必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): Hualien City

省份(region): Hualien

国家(country): Taiwan, China

运营商(isp): Chunghwa

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 114.34.198.11
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 45592
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;114.34.198.11.			IN	A

;; AUTHORITY SECTION:
.			592	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022062402 1800 900 604800 86400

;; Query time: 21 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Jun 25 09:22:08 CST 2022
;; MSG SIZE  rcvd: 106
HOST信息:
11.198.34.114.in-addr.arpa domain name pointer 114-34-198-11.hinet-ip.hinet.net.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
11.198.34.114.in-addr.arpa	name = 114-34-198-11.hinet-ip.hinet.net.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
111.182.236.112 attackbotsspam
 TCP (SYN) 111.182.236.112:59424 -> port 23, len 44
2020-06-26 18:54:11
61.177.125.242 attackbotsspam
$f2bV_matches
2020-06-26 18:54:30
103.198.80.104 attack
failed_logins
2020-06-26 18:52:46
101.91.200.186 attackbots
Jun 26 10:11:29 dhoomketu sshd[1046531]: Invalid user postgres from 101.91.200.186 port 38270
Jun 26 10:11:29 dhoomketu sshd[1046531]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=101.91.200.186 
Jun 26 10:11:29 dhoomketu sshd[1046531]: Invalid user postgres from 101.91.200.186 port 38270
Jun 26 10:11:31 dhoomketu sshd[1046531]: Failed password for invalid user postgres from 101.91.200.186 port 38270 ssh2
Jun 26 10:13:49 dhoomketu sshd[1046551]: Invalid user sdtdserver from 101.91.200.186 port 54028
...
2020-06-26 19:00:19
138.204.24.11 attackbots
Jun 26 12:13:31 h2779839 sshd[18878]: Invalid user j from 138.204.24.11 port 58089
Jun 26 12:13:31 h2779839 sshd[18878]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.204.24.11
Jun 26 12:13:31 h2779839 sshd[18878]: Invalid user j from 138.204.24.11 port 58089
Jun 26 12:13:33 h2779839 sshd[18878]: Failed password for invalid user j from 138.204.24.11 port 58089 ssh2
Jun 26 12:17:15 h2779839 sshd[18928]: Invalid user jenkins from 138.204.24.11 port 51917
Jun 26 12:17:15 h2779839 sshd[18928]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.204.24.11
Jun 26 12:17:15 h2779839 sshd[18928]: Invalid user jenkins from 138.204.24.11 port 51917
Jun 26 12:17:17 h2779839 sshd[18928]: Failed password for invalid user jenkins from 138.204.24.11 port 51917 ssh2
Jun 26 12:21:01 h2779839 sshd[18960]: Invalid user apache2 from 138.204.24.11 port 28887
...
2020-06-26 18:35:08
201.132.213.4 attackspambots
<6 unauthorized SSH connections
2020-06-26 18:43:55
40.113.124.250 attack
40.113.124.250 - - [26/Jun/2020:10:37:06 +0200] "POST /wp-login.php HTTP/1.1" 200 3434 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
40.113.124.250 - - [26/Jun/2020:10:37:07 +0200] "POST /wp-login.php HTTP/1.1" 200 3412 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
...
2020-06-26 18:53:06
27.71.95.149 attack
1593143354 - 06/26/2020 05:49:14 Host: 27.71.95.149/27.71.95.149 Port: 445 TCP Blocked
2020-06-26 18:59:34
103.205.143.149 attackbotsspam
Jun 26 10:26:59 vlre-nyc-1 sshd\[14409\]: Invalid user dexter from 103.205.143.149
Jun 26 10:26:59 vlre-nyc-1 sshd\[14409\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.205.143.149
Jun 26 10:27:01 vlre-nyc-1 sshd\[14409\]: Failed password for invalid user dexter from 103.205.143.149 port 52232 ssh2
Jun 26 10:30:50 vlre-nyc-1 sshd\[14490\]: Invalid user qz from 103.205.143.149
Jun 26 10:30:50 vlre-nyc-1 sshd\[14490\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.205.143.149
...
2020-06-26 19:05:18
176.197.5.34 attack
Invalid user tester from 176.197.5.34 port 40652
2020-06-26 19:14:51
49.234.31.158 attackbots
Jun 26 09:20:39 plex sshd[32255]: Failed password for root from 49.234.31.158 port 45246 ssh2
Jun 26 09:22:02 plex sshd[32338]: Invalid user server from 49.234.31.158 port 54580
Jun 26 09:22:02 plex sshd[32338]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.234.31.158
Jun 26 09:22:02 plex sshd[32338]: Invalid user server from 49.234.31.158 port 54580
Jun 26 09:22:04 plex sshd[32338]: Failed password for invalid user server from 49.234.31.158 port 54580 ssh2
2020-06-26 19:08:34
68.183.22.85 attack
Jun 26 12:11:53 dev0-dcde-rnet sshd[6387]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=68.183.22.85
Jun 26 12:11:56 dev0-dcde-rnet sshd[6387]: Failed password for invalid user cd from 68.183.22.85 port 52150 ssh2
Jun 26 12:23:36 dev0-dcde-rnet sshd[6476]: Failed password for root from 68.183.22.85 port 55538 ssh2
2020-06-26 18:45:22
54.184.200.72 attackbotsspam
web attack, ping sweep
2020-06-26 18:50:03
159.65.69.89 attackspambots
2020-06-26T05:53:06.684838bastadge sshd[31799]: Disconnected from invalid user ftp 159.65.69.89 port 49052 [preauth]
...
2020-06-26 19:11:12
114.33.105.127 attackbotsspam
unauthorized connection attempt
2020-06-26 19:12:38

最近上报的IP列表

157.230.35.9 88.45.223.162 137.226.127.44 187.182.173.182
137.226.89.124 45.184.73.114 203.109.17.174 137.226.59.3
187.103.206.54 20.112.103.111 87.151.17.42 206.189.144.174
80.7.160.207 92.242.62.138 188.28.187.164 137.226.192.152
169.229.2.252 137.226.236.136 137.226.45.194 137.226.103.189