必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): Taoyuan District

省份(region): Taoyuan

国家(country): Taiwan, China

运营商(isp): Chunghwa Telecom Co. Ltd.

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
类型 评论内容 时间
attack
Honeypot attack, port: 81, PTR: 114-34-148-67.HINET-IP.hinet.net.
2020-02-21 05:46:18
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 114.34.148.67
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 37958
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;114.34.148.67.			IN	A

;; AUTHORITY SECTION:
.			330	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2020022002 1800 900 604800 86400

;; Query time: 120 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 21 05:46:16 CST 2020
;; MSG SIZE  rcvd: 117
HOST信息:
67.148.34.114.in-addr.arpa domain name pointer 114-34-148-67.HINET-IP.hinet.net.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
67.148.34.114.in-addr.arpa	name = 114-34-148-67.HINET-IP.hinet.net.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
111.246.184.72 attackbotsspam
MultiHost/MultiPort Probe, Scan, Hack -
2020-02-15 19:06:31
111.243.222.172 attackbotsspam
MultiHost/MultiPort Probe, Scan, Hack -
2020-02-15 19:27:37
115.79.33.23 attack
1581742098 - 02/15/2020 05:48:18 Host: 115.79.33.23/115.79.33.23 Port: 445 TCP Blocked
2020-02-15 19:33:24
79.85.2.163 attackbotsspam
Feb 15 05:40:21 ns381471 sshd[9387]: Failed password for root from 79.85.2.163 port 40514 ssh2
Feb 15 05:48:32 ns381471 sshd[9723]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=79.85.2.163
2020-02-15 19:21:14
14.236.147.40 attackspambots
Unauthorized connection attempt from IP address 14.236.147.40 on Port 445(SMB)
2020-02-15 19:31:49
92.188.125.116 attackbots
Feb 15 10:18:20 ovpn sshd\[12460\]: Invalid user public from 92.188.125.116
Feb 15 10:18:20 ovpn sshd\[12460\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=92.188.125.116
Feb 15 10:18:22 ovpn sshd\[12460\]: Failed password for invalid user public from 92.188.125.116 port 40600 ssh2
Feb 15 10:20:11 ovpn sshd\[12921\]: Invalid user test from 92.188.125.116
Feb 15 10:20:11 ovpn sshd\[12921\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=92.188.125.116
2020-02-15 19:00:29
111.243.219.197 attack
MultiHost/MultiPort Probe, Scan, Hack -
2020-02-15 19:37:12
14.231.233.168 attack
Unauthorized connection attempt from IP address 14.231.233.168 on Port 445(SMB)
2020-02-15 19:23:25
219.91.20.87 attack
SSH Bruteforce attempt
2020-02-15 18:58:41
14.238.1.11 attackspam
Unauthorized connection attempt from IP address 14.238.1.11 on Port 445(SMB)
2020-02-15 19:36:45
111.243.220.134 attack
MultiHost/MultiPort Probe, Scan, Hack -
2020-02-15 19:34:51
162.243.129.152 attackbotsspam
" "
2020-02-15 19:30:33
83.246.143.46 attack
unauthorized connection attempt
2020-02-15 19:32:29
201.106.72.10 attackspam
unauthorized connection attempt
2020-02-15 19:26:02
128.199.133.201 attack
Jan  3 01:03:32 ms-srv sshd[10629]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.199.133.201
Jan  3 01:03:34 ms-srv sshd[10629]: Failed password for invalid user gogs from 128.199.133.201 port 59986 ssh2
2020-02-15 19:05:56

最近上报的IP列表

46.98.42.7 144.179.225.101 154.225.247.116 188.188.138.152
24.19.242.82 120.77.157.220 222.117.195.20 176.94.162.14
60.244.155.21 31.42.11.180 184.162.4.228 121.145.129.91
186.250.67.235 111.93.81.147 39.54.74.174 22.54.157.216
183.238.124.35 109.195.139.29 90.3.38.13 191.66.154.180