必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): United States of America (the)

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 114.56.14.147
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 10990
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;114.56.14.147.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025020901 1800 900 604800 86400

;; Query time: 57 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Feb 10 08:34:01 CST 2025
;; MSG SIZE  rcvd: 106
HOST信息:
Host 147.14.56.114.in-addr.arpa not found: 2(SERVFAIL)
NSLOOKUP信息:
;; Got SERVFAIL reply from 183.60.83.19, trying next server
Server:		183.60.82.98
Address:	183.60.82.98#53

** server can't find 147.14.56.114.in-addr.arpa: SERVFAIL

相关IP信息:
最新评论:
IP 类型 评论内容 时间
222.186.15.158 attackspam
Fail2Ban Ban Triggered
2020-01-03 03:45:41
61.69.78.78 attack
Jan  2 16:59:29 game-panel sshd[27454]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.69.78.78
Jan  2 16:59:30 game-panel sshd[27454]: Failed password for invalid user bsd from 61.69.78.78 port 45674 ssh2
Jan  2 17:02:43 game-panel sshd[27596]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.69.78.78
2020-01-03 03:50:32
46.38.144.17 attackbots
Jan  2 20:34:27 relay postfix/smtpd\[5506\]: warning: unknown\[46.38.144.17\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Jan  2 20:35:17 relay postfix/smtpd\[7267\]: warning: unknown\[46.38.144.17\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Jan  2 20:36:01 relay postfix/smtpd\[5506\]: warning: unknown\[46.38.144.17\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Jan  2 20:36:47 relay postfix/smtpd\[28729\]: warning: unknown\[46.38.144.17\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Jan  2 20:37:31 relay postfix/smtpd\[7686\]: warning: unknown\[46.38.144.17\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
...
2020-01-03 03:45:20
185.12.178.11 attackspambots
firewall-block, port(s): 5900/tcp
2020-01-03 04:22:48
159.203.201.86 attack
Portscan or hack attempt detected by psad/fwsnort
2020-01-03 04:21:30
197.254.62.14 attackspambots
spam
2020-01-03 03:44:39
95.78.183.156 attackspambots
Jan  2 15:53:50 herz-der-gamer sshd[15954]: Invalid user gradison from 95.78.183.156 port 36518
Jan  2 15:53:50 herz-der-gamer sshd[15954]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=95.78.183.156
Jan  2 15:53:50 herz-der-gamer sshd[15954]: Invalid user gradison from 95.78.183.156 port 36518
Jan  2 15:53:52 herz-der-gamer sshd[15954]: Failed password for invalid user gradison from 95.78.183.156 port 36518 ssh2
...
2020-01-03 04:16:36
216.10.245.5 attack
Jan  2 20:38:49  sshd[15362]: Failed password for invalid user poh from 216.10.245.5 port 57712 ssh2
2020-01-03 03:44:55
180.76.168.168 attack
2020-01-02T16:06:18.920627abusebot-7.cloudsearch.cf sshd[19820]: Invalid user ronan from 180.76.168.168 port 46720
2020-01-02T16:06:18.927759abusebot-7.cloudsearch.cf sshd[19820]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.76.168.168
2020-01-02T16:06:18.920627abusebot-7.cloudsearch.cf sshd[19820]: Invalid user ronan from 180.76.168.168 port 46720
2020-01-02T16:06:20.486902abusebot-7.cloudsearch.cf sshd[19820]: Failed password for invalid user ronan from 180.76.168.168 port 46720 ssh2
2020-01-02T16:09:50.624527abusebot-7.cloudsearch.cf sshd[20051]: Invalid user demo from 180.76.168.168 port 40968
2020-01-02T16:09:50.629262abusebot-7.cloudsearch.cf sshd[20051]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.76.168.168
2020-01-02T16:09:50.624527abusebot-7.cloudsearch.cf sshd[20051]: Invalid user demo from 180.76.168.168 port 40968
2020-01-02T16:09:52.960835abusebot-7.cloudsearch.cf sshd[20051]: F
...
2020-01-03 04:10:55
51.75.29.61 attackspambots
Jan  2 17:32:59 localhost sshd\[83871\]: Invalid user dequin from 51.75.29.61 port 59526
Jan  2 17:32:59 localhost sshd\[83871\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.75.29.61
Jan  2 17:33:01 localhost sshd\[83871\]: Failed password for invalid user dequin from 51.75.29.61 port 59526 ssh2
Jan  2 17:36:02 localhost sshd\[83967\]: Invalid user webadmin from 51.75.29.61 port 34032
Jan  2 17:36:02 localhost sshd\[83967\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.75.29.61
...
2020-01-03 04:18:48
79.181.208.80 attackspam
Jan  2 20:03:23 serwer sshd\[5573\]: Invalid user NetLinx from 79.181.208.80 port 40894
Jan  2 20:03:23 serwer sshd\[5573\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=79.181.208.80
Jan  2 20:03:25 serwer sshd\[5573\]: Failed password for invalid user NetLinx from 79.181.208.80 port 40894 ssh2
...
2020-01-03 04:11:29
5.83.72.23 attackbotsspam
Automatic report - Banned IP Access
2020-01-03 03:50:58
85.242.242.102 attackbots
$f2bV_matches
2020-01-03 03:49:16
50.204.122.174 attackspambots
postfix (unknown user, SPF fail or relay access denied)
2020-01-03 03:48:08
139.59.84.55 attack
Jan  2 15:52:19 MK-Soft-Root1 sshd[9290]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.84.55 
Jan  2 15:52:21 MK-Soft-Root1 sshd[9290]: Failed password for invalid user lol2 from 139.59.84.55 port 35194 ssh2
...
2020-01-03 04:15:29

最近上报的IP列表

136.102.49.18 57.169.204.221 34.54.0.249 145.236.69.65
172.98.160.186 178.116.125.50 43.78.43.254 250.229.245.139
31.46.188.110 80.158.220.219 152.144.248.54 82.91.38.223
143.85.6.33 130.32.83.62 135.48.135.161 237.161.127.110
201.194.23.250 242.188.109.124 171.137.112.13 126.172.191.159