必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): Taiwan (Province of China)

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 114.39.111.159
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 38765
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;114.39.111.159.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025012901 1800 900 604800 86400

;; Query time: 14 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Jan 30 02:48:32 CST 2025
;; MSG SIZE  rcvd: 107
HOST信息:
159.111.39.114.in-addr.arpa domain name pointer 114-39-111-159.dynamic-ip.hinet.net.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
159.111.39.114.in-addr.arpa	name = 114-39-111-159.dynamic-ip.hinet.net.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
122.160.175.51 attackbotsspam
Port 1433 Scan
2019-11-26 20:16:18
61.177.172.158 attackbotsspam
2019-11-26T11:33:26.611140hub.schaetter.us sshd\[24584\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.172.158  user=root
2019-11-26T11:33:28.618463hub.schaetter.us sshd\[24584\]: Failed password for root from 61.177.172.158 port 15131 ssh2
2019-11-26T11:33:30.796157hub.schaetter.us sshd\[24584\]: Failed password for root from 61.177.172.158 port 15131 ssh2
2019-11-26T11:33:33.059550hub.schaetter.us sshd\[24584\]: Failed password for root from 61.177.172.158 port 15131 ssh2
2019-11-26T11:33:49.056347hub.schaetter.us sshd\[24588\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.172.158  user=root
...
2019-11-26 19:54:11
112.6.231.114 attackspambots
Nov 26 12:22:26 ovpn sshd\[31798\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.6.231.114  user=root
Nov 26 12:22:28 ovpn sshd\[31798\]: Failed password for root from 112.6.231.114 port 39678 ssh2
Nov 26 12:37:14 ovpn sshd\[3889\]: Invalid user admin from 112.6.231.114
Nov 26 12:37:14 ovpn sshd\[3889\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.6.231.114
Nov 26 12:37:16 ovpn sshd\[3889\]: Failed password for invalid user admin from 112.6.231.114 port 19100 ssh2
2019-11-26 19:48:53
213.32.91.37 attackbots
Nov 26 04:59:19 linuxvps sshd\[48634\]: Invalid user poiuyt from 213.32.91.37
Nov 26 04:59:19 linuxvps sshd\[48634\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=213.32.91.37
Nov 26 04:59:22 linuxvps sshd\[48634\]: Failed password for invalid user poiuyt from 213.32.91.37 port 57364 ssh2
Nov 26 05:05:17 linuxvps sshd\[52259\]: Invalid user rom from 213.32.91.37
Nov 26 05:05:17 linuxvps sshd\[52259\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=213.32.91.37
2019-11-26 20:10:35
168.243.91.19 attack
Nov 26 07:37:32 markkoudstaal sshd[17413]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=168.243.91.19
Nov 26 07:37:34 markkoudstaal sshd[17413]: Failed password for invalid user lewison from 168.243.91.19 port 37583 ssh2
Nov 26 07:44:40 markkoudstaal sshd[18172]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=168.243.91.19
2019-11-26 19:45:22
103.255.146.154 attackbots
Nov 26 00:22:50 php1 sshd\[8361\]: Invalid user ftpuser222 from 103.255.146.154
Nov 26 00:22:50 php1 sshd\[8361\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.255.146.154
Nov 26 00:22:52 php1 sshd\[8361\]: Failed password for invalid user ftpuser222 from 103.255.146.154 port 43400 ssh2
Nov 26 00:31:08 php1 sshd\[9021\]: Invalid user darsin from 103.255.146.154
Nov 26 00:31:08 php1 sshd\[9021\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.255.146.154
2019-11-26 19:58:36
209.235.67.49 attackbots
Nov 26 13:13:25 server sshd\[15068\]: Invalid user catalina from 209.235.67.49
Nov 26 13:13:25 server sshd\[15068\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=209.235.67.49 
Nov 26 13:13:27 server sshd\[15068\]: Failed password for invalid user catalina from 209.235.67.49 port 46743 ssh2
Nov 26 13:28:04 server sshd\[18680\]: Invalid user guest from 209.235.67.49
Nov 26 13:28:04 server sshd\[18680\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=209.235.67.49 
...
2019-11-26 20:12:31
71.6.167.142 attackspam
Port scan: Attack repeated for 24 hours
2019-11-26 20:00:28
65.26.208.234 attack
TCP Port Scanning
2019-11-26 20:18:20
34.84.103.120 attackbots
MYH,DEF GET /wp-login.php
2019-11-26 19:46:35
118.70.126.245 attackbots
Unauthorised access (Nov 26) SRC=118.70.126.245 LEN=52 TTL=109 ID=7463 DF TCP DPT=1433 WINDOW=8192 SYN
2019-11-26 19:53:44
201.80.108.83 attack
Nov 26 08:11:57 web8 sshd\[7645\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=201.80.108.83  user=root
Nov 26 08:11:59 web8 sshd\[7645\]: Failed password for root from 201.80.108.83 port 32336 ssh2
Nov 26 08:16:33 web8 sshd\[10095\]: Invalid user temp from 201.80.108.83
Nov 26 08:16:33 web8 sshd\[10095\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=201.80.108.83
Nov 26 08:16:36 web8 sshd\[10095\]: Failed password for invalid user temp from 201.80.108.83 port 31257 ssh2
2019-11-26 20:02:03
221.150.22.201 attackspam
Nov 26 11:17:22 game-panel sshd[30659]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=221.150.22.201
Nov 26 11:17:24 game-panel sshd[30659]: Failed password for invalid user clamav from 221.150.22.201 port 23894 ssh2
Nov 26 11:24:50 game-panel sshd[30849]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=221.150.22.201
2019-11-26 19:39:02
172.69.34.165 attackbots
Wordpress XMLRPC attack
2019-11-26 19:55:31
23.92.225.228 attackspambots
pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=23.92.225.228  user=backup
Failed password for backup from 23.92.225.228 port 39612 ssh2
Invalid user yawming from 23.92.225.228 port 57490
pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=23.92.225.228
Failed password for invalid user yawming from 23.92.225.228 port 57490 ssh2
2019-11-26 19:44:44

最近上报的IP列表

253.190.71.177 221.59.86.209 171.205.217.124 190.226.222.205
237.14.176.182 19.127.2.93 204.61.31.191 175.40.243.127
77.83.213.150 187.86.128.0 59.18.149.196 54.137.116.59
99.12.2.241 48.112.185.90 175.23.97.161 148.155.26.221
85.200.143.228 153.91.245.43 164.223.33.236 211.162.18.174