必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): Taipei

省份(region): Taipei City

国家(country): Taiwan, China

运营商(isp): Chunghwa Telecom Co. Ltd.

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
类型 评论内容 时间
attack
23/tcp 23/tcp
[2020-01-25]2pkt
2020-01-28 04:31:19
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 114.45.138.169
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 6377
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;114.45.138.169.			IN	A

;; AUTHORITY SECTION:
.			495	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2020012701 1800 900 604800 86400

;; Query time: 109 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Jan 28 04:31:16 CST 2020
;; MSG SIZE  rcvd: 118
HOST信息:
169.138.45.114.in-addr.arpa domain name pointer 114-45-138-169.dynamic-ip.hinet.net.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
169.138.45.114.in-addr.arpa	name = 114-45-138-169.dynamic-ip.hinet.net.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
165.232.46.152 attackspam
Fail2Ban Ban Triggered
2020-08-20 19:29:48
212.52.131.9 attack
sshd: Failed password for .... from 212.52.131.9 port 50922 ssh2 (8 attempts)
2020-08-20 19:21:31
122.114.109.220 attackbots
SSH bruteforce
2020-08-20 19:46:33
192.210.192.165 attackspambots
Invalid user mon from 192.210.192.165 port 34040
2020-08-20 19:51:12
150.109.120.253 attackspam
Invalid user glf from 150.109.120.253 port 60636
2020-08-20 19:47:49
103.114.104.68 attackbots
Aug 20 09:09:54 srv-ubuntu-dev3 sshd[79072]: fatal: Unable to negotiate with 103.114.104.68 port 60171: no matching key exchange method found. Their offer: diffie-hellman-group1-sha1 [preauth]
Aug 20 09:09:55 srv-ubuntu-dev3 sshd[79074]: fatal: Unable to negotiate with 103.114.104.68 port 60578: no matching key exchange method found. Their offer: diffie-hellman-group1-sha1 [preauth]
Aug 20 09:09:56 srv-ubuntu-dev3 sshd[79077]: fatal: Unable to negotiate with 103.114.104.68 port 60989: no matching key exchange method found. Their offer: diffie-hellman-group1-sha1 [preauth]
Aug 20 09:09:57 srv-ubuntu-dev3 sshd[79085]: fatal: Unable to negotiate with 103.114.104.68 port 61411: no matching key exchange method found. Their offer: diffie-hellman-group1-sha1 [preauth]
Aug 20 09:09:59 srv-ubuntu-dev3 sshd[79096]: fatal: Unable to negotiate with 103.114.104.68 port 61915: no matching key exchange method found. Their offer: diffie-hellman-group1-sha1 [preauth]
...
2020-08-20 19:31:28
1.179.217.98 attackbots
 TCP (SYN) 1.179.217.98:55937 -> port 445, len 52
2020-08-20 19:14:51
106.12.112.120 attackbotsspam
Aug 20 07:22:49 mail sshd\[43028\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.112.120  user=root
...
2020-08-20 19:27:14
187.190.15.230 attackbots
xmlrpc attack
2020-08-20 19:17:26
2a02:752:0:18::1011 attackbots
xmlrpc attack
2020-08-20 19:33:39
113.92.35.33 attack
Aug 20 08:15:55 cosmoit sshd[16337]: Failed password for root from 113.92.35.33 port 36644 ssh2
2020-08-20 19:11:11
159.65.150.151 attackbots
Cowrie Honeypot: 3 unauthorised SSH/Telnet login attempts between 2020-08-20T11:05:36Z and 2020-08-20T11:20:01Z
2020-08-20 19:27:28
124.206.0.224 attack
2020-08-20T11:42:55.920488ks3355764 sshd[10251]: Invalid user shop1 from 124.206.0.224 port 20617
2020-08-20T11:42:57.633429ks3355764 sshd[10251]: Failed password for invalid user shop1 from 124.206.0.224 port 20617 ssh2
...
2020-08-20 19:23:05
132.232.75.222 attack
10 attempts against mh-pma-try-ban on mist
2020-08-20 19:34:41
51.255.168.254 attack
Invalid user iva from 51.255.168.254 port 36496
2020-08-20 19:21:54

最近上报的IP列表

103.238.165.39 14.32.87.250 175.176.163.220 93.102.91.248
37.89.131.249 64.141.0.0 68.102.227.146 82.181.95.152
112.166.170.235 54.82.61.124 93.102.53.235 5.46.58.247
36.232.25.79 174.102.96.252 84.177.61.229 216.112.66.47
116.195.190.55 189.180.125.154 37.102.190.213 160.131.142.69