必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): China

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
IP 类型 评论内容 时间
114.234.82.78 attackspam
Sep823:44:03server4pure-ftpd:\(\?@114.234.82.78\)[WARNING]Authenticationfailedforuser[www]Sep823:59:49server4pure-ftpd:\(\?@129.204.230.125\)[WARNING]Authenticationfailedforuser[www]Sep823:59:20server4pure-ftpd:\(\?@129.204.230.125\)[WARNING]Authenticationfailedforuser[www]Sep823:59:35server4pure-ftpd:\(\?@129.204.230.125\)[WARNING]Authenticationfailedforuser[www]Sep823:43:07server4pure-ftpd:\(\?@117.95.105.99\)[WARNING]Authenticationfailedforuser[www]Sep823:43:02server4pure-ftpd:\(\?@117.95.105.99\)[WARNING]Authenticationfailedforuser[www]Sep823:59:42server4pure-ftpd:\(\?@129.204.230.125\)[WARNING]Authenticationfailedforuser[www]Sep823:43:57server4pure-ftpd:\(\?@114.234.82.78\)[WARNING]Authenticationfailedforuser[www]Sep823:59:25server4pure-ftpd:\(\?@129.204.230.125\)[WARNING]Authenticationfailedforuser[www]Sep823:59:26server4pure-ftpd:\(\?@129.204.230.125\)[WARNING]Authenticationfailedforuser[www]IPAddressesBlocked:
2019-09-09 07:34:44
114.234.82.78 attackbotsspam
Automatic report - Port Scan Attack
2019-09-08 19:54:42
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 114.234.82.21
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 55363
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;114.234.82.21.			IN	A

;; AUTHORITY SECTION:
.			426	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022030400 1800 900 604800 86400

;; Query time: 100 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Mar 04 15:24:33 CST 2022
;; MSG SIZE  rcvd: 106
HOST信息:
Host 21.82.234.114.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 21.82.234.114.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
103.16.228.20 attackspambots
Jan1505:49:43server4pure-ftpd:\(\?@103.16.228.20\)[WARNING]Authenticationfailedforuser[info]Jan1505:49:09server4pure-ftpd:\(\?@144.217.197.11\)[WARNING]Authenticationfailedforuser[info]Jan1505:49:28server4pure-ftpd:\(\?@144.217.197.11\)[WARNING]Authenticationfailedforuser[info]Jan1505:49:30server4pure-ftpd:\(\?@103.16.228.20\)[WARNING]Authenticationfailedforuser[info]Jan1505:49:55server4pure-ftpd:\(\?@142.93.208.24\)[WARNING]Authenticationfailedforuser[info]Jan1505:49:56server4pure-ftpd:\(\?@103.16.228.20\)[WARNING]Authenticationfailedforuser[info]Jan1505:49:59server4pure-ftpd:\(\?@103.18.179.196\)[WARNING]Authenticationfailedforuser[info]Jan1505:50:02server4pure-ftpd:\(\?@35.194.4.89\)[WARNING]Authenticationfailedforuser[info]Jan1505:49:22server4pure-ftpd:\(\?@144.217.197.11\)[WARNING]Authenticationfailedforuser[info]Jan1505:49:48server4pure-ftpd:\(\?@103.16.228.20\)[WARNING]Authenticationfailedforuser[info]IPAddressesBlocked:
2020-01-15 17:26:23
103.107.101.135 attackbots
Jan 15 07:06:11 www sshd\[92942\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.107.101.135  user=root
Jan 15 07:06:13 www sshd\[92942\]: Failed password for root from 103.107.101.135 port 60186 ssh2
Jan 15 07:08:33 www sshd\[92960\]: Invalid user local from 103.107.101.135
...
2020-01-15 17:24:44
216.24.103.47 attackbots
firewall-block, port(s): 445/tcp
2020-01-15 17:47:24
149.91.82.218 attack
Lines containing failures of 149.91.82.218 (max 1000)
Jan 13 20:23:12 server sshd[20840]: Connection from 149.91.82.218 port 52954 on 62.116.165.82 port 22
Jan 13 20:23:13 server sshd[20840]: reveeclipse mapping checking getaddrinfo for 218.82.91.149.ipv4.netrix.fr [149.91.82.218] failed - POSSIBLE BREAK-IN ATTEMPT!
Jan 13 20:23:13 server sshd[20840]: Invalid user uli from 149.91.82.218 port 52954
Jan 13 20:23:13 server sshd[20840]: Received disconnect from 149.91.82.218 port 52954:11: Bye Bye [preauth]
Jan 13 20:23:13 server sshd[20840]: Disconnected from 149.91.82.218 port 52954 [preauth]


