必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): Pingtung City

省份(region): Pingtung

国家(country): Taiwan, China

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): Data Communication Business Group

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:

; <<>> DiG 9.10.3-P4-Ubuntu <<>> 114.40.247.149
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 13710
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;114.40.247.149.			IN	A

;; AUTHORITY SECTION:
.			3600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019041600 1800 900 604800 86400

;; Query time: 2 msec
;; SERVER: 67.207.67.3#53(67.207.67.3)
;; WHEN: Wed Apr 17 00:50:29 +08 2019
;; MSG SIZE  rcvd: 118

HOST信息:
149.247.40.114.in-addr.arpa domain name pointer 114-40-247-149.dynamic-ip.hinet.net.
NSLOOKUP信息:
Server:		67.207.67.3
Address:	67.207.67.3#53

Non-authoritative answer:
149.247.40.114.in-addr.arpa	name = 114-40-247-149.dynamic-ip.hinet.net.

Authoritative answers can be found from:

相关IP信息:
最新评论:
IP 类型 评论内容 时间
106.13.6.116 attackbots
Feb 18 04:38:10 auw2 sshd\[20337\]: Invalid user adm from 106.13.6.116
Feb 18 04:38:10 auw2 sshd\[20337\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.6.116
Feb 18 04:38:13 auw2 sshd\[20337\]: Failed password for invalid user adm from 106.13.6.116 port 55204 ssh2
Feb 18 04:40:22 auw2 sshd\[20653\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.6.116  user=root
Feb 18 04:40:24 auw2 sshd\[20653\]: Failed password for root from 106.13.6.116 port 44324 ssh2
2020-02-18 23:09:53
79.137.84.144 attack
2020-02-18T16:14:33.531542  sshd[1344]: Invalid user test from 79.137.84.144 port 44528
2020-02-18T16:14:33.545418  sshd[1344]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=79.137.84.144
2020-02-18T16:14:33.531542  sshd[1344]: Invalid user test from 79.137.84.144 port 44528
2020-02-18T16:14:35.625708  sshd[1344]: Failed password for invalid user test from 79.137.84.144 port 44528 ssh2
...
2020-02-18 23:36:53
179.162.130.17 attackspam
Attempt to attack host OS, exploiting network vulnerabilities, on 18-02-2020 13:25:10.
2020-02-18 23:44:36
103.244.142.189 attackbots
MultiHost/MultiPort Probe, Scan, Hack -
2020-02-18 23:46:52
14.231.148.251 attackbots
Feb 18 14:25:34 grey postfix/smtpd\[25713\]: NOQUEUE: reject: RCPT from unknown\[14.231.148.251\]: 554 5.7.1 Service unavailable\; Client host \[14.231.148.251\] blocked using bl.spamcop.net\; Blocked - see https://www.spamcop.net/bl.shtml\?14.231.148.251\; from=\ to=\ proto=ESMTP helo=\
...
2020-02-18 23:15:59
197.248.38.174 attackspam
trying to access non-authorized port
2020-02-18 23:28:05
71.6.199.23 attackspambots
02/18/2020-08:25:13.913422 71.6.199.23 Protocol: 6 ET CINS Active Threat Intelligence Poor Reputation IP group 71
2020-02-18 23:40:31
219.85.105.148 attackspambots
20/2/18@08:25:02: FAIL: Alarm-Intrusion address from=219.85.105.148
...
2020-02-18 23:52:43
200.69.236.229 attackbotsspam
Feb 18 14:52:57 silence02 sshd[21832]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=200.69.236.229
Feb 18 14:52:59 silence02 sshd[21832]: Failed password for invalid user garet from 200.69.236.229 port 59020 ssh2
Feb 18 14:56:57 silence02 sshd[22033]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=200.69.236.229
2020-02-18 23:11:51
112.85.42.186 attackbotsspam
Feb 18 20:48:04 areeb-Workstation sshd[6655]: Failed password for root from 112.85.42.186 port 43251 ssh2
Feb 18 20:48:08 areeb-Workstation sshd[6655]: Failed password for root from 112.85.42.186 port 43251 ssh2
...
2020-02-18 23:53:59
67.198.188.119 attack
Postfix RBL failed
2020-02-18 23:48:02
92.222.78.178 attack
Feb 18 15:34:22 SilenceServices sshd[15322]: Failed password for root from 92.222.78.178 port 35450 ssh2
Feb 18 15:44:06 SilenceServices sshd[29119]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=92.222.78.178
Feb 18 15:44:08 SilenceServices sshd[29119]: Failed password for invalid user mouse from 92.222.78.178 port 40056 ssh2
2020-02-18 23:13:13
37.29.117.211 attack
1582032338 - 02/18/2020 14:25:38 Host: 37.29.117.211/37.29.117.211 Port: 445 TCP Blocked
2020-02-18 23:11:31
14.253.189.198 attack
Automatic report - Port Scan Attack
2020-02-18 23:33:02
114.32.128.160 attackbots
port scan and connect, tcp 23 (telnet)
2020-02-18 23:14:46

最近上报的IP列表

123.201.70.44 42.114.32.188 186.93.2.254 185.150.8.133
103.216.51.201 58.27.213.10 201.59.18.170 77.57.56.142
218.173.133.230 101.251.197.238 183.87.220.244 118.99.103.124
27.56.10.71 181.198.85.68 103.207.36.202 200.97.23.178
91.230.196.22 98.127.98.176 61.223.138.200 51.158.102.128