必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): Korea (the Republic of)

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 114.30.28.126
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 261
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;114.30.28.126.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025022301 1800 900 604800 86400

;; Query time: 12 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Feb 24 10:28:21 CST 2025
;; MSG SIZE  rcvd: 106
HOST信息:
Host 126.28.30.114.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 126.28.30.114.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
157.245.42.253 attackspam
157.245.42.253 - - [28/Mar/2020:15:42:51 +0300] "POST /wp-login.php HTTP/1.1" 200 2790 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
2020-03-28 23:51:58
182.61.105.146 attackspam
2020-03-28T14:36:58.394000homeassistant sshd[873]: Invalid user www from 182.61.105.146 port 35836
2020-03-28T14:36:58.404002homeassistant sshd[873]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.61.105.146
...
2020-03-29 00:20:14
176.226.134.196 attack
Mar 28 14:47:53 v22018076622670303 sshd\[23015\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=176.226.134.196  user=root
Mar 28 14:47:55 v22018076622670303 sshd\[23015\]: Failed password for root from 176.226.134.196 port 64003 ssh2
Mar 28 14:47:56 v22018076622670303 sshd\[23017\]: Invalid user admin from 176.226.134.196 port 65515
...
2020-03-28 23:55:14
222.186.30.248 attackbots
Mar 28 17:41:08 server2 sshd\[13320\]: User root from 222.186.30.248 not allowed because not listed in AllowUsers
Mar 28 17:41:09 server2 sshd\[13325\]: User root from 222.186.30.248 not allowed because not listed in AllowUsers
Mar 28 17:41:09 server2 sshd\[13322\]: User root from 222.186.30.248 not allowed because not listed in AllowUsers
Mar 28 17:45:26 server2 sshd\[13645\]: User root from 222.186.30.248 not allowed because not listed in AllowUsers
Mar 28 17:45:26 server2 sshd\[13646\]: User root from 222.186.30.248 not allowed because not listed in AllowUsers
Mar 28 17:45:28 server2 sshd\[13649\]: User root from 222.186.30.248 not allowed because not listed in AllowUsers
2020-03-28 23:46:56
144.76.14.153 attackspambots
SQL Injection
2020-03-28 23:44:08
36.89.49.195 attackbotsspam
DATE:2020-03-28 13:38:08, IP:36.89.49.195, PORT:5900 VNC brute force auth on honeypot server (epe-honey1-hq)
2020-03-29 00:32:17
51.158.120.115 attackbots
Mar 28 16:01:37 [HOSTNAME] sshd[21583]: Invalid user wwh from 51.158.120.115 port 43846
Mar 28 16:01:37 [HOSTNAME] sshd[21583]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.158.120.115
Mar 28 16:01:39 [HOSTNAME] sshd[21583]: Failed password for invalid user wwh from 51.158.120.115 port 43846 ssh2
...
2020-03-29 00:21:53
31.210.177.57 attack
HHHH
2020-03-28 23:40:35
62.234.206.12 attack
Mar 28 14:33:08 legacy sshd[26986]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=62.234.206.12
Mar 28 14:33:10 legacy sshd[26986]: Failed password for invalid user olin from 62.234.206.12 port 45570 ssh2
Mar 28 14:38:08 legacy sshd[27188]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=62.234.206.12
...
2020-03-29 00:17:52
188.19.189.236 attack
trying to access non-authorized port
2020-03-28 23:39:12
148.70.96.124 attack
" "
2020-03-29 00:22:17
118.31.121.129 attackspam
[28/Mar/2020:13:42:50 +0100] Web-Request: "GET /arx/license.txt", User-Agent: "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
2020-03-28 23:52:31
124.156.169.7 attackbotsspam
Mar 28 15:53:01 [host] sshd[7383]: Invalid user gi
Mar 28 15:53:01 [host] sshd[7383]: pam_unix(sshd:a
Mar 28 15:53:03 [host] sshd[7383]: Failed password
2020-03-28 23:55:52
142.44.160.173 attackbotsspam
5x Failed Password
2020-03-29 00:27:47
180.71.47.198 attack
sshd jail - ssh hack attempt
2020-03-29 00:27:28

最近上报的IP列表

70.16.72.138 157.121.52.89 32.53.143.36 80.4.166.227
3.65.63.159 75.120.243.187 205.135.83.148 230.138.199.127
36.12.221.39 104.30.36.219 117.72.92.28 95.242.113.119
57.90.163.247 184.230.36.15 7.216.104.235 109.104.179.77
46.77.73.225 191.239.225.210 24.223.154.53 90.22.50.115