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=149.91.82.218
2020-01-15 17:58:18
35.194.4.89 attackspam
Jan 15 10:10:32 163-172-32-151 proftpd[6407]: 0.0.0.0 (35.194.4.89[35.194.4.89]) - USER wordpress: no such user found from 35.194.4.89 [35.194.4.89] to 163.172.32.151:21
...
2020-01-15 17:24:58
217.218.21.242 attackspambots
Jan 15 11:41:55 itv-usvr-02 sshd[2529]: Invalid user hw from 217.218.21.242 port 27037
Jan 15 11:41:55 itv-usvr-02 sshd[2529]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=217.218.21.242
Jan 15 11:41:55 itv-usvr-02 sshd[2529]: Invalid user hw from 217.218.21.242 port 27037
Jan 15 11:41:57 itv-usvr-02 sshd[2529]: Failed password for invalid user hw from 217.218.21.242 port 27037 ssh2
Jan 15 11:49:19 itv-usvr-02 sshd[2545]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=217.218.21.242  user=root
Jan 15 11:49:20 itv-usvr-02 sshd[2545]: Failed password for root from 217.218.21.242 port 18194 ssh2
2020-01-15 17:50:40
165.227.203.208 attack
165.227.203.208 - - [15/Jan/2020:05:49:47 +0100] "GET /wp-login.php HTTP/1.1" 200 1901 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
165.227.203.208 - - [15/Jan/2020:05:49:52 +0100] "POST /wp-login.php HTTP/1.1" 200 2297 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
165.227.203.208 - - [15/Jan/2020:05:49:57 +0100] "GET /wp-login.php HTTP/1.1" 200 1901 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
165.227.203.208 - - [15/Jan/2020:05:50:03 +0100] "POST /wp-login.php HTTP/1.1" 200 2272 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
165.227.203.208 - - [15/Jan/2020:05:50:08 +0100] "GET /wp-login.php HTTP/1.1" 200 1901 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
165.227.203.208 - - [15/Jan/2020:05:50:14 +0100] "POST /wp-login.php HTTP/1.1" 200 2272 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
.
2020-01-15 17:17:22
93.169.42.145 attackspam
1579063771 - 01/15/2020 05:49:31 Host: 93.169.42.145/93.169.42.145 Port: 445 TCP Blocked
2020-01-15 17:42:43
80.82.77.33 attack
Jan 15 09:50:27 debian-2gb-nbg1-2 kernel: \[1337525.840671\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=80.82.77.33 DST=195.201.40.59 LEN=53 TOS=0x00 PREC=0x00 TTL=120 ID=23235 PROTO=UDP SPT=16728 DPT=27016 LEN=33
2020-01-15 17:40:57
188.254.0.226 attack
Unauthorized connection attempt detected from IP address 188.254.0.226 to port 2220 [J]
2020-01-15 17:22:40
103.51.153.235 attack
Jan 15 04:45:50 124388 sshd[11808]: Failed password for root from 103.51.153.235 port 47794 ssh2
Jan 15 04:49:43 124388 sshd[11928]: Invalid user admin from 103.51.153.235 port 48346
Jan 15 04:49:43 124388 sshd[11928]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.51.153.235
Jan 15 04:49:43 124388 sshd[11928]: Invalid user admin from 103.51.153.235 port 48346
Jan 15 04:49:45 124388 sshd[11928]: Failed password for invalid user admin from 103.51.153.235 port 48346 ssh2
2020-01-15 17:35:36
115.73.212.189 attackbots
1579063775 - 01/15/2020 05:49:35 Host: 115.73.212.189/115.73.212.189 Port: 445 TCP Blocked
2020-01-15 17:40:14
78.16.251.202 attackspam
unauthorized connection attempt
2020-01-15 17:43:05
103.233.207.2 attack
firewall-block, port(s): 445/tcp
2020-01-15 17:19:42
51.83.98.52 attack
Unauthorized connection attempt detected from IP address 51.83.98.52 to port 2220 [J]
2020-01-15 17:39:41

最近上报的IP列表

113.53.194.225 114.234.82.213 114.234.82.227 114.234.82.211
114.234.82.23 114.234.82.222 114.234.82.219 114.234.82.228
114.234.82.215 114.234.82.230 114.234.82.234 114.234.82.250
114.234.82.25 114.234.82.28 114.234.82.239 114.234.82.253
113.53.194.229 114.234.82.248 114.234.82.242 114.234.82.246