必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): China

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 114.226.244.150
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 29510
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;114.226.244.150.		IN	A

;; AUTHORITY SECTION:
.			198	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022030400 1800 900 604800 86400

;; Query time: 15 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Mar 04 21:34:42 CST 2022
;; MSG SIZE  rcvd: 108
HOST信息:
Host 150.244.226.114.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 150.244.226.114.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
142.93.130.58 attack
Blocked until: 2020.07.21 07:43:17 TCPMSS DPT=6943 LEN=40 TOS=0x00 PREC=0x00 TTL=246 ID=63775 PROTO=TCP WINDOW=1024 RES=0x00 SYN URGP=0
2020-06-02 23:59:57
180.166.141.58 attackspam
Jun  2 17:42:39 debian-2gb-nbg1-2 kernel: \[13371326.121627\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=180.166.141.58 DST=195.201.40.59 LEN=40 TOS=0x00 PREC=0x00 TTL=236 ID=36197 PROTO=TCP SPT=50029 DPT=3228 WINDOW=1024 RES=0x00 SYN URGP=0
2020-06-02 23:58:53
93.123.16.126 attackbots
2020-06-02T13:30:24.174436shield sshd\[2470\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=93.123.16.126  user=root
2020-06-02T13:30:25.971473shield sshd\[2470\]: Failed password for root from 93.123.16.126 port 42966 ssh2
2020-06-02T13:33:31.023219shield sshd\[2986\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=93.123.16.126  user=root
2020-06-02T13:33:32.825353shield sshd\[2986\]: Failed password for root from 93.123.16.126 port 33524 ssh2
2020-06-02T13:36:24.524432shield sshd\[3725\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=93.123.16.126  user=root
2020-06-02 23:38:47
195.231.3.146 attack
Jun  2 16:14:20 mail postfix/smtpd\[28730\]: warning: unknown\[195.231.3.146\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6\
Jun  2 16:14:37 mail postfix/smtpd\[28730\]: warning: unknown\[195.231.3.146\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6\
Jun  2 16:14:37 mail postfix/smtpd\[28891\]: warning: unknown\[195.231.3.146\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6\
Jun  2 17:12:45 mail postfix/smtpd\[30917\]: warning: unknown\[195.231.3.146\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6\
2020-06-02 23:40:12
128.199.133.143 attackspam
Jun  2 15:09:04 server sshd[646]: Failed password for root from 128.199.133.143 port 34306 ssh2
Jun  2 15:13:11 server sshd[4350]: Failed password for root from 128.199.133.143 port 38518 ssh2
Jun  2 15:17:30 server sshd[8059]: Failed password for root from 128.199.133.143 port 42730 ssh2
2020-06-02 23:55:26
111.125.228.232 attack
wordpress login
2020-06-03 00:21:33
69.174.91.44 attack
fell into ViewStateTrap:harare01
2020-06-03 00:23:30
69.94.151.27 attack
Jun  2 13:48:39 mail.srvfarm.net postfix/smtpd[1211324]: NOQUEUE: reject: RCPT from unknown[69.94.151.27]: 450 4.1.8 : Sender address rejected: Domain not found; from= to= proto=ESMTP helo=
Jun  2 13:49:36 mail.srvfarm.net postfix/smtpd[1211325]: NOQUEUE: reject: RCPT from unknown[69.94.151.27]: 450 4.1.8 : Sender address rejected: Domain not found; from= to= proto=ESMTP helo=
Jun  2 13:52:48 mail.srvfarm.net postfix/smtpd[1211324]: NOQUEUE: reject: RCPT from unknown[69.94.151.27]: 450 4.1.8 : Sender address rejected: Domain not found; from= to= proto=ESMTP helo=
Jun  2 13:57:30 mail.srvfarm.net postfix/smtpd[1211323]: NOQUEUE: reject: RCPT from unknown[69.94.151.27]: 45
2020-06-02 23:42:59
8.24.110.196 attackspam
Brute forcing email accounts
2020-06-02 23:52:21
91.121.91.82 attackspam
May 25 00:04:56 v2202003116398111542 sshd[22169]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=91.121.91.82  user=root
2020-06-02 23:37:33
198.108.67.103 attack
Automatic report - Banned IP Access
2020-06-02 23:57:46
103.106.138.107 attackbotsspam
Attempts against non-existent wp-login
2020-06-03 00:15:08
112.85.42.232 attack
Jun  2 17:50:16 home sshd[17462]: Failed password for root from 112.85.42.232 port 60629 ssh2
Jun  2 17:51:31 home sshd[17583]: Failed password for root from 112.85.42.232 port 30702 ssh2
...
2020-06-03 00:05:17
45.248.70.247 attack
Jun  2 13:39:11 vps34202 sshd[27422]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.248.70.247  user=r.r
Jun  2 13:39:13 vps34202 sshd[27422]: Failed password for r.r from 45.248.70.247 port 36472 ssh2
Jun  2 13:39:14 vps34202 sshd[27422]: Received disconnect from 45.248.70.247: 11: Bye Bye [preauth]
Jun  2 13:41:30 vps34202 sshd[27462]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.248.70.247  user=r.r
Jun  2 13:41:32 vps34202 sshd[27462]: Failed password for r.r from 45.248.70.247 port 34900 ssh2
Jun  2 13:41:33 vps34202 sshd[27462]: Received disconnect from 45.248.70.247: 11: Bye Bye [preauth]
Jun  2 13:42:29 vps34202 sshd[27480]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.248.70.247  user=r.r
Jun  2 13:42:31 vps34202 sshd[27480]: Failed password for r.r from 45.248.70.247 port 44214 ssh2
Jun  2 13:42:31 vps34202 sshd[27480]: Recei........
-------------------------------
2020-06-02 23:57:05
37.252.188.130 attackbots
Jun  2 15:49:25 ns382633 sshd\[31815\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=37.252.188.130  user=root
Jun  2 15:49:27 ns382633 sshd\[31815\]: Failed password for root from 37.252.188.130 port 43150 ssh2
Jun  2 15:54:17 ns382633 sshd\[32765\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=37.252.188.130  user=root
Jun  2 15:54:18 ns382633 sshd\[32765\]: Failed password for root from 37.252.188.130 port 50482 ssh2
Jun  2 15:58:52 ns382633 sshd\[1254\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=37.252.188.130  user=root
2020-06-03 00:05:45

最近上报的IP列表

117.57.90.132 117.57.90.135 117.57.90.138 117.57.90.14
117.57.90.142 117.57.90.143 117.57.90.144 117.57.90.140
117.57.90.146 117.57.90.149 117.57.90.128 117.57.90.150
117.57.90.137 114.226.244.152 117.57.90.154 117.57.90.158
117.57.90.16 117.57.90.160 117.57.90.152 117.57.90.162