必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): None

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 114.248.19.64
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 51448
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;114.248.19.64.			IN	A

;; AUTHORITY SECTION:
.			214	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022030400 1800 900 604800 86400

;; Query time: 59 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Mar 05 03:21:02 CST 2022
;; MSG SIZE  rcvd: 106
HOST信息:
Host 64.19.248.114.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 64.19.248.114.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
89.248.168.112 attackbotsspam
 TCP (SYN) 89.248.168.112:48782 -> port 1723, len 44
2020-05-24 18:42:08
107.180.238.174 attackspambots
May 24 02:09:29 propaganda sshd[42655]: Disconnected from 107.180.238.174 port 44270 [preauth]
2020-05-24 18:53:50
217.61.6.112 attackspam
Failed password for invalid user fgt from 217.61.6.112 port 44260 ssh2
2020-05-24 18:38:43
54.39.138.251 attackspambots
Invalid user dxp from 54.39.138.251 port 44794
2020-05-24 18:49:45
208.109.11.34 attackbotsspam
SSH login attempts.
2020-05-24 19:06:17
3.16.61.52 attackspambots
May 21 12:23:57 foo sshd[26952]: Invalid user efy from 3.16.61.52
May 21 12:23:57 foo sshd[26952]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=em3-3-16-61-52.us-east-2.compute.amazonaws.com 
May 21 12:23:59 foo sshd[26952]: Failed password for invalid user efy from 3.16.61.52 port 37030 ssh2
May 21 12:23:59 foo sshd[26952]: Received disconnect from 3.16.61.52: 11: Bye Bye [preauth]
May 21 12:28:58 foo sshd[27017]: Invalid user dff from 3.16.61.52
May 21 12:28:58 foo sshd[27017]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=em3-3-16-61-52.us-east-2.compute.amazonaws.com 
May 21 12:29:00 foo sshd[27017]: Failed password for invalid user dff from 3.16.61.52 port 55264 ssh2
May 21 12:29:00 foo sshd[27017]: Received disconnect from 3.16.61.52: 11: Bye Bye [preauth]
May 21 12:31:39 foo sshd[27030]: Invalid user sjl from 3.16.61.52
May 21 12:31:39 foo sshd[27030]: pam_unix(sshd:auth): authen........
-------------------------------
2020-05-24 18:35:27
162.243.138.200 attackbotsspam
 TCP (SYN) 162.243.138.200:37197 -> port 8084, len 44
2020-05-24 18:58:10
177.152.124.23 attackbots
May 24 09:37:06 ns3033917 sshd[26952]: Invalid user nnb from 177.152.124.23 port 42262
May 24 09:37:08 ns3033917 sshd[26952]: Failed password for invalid user nnb from 177.152.124.23 port 42262 ssh2
May 24 09:51:02 ns3033917 sshd[27101]: Invalid user uut from 177.152.124.23 port 53880
...
2020-05-24 18:35:55
104.131.13.199 attack
May 24 10:43:35 melroy-server sshd[6939]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.131.13.199 
May 24 10:43:37 melroy-server sshd[6939]: Failed password for invalid user qtv from 104.131.13.199 port 53984 ssh2
...
2020-05-24 18:37:40
218.18.101.84 attackbotsspam
Invalid user fkw from 218.18.101.84 port 33404
2020-05-24 18:29:53
117.158.175.167 attack
Invalid user qry from 117.158.175.167 port 48018
2020-05-24 18:30:15
162.243.138.5 attackbots
 TCP (SYN) 162.243.138.5:46563 -> port 2525, len 44
2020-05-24 18:50:08
37.49.225.166 attack
 UDP 37.49.225.166:42920 -> port 41794, len 30
2020-05-24 18:43:34
122.51.60.39 attackbots
SSH brute-force: detected 20 distinct usernames within a 24-hour window.
2020-05-24 18:29:05
203.189.143.204 attackbotsspam
 TCP (SYN) 203.189.143.204:64323 -> port 23, len 44
2020-05-24 18:59:32

最近上报的IP列表

115.218.214.138 114.248.189.200 114.248.190.240 114.248.2.138
114.248.190.114 114.248.2.202 114.248.2.209 114.248.2.251
114.248.212.130 114.248.209.203 114.248.212.80 114.248.212.129
115.218.214.14 114.248.213.126 114.248.214.232 114.248.215.94
114.248.216.85 114.248.216.190 114.248.218.119 114.249.112.226