:38:08 web1 sshd\[5912\]: Invalid user serving from 120.29.158.173
Apr  1 23:38:08 web1 sshd\[5912\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=120.29.158.173
Apr  1 23:38:11 web1 sshd\[5912\]: Failed password for invalid user serving from 120.29.158.173 port 35656 ssh2
Apr  1 23:42:50 web1 sshd\[6429\]: Invalid user zhangjh from 120.29.158.173
Apr  1 23:42:50 web1 sshd\[6429\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=120.29.158.173
2020-04-02 18:42:41
184.105.247.194 attack
Unauthorized connection attempt detected from IP address 184.105.247.194 to port 8443
2020-04-02 18:37:29
106.5.18.1 attackbots
CN China - Hits: 11
2020-04-02 18:28:50
163.172.230.4 attackbots
[2020-04-02 06:58:25] NOTICE[12114][C-00000179] chan_sip.c: Call from '' (163.172.230.4:49726) to extension '99989796011972592277524' rejected because extension not found in context 'public'.
[2020-04-02 06:58:25] SECURITY[12128] res_security_log.c: SecurityEvent="FailedACL",EventTV="2020-04-02T06:58:25.014-0400",Severity="Error",Service="SIP",EventVersion="1",AccountID="99989796011972592277524",SessionID="0x7f020c083158",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/163.172.230.4/49726",ACLName="no_extension_match"
[2020-04-02 07:01:51] NOTICE[12114][C-0000017c] chan_sip.c: Call from '' (163.172.230.4:63602) to extension '9998979695011972592277524' rejected because extension not found in context 'public'.
...
2020-04-02 19:02:32
190.131.201.122 attackspam
Apr  2 05:47:01 ns382633 sshd\[32719\]: Invalid user aw from 190.131.201.122 port 43720
Apr  2 05:47:01 ns382633 sshd\[32719\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=190.131.201.122
Apr  2 05:47:02 ns382633 sshd\[32719\]: Failed password for invalid user aw from 190.131.201.122 port 43720 ssh2
Apr  2 05:52:52 ns382633 sshd\[1252\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=190.131.201.122  user=root
Apr  2 05:52:54 ns382633 sshd\[1252\]: Failed password for root from 190.131.201.122 port 36660 ssh2
2020-04-02 18:34:52
35.200.165.32 attackspambots
$f2bV_matches
2020-04-02 18:45:18
45.55.145.31 attack
Apr  2 11:15:35 srv-ubuntu-dev3 sshd[43320]: Invalid user axuv from 45.55.145.31
Apr  2 11:15:35 srv-ubuntu-dev3 sshd[43320]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.55.145.31
Apr  2 11:15:35 srv-ubuntu-dev3 sshd[43320]: Invalid user axuv from 45.55.145.31
Apr  2 11:15:37 srv-ubuntu-dev3 sshd[43320]: Failed password for invalid user axuv from 45.55.145.31 port 36893 ssh2
Apr  2 11:18:35 srv-ubuntu-dev3 sshd[43809]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.55.145.31  user=root
Apr  2 11:18:38 srv-ubuntu-dev3 sshd[43809]: Failed password for root from 45.55.145.31 port 36088 ssh2
Apr  2 11:21:37 srv-ubuntu-dev3 sshd[44304]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.55.145.31  user=root
Apr  2 11:21:39 srv-ubuntu-dev3 sshd[44304]: Failed password for root from 45.55.145.31 port 35273 ssh2
Apr  2 11:24:40 srv-ubuntu-dev3 sshd[44798]: pam_unix
...
2020-04-02 18:25:52
115.76.44.83 attackspam
Automatic report - Port Scan Attack
2020-04-02 18:36:51
211.159.147.35 attackbotsspam
(sshd) Failed SSH login from 211.159.147.35 (CN/China/-): 5 in the last 3600 secs
2020-04-02 18:34:31
31.192.143.247 attack
Automatic report - Port Scan Attack
2020-04-02 18:48:18
110.77.238.88 attack
Unauthorised access (Apr  2) SRC=110.77.238.88 LEN=52 TTL=116 ID=32412 DF TCP DPT=445 WINDOW=8192 SYN
2020-04-02 18:43:20

最近上报的IP列表

114.221.199.97 114.221.203.34 114.221.204.49 114.221.208.5
114.221.233.122 114.221.233.133 114.221.233.175 114.222.11.206
114.222.111.163 114.222.111.11 115.212.125.30 114.222.116.17
114.222.117.6 114.222.118.97 114.222.129.37 114.222.130.184
114.222.130.122 114.222.130.198 114.223.173.19 114.223.174.234