必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): None

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 114.221.80.11
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 25202
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;114.221.80.11.			IN	A

;; AUTHORITY SECTION:
.			462	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022030400 1800 900 604800 86400

;; Query time: 57 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Mar 04 14:59:49 CST 2022
;; MSG SIZE  rcvd: 106
HOST信息:
Host 11.80.221.114.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 11.80.221.114.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
37.191.232.6 attackbots
MYH,DEF GET /shell?busybox
2019-09-16 01:30:56
221.132.17.74 attack
Sep 15 13:21:54 vps200512 sshd\[11425\]: Invalid user geschaft from 221.132.17.74
Sep 15 13:21:54 vps200512 sshd\[11425\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=221.132.17.74
Sep 15 13:21:56 vps200512 sshd\[11425\]: Failed password for invalid user geschaft from 221.132.17.74 port 41408 ssh2
Sep 15 13:27:12 vps200512 sshd\[11524\]: Invalid user gp from 221.132.17.74
Sep 15 13:27:12 vps200512 sshd\[11524\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=221.132.17.74
2019-09-16 01:50:59
92.63.194.47 attackbotsspam
Sep 16 00:02:35 webhost01 sshd[18402]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=92.63.194.47
Sep 16 00:02:36 webhost01 sshd[18402]: Failed password for invalid user admin from 92.63.194.47 port 65506 ssh2
...
2019-09-16 01:43:08
168.255.251.126 attackbotsspam
Sep 15 17:25:29 MK-Soft-VM6 sshd\[2074\]: Invalid user 123456 from 168.255.251.126 port 53404
Sep 15 17:25:29 MK-Soft-VM6 sshd\[2074\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=168.255.251.126
Sep 15 17:25:31 MK-Soft-VM6 sshd\[2074\]: Failed password for invalid user 123456 from 168.255.251.126 port 53404 ssh2
...
2019-09-16 01:40:20
51.91.251.20 attackbots
Sep 15 07:04:46 kapalua sshd\[26294\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=20.ip-51-91-251.eu  user=root
Sep 15 07:04:48 kapalua sshd\[26294\]: Failed password for root from 51.91.251.20 port 57070 ssh2
Sep 15 07:09:12 kapalua sshd\[26769\]: Invalid user samba1 from 51.91.251.20
Sep 15 07:09:12 kapalua sshd\[26769\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=20.ip-51-91-251.eu
Sep 15 07:09:14 kapalua sshd\[26769\]: Failed password for invalid user samba1 from 51.91.251.20 port 47988 ssh2
2019-09-16 01:15:21
51.75.52.127 attack
15.09.2019 17:16:08 Connection to port 2095 blocked by firewall
2019-09-16 01:34:03
45.55.72.106 attackspambots
[Aegis] @ 2019-09-15 14:19:48  0100 -> Common web attack.
2019-09-16 01:56:43
51.38.57.78 attackbotsspam
Sep 15 15:20:17 srv206 sshd[24593]: Invalid user login from 51.38.57.78
...
2019-09-16 01:42:06
46.101.76.236 attackspambots
Sep 15 07:14:36 aiointranet sshd\[26828\]: Invalid user aldis from 46.101.76.236
Sep 15 07:14:36 aiointranet sshd\[26828\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=46.101.76.236
Sep 15 07:14:38 aiointranet sshd\[26828\]: Failed password for invalid user aldis from 46.101.76.236 port 53696 ssh2
Sep 15 07:20:48 aiointranet sshd\[27285\]: Invalid user oracle from 46.101.76.236
Sep 15 07:20:48 aiointranet sshd\[27285\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=46.101.76.236
2019-09-16 01:23:02
104.131.84.59 attackspambots
Automated report - ssh fail2ban:
Sep 15 19:36:25 authentication failure 
Sep 15 19:36:26 wrong password, user=rochester, port=41054, ssh2
Sep 15 19:40:41 authentication failure
2019-09-16 02:04:21
193.32.160.135 attackspam
Sep 15 18:16:24 relay postfix/smtpd\[2612\]: NOQUEUE: reject: RCPT from unknown\[193.32.160.135\]: 554 5.7.1 \: Relay access denied\; from=\ to=\ proto=ESMTP helo=\<\[193.32.160.145\]\>
Sep 15 18:16:24 relay postfix/smtpd\[2612\]: NOQUEUE: reject: RCPT from unknown\[193.32.160.135\]: 554 5.7.1 \: Relay access denied\; from=\ to=\ proto=ESMTP helo=\<\[193.32.160.145\]\>
Sep 15 18:16:24 relay postfix/smtpd\[2612\]: NOQUEUE: reject: RCPT from unknown\[193.32.160.135\]: 554 5.7.1 \: Relay access denied\; from=\ to=\ proto=ESMTP helo=\<\[193.32.160.145\]\>
Sep 15 18:16:24 relay postfix/smtpd\[2612\]: NOQUEUE: reject: RCPT from unknown\[193.32.160.135\]: 554 5.7.1 \
...
2019-09-16 01:44:02
110.163.131.78 attackspambots
Sep 15 18:40:42 MainVPS sshd[29317]: Invalid user pi from 110.163.131.78 port 34166
Sep 15 18:40:42 MainVPS sshd[29319]: Invalid user pi from 110.163.131.78 port 34170
Sep 15 18:40:42 MainVPS sshd[29317]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=110.163.131.78
Sep 15 18:40:42 MainVPS sshd[29317]: Invalid user pi from 110.163.131.78 port 34166
Sep 15 18:40:44 MainVPS sshd[29317]: Failed password for invalid user pi from 110.163.131.78 port 34166 ssh2
Sep 15 18:40:42 MainVPS sshd[29319]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=110.163.131.78
Sep 15 18:40:42 MainVPS sshd[29319]: Invalid user pi from 110.163.131.78 port 34170
Sep 15 18:40:45 MainVPS sshd[29319]: Failed password for invalid user pi from 110.163.131.78 port 34170 ssh2
...
2019-09-16 01:44:21
198.50.175.247 attackbotsspam
$f2bV_matches
2019-09-16 01:45:34
178.128.174.202 attackspam
Sep 15 07:56:01 kapalua sshd\[30814\]: Invalid user Tuomo from 178.128.174.202
Sep 15 07:56:01 kapalua sshd\[30814\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.128.174.202
Sep 15 07:56:03 kapalua sshd\[30814\]: Failed password for invalid user Tuomo from 178.128.174.202 port 60988 ssh2
Sep 15 08:00:12 kapalua sshd\[31143\]: Invalid user deskman from 178.128.174.202
Sep 15 08:00:12 kapalua sshd\[31143\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.128.174.202
2019-09-16 02:01:58
59.97.238.106 attack
Unauthorised access (Sep 15) SRC=59.97.238.106 LEN=40 TOS=0x08 TTL=50 ID=61761 TCP DPT=23 WINDOW=49459 SYN
2019-09-16 02:00:44

最近上报的IP列表

114.221.80.154 114.221.52.240 114.221.80.202 114.221.80.83
114.221.80.96 114.221.80.75 114.221.80.119 113.53.14.180
114.221.81.114 114.221.81.193 114.221.81.133 114.221.81.5
114.221.81.60 114.221.84.200 114.221.84.113 114.221.81.84
114.221.80.99 114.221.81.252 114.221.84.207 114.221.84.122