必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): China

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 114.55.157.23
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 22443
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;114.55.157.23.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025012401 1800 900 604800 86400

;; Query time: 64 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Jan 25 01:55:34 CST 2025
;; MSG SIZE  rcvd: 106
HOST信息:
Host 23.157.55.114.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 23.157.55.114.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
122.155.223.58 attack
SSH Invalid Login
2020-05-09 19:01:44
133.242.155.85 attack
...
2020-05-09 19:03:43
35.222.113.21 attack
Unauthorized access to SSH at 9/May/2020:01:32:29 +0000.
2020-05-09 18:26:58
150.109.82.109 attack
May  9 05:30:01 lukav-desktop sshd\[18630\]: Invalid user geng from 150.109.82.109
May  9 05:30:01 lukav-desktop sshd\[18630\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=150.109.82.109
May  9 05:30:03 lukav-desktop sshd\[18630\]: Failed password for invalid user geng from 150.109.82.109 port 40410 ssh2
May  9 05:35:53 lukav-desktop sshd\[18747\]: Invalid user alma from 150.109.82.109
May  9 05:35:53 lukav-desktop sshd\[18747\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=150.109.82.109
2020-05-09 18:51:23
198.108.67.18 attack
May  8 21:02:41 debian-2gb-nbg1-2 kernel: \[11223441.547421\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=198.108.67.18 DST=195.201.40.59 LEN=40 TOS=0x00 PREC=0x00 TTL=32 ID=63489 PROTO=TCP SPT=18462 DPT=2 WINDOW=1024 RES=0x00 SYN URGP=0
2020-05-09 19:01:14
140.143.230.148 attack
LAMP,DEF GET /wp-login.php
2020-05-09 18:31:48
59.188.2.19 attack
May  9 04:44:15 legacy sshd[7466]: Failed password for root from 59.188.2.19 port 53238 ssh2
May  9 04:47:56 legacy sshd[7548]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=59.188.2.19
May  9 04:47:58 legacy sshd[7548]: Failed password for invalid user labuser from 59.188.2.19 port 55269 ssh2
...
2020-05-09 18:38:42
165.22.252.109 attack
2020-05-09T00:22:51.626892abusebot-5.cloudsearch.cf sshd[25909]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.22.252.109  user=root
2020-05-09T00:22:53.578693abusebot-5.cloudsearch.cf sshd[25909]: Failed password for root from 165.22.252.109 port 20188 ssh2
2020-05-09T00:25:09.438106abusebot-5.cloudsearch.cf sshd[25912]: Invalid user antonio from 165.22.252.109 port 54292
2020-05-09T00:25:09.445831abusebot-5.cloudsearch.cf sshd[25912]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.22.252.109
2020-05-09T00:25:09.438106abusebot-5.cloudsearch.cf sshd[25912]: Invalid user antonio from 165.22.252.109 port 54292
2020-05-09T00:25:11.673834abusebot-5.cloudsearch.cf sshd[25912]: Failed password for invalid user antonio from 165.22.252.109 port 54292 ssh2
2020-05-09T00:27:23.965559abusebot-5.cloudsearch.cf sshd[25917]: Invalid user ridzwan from 165.22.252.109 port 24427
...
2020-05-09 19:09:31
192.82.65.72 attack
Unauthorized connection attempt from IP address 192.82.65.72 on Port 445(SMB)
2020-05-09 18:44:30
89.97.218.142 attack
2020-05-09T02:48:19.944954shield sshd\[2775\]: Invalid user ubuntu from 89.97.218.142 port 60092
2020-05-09T02:48:19.949177shield sshd\[2775\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=89-97-218-142.ip19.fastwebnet.it
2020-05-09T02:48:21.776809shield sshd\[2775\]: Failed password for invalid user ubuntu from 89.97.218.142 port 60092 ssh2
2020-05-09T02:52:04.297356shield sshd\[3366\]: Invalid user amp from 89.97.218.142 port 41356
2020-05-09T02:52:04.301010shield sshd\[3366\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=89-97-218-142.ip19.fastwebnet.it
2020-05-09 18:40:41
51.91.212.81 attackbotsspam
From CCTV User Interface Log
...::ffff:51.91.212.81 - - [08/May/2020:22:41:37 +0000] "-" 400 179
...
2020-05-09 18:42:55
66.249.69.149 attackbotsspam
WEB_SERVER 403 Forbidden
2020-05-09 19:08:35
206.189.73.164 attackspambots
May  9 04:39:39 ns381471 sshd[22114]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=206.189.73.164
May  9 04:39:40 ns381471 sshd[22114]: Failed password for invalid user dlm from 206.189.73.164 port 39286 ssh2
2020-05-09 18:59:18
106.13.203.171 attackbotsspam
May  9 09:37:00 webhost01 sshd[14411]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.203.171
May  9 09:37:03 webhost01 sshd[14411]: Failed password for invalid user mongodb from 106.13.203.171 port 14182 ssh2
...
2020-05-09 18:26:33
51.91.249.178 attackbots
May  9 04:42:18 ns381471 sshd[22224]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.91.249.178
May  9 04:42:20 ns381471 sshd[22224]: Failed password for invalid user angelica from 51.91.249.178 port 57144 ssh2
2020-05-09 18:55:20

最近上报的IP列表

78.166.235.101 220.70.34.109 252.12.153.197 4.210.46.176
129.121.159.137 235.246.14.5 244.183.243.159 141.5.151.108
227.4.174.172 56.43.189.121 49.41.179.39 143.178.67.186
79.140.180.224 188.12.204.133 247.41.98.79 9.149.107.0
41.113.187.153 12.138.203.217 237.221.226.149 20.147.162.209