必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): China

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
IP 类型 评论内容 时间
114.228.74.82 attackspam
Unauthorized connection attempt detected from IP address 114.228.74.82 to port 3389
2020-05-31 21:39:39
114.228.74.92 attackbots
firewall-block, port(s): 22/tcp
2019-10-06 23:39:59
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 114.228.74.45
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 5528
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;114.228.74.45.			IN	A

;; AUTHORITY SECTION:
.			329	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022030501 1800 900 604800 86400

;; Query time: 25 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Mar 06 10:59:31 CST 2022
;; MSG SIZE  rcvd: 106
HOST信息:
Host 45.74.228.114.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 45.74.228.114.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
157.245.111.175 attackspam
Mar  1 08:57:16 * sshd[5265]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.245.111.175
Mar  1 08:57:18 * sshd[5265]: Failed password for invalid user utente from 157.245.111.175 port 56032 ssh2
2020-03-01 16:39:26
154.204.42.22 attackspambots
Feb 29 22:06:42 hpm sshd\[25946\]: Invalid user vnc from 154.204.42.22
Feb 29 22:06:42 hpm sshd\[25946\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=154.204.42.22
Feb 29 22:06:44 hpm sshd\[25946\]: Failed password for invalid user vnc from 154.204.42.22 port 56904 ssh2
Feb 29 22:12:01 hpm sshd\[26385\]: Invalid user ftpuser from 154.204.42.22
Feb 29 22:12:01 hpm sshd\[26385\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=154.204.42.22
2020-03-01 16:24:56
139.59.86.171 attack
Feb 29 22:16:41 hanapaa sshd\[19662\]: Invalid user cpanellogin from 139.59.86.171
Feb 29 22:16:41 hanapaa sshd\[19662\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.86.171
Feb 29 22:16:43 hanapaa sshd\[19662\]: Failed password for invalid user cpanellogin from 139.59.86.171 port 39948 ssh2
Feb 29 22:24:33 hanapaa sshd\[20307\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.86.171  user=root
Feb 29 22:24:35 hanapaa sshd\[20307\]: Failed password for root from 139.59.86.171 port 42644 ssh2
2020-03-01 16:43:31
188.226.167.212 attackspambots
Mar  1 08:57:29 ns381471 sshd[5279]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.226.167.212
Mar  1 08:57:30 ns381471 sshd[5279]: Failed password for invalid user sanchi from 188.226.167.212 port 43120 ssh2
2020-03-01 16:14:49
1.203.115.140 attackbotsspam
Mar  1 05:35:38 ns382633 sshd\[28158\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=1.203.115.140  user=root
Mar  1 05:35:40 ns382633 sshd\[28158\]: Failed password for root from 1.203.115.140 port 43412 ssh2
Mar  1 05:55:10 ns382633 sshd\[31285\]: Invalid user user from 1.203.115.140 port 44321
Mar  1 05:55:10 ns382633 sshd\[31285\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=1.203.115.140
Mar  1 05:55:12 ns382633 sshd\[31285\]: Failed password for invalid user user from 1.203.115.140 port 44321 ssh2
2020-03-01 16:42:04
36.81.78.98 attackspambots
(sshd) Failed SSH login from 36.81.78.98 (ID/Indonesia/-): 2 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: Mar  1 05:55:05 ubnt-55d23 sshd[20306]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=36.81.78.98  user=root
Mar  1 05:55:07 ubnt-55d23 sshd[20306]: Failed password for root from 36.81.78.98 port 59378 ssh2
2020-03-01 16:34:43
51.91.198.99 attack
(sshd) Failed SSH login from 51.91.198.99 (FR/France/ip99.ip-51-91-198.eu): 5 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: Mar  1 09:23:31 amsweb01 sshd[24618]: Failed password for invalid user ftp from 51.91.198.99 port 40386 ssh2
Mar  1 09:26:01 amsweb01 sshd[25638]: Invalid user cnc from 51.91.198.99 port 58600
Mar  1 09:26:04 amsweb01 sshd[25638]: Failed password for invalid user cnc from 51.91.198.99 port 58600 ssh2
Mar  1 09:28:38 amsweb01 sshd[26640]: Invalid user ts3user from 51.91.198.99 port 48596
Mar  1 09:28:41 amsweb01 sshd[26640]: Failed password for invalid user ts3user from 51.91.198.99 port 48596 ssh2
2020-03-01 16:45:57
190.75.31.64 attackbots
1583038523 - 03/01/2020 05:55:23 Host: 190.75.31.64/190.75.31.64 Port: 445 TCP Blocked
2020-03-01 16:31:15
2401:4900:3388:74cb:600e:a23e:f6e5:41b2 attackspam
LGS,WP GET /wp-login.php
2020-03-01 16:28:07
105.145.34.154 attackbots
Invalid user shenjiakun from 105.145.34.154 port 47394
2020-03-01 16:37:26
218.75.78.214 attack
Port probing on unauthorized port 1433
2020-03-01 16:22:02
89.182.27.43 attackbots
Mar  1 05:55:45 ns382633 sshd\[31335\]: Invalid user pi from 89.182.27.43 port 41212
Mar  1 05:55:45 ns382633 sshd\[31336\]: Invalid user pi from 89.182.27.43 port 41214
Mar  1 05:55:45 ns382633 sshd\[31335\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=89.182.27.43
Mar  1 05:55:45 ns382633 sshd\[31336\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=89.182.27.43
Mar  1 05:55:47 ns382633 sshd\[31335\]: Failed password for invalid user pi from 89.182.27.43 port 41212 ssh2
Mar  1 05:55:47 ns382633 sshd\[31336\]: Failed password for invalid user pi from 89.182.27.43 port 41214 ssh2
2020-03-01 16:12:28
192.241.205.114 attackbotsspam
RDP Scan
2020-03-01 16:28:38
123.30.33.174 attack
Honeypot attack, port: 445, PTR: static.vnpt.vn.
2020-03-01 16:09:44
121.174.152.134 attackbots
Unauthorized connection attempt detected from IP address 121.174.152.134 to port 5555 [J]
2020-03-01 16:02:09

最近上报的IP列表

114.228.74.40 114.228.74.48 114.228.77.91 114.228.80.7
114.228.78.205 114.228.80.88 114.228.81.98 114.228.82.163
114.228.82.136 114.228.82.234 114.228.83.111 114.228.90.113
114.228.90.182 114.106.151.71 114.228.90.245 114.228.91.98
114.228.94.14 114.228.94.214 114.228.94.42 114.228.94.5