必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): China

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 114.81.158.31
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 40934
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;114.81.158.31.			IN	A

;; AUTHORITY SECTION:
.			29	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025012200 1800 900 604800 86400

;; Query time: 39 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Jan 22 23:44:37 CST 2025
;; MSG SIZE  rcvd: 106
HOST信息:
Host 31.158.81.114.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 31.158.81.114.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
125.124.30.186 attack
SSH Brute-Force reported by Fail2Ban
2020-02-06 23:54:52
104.248.94.159 attackspambots
SSH authentication failure x 6 reported by Fail2Ban
...
2020-02-06 23:40:23
142.44.240.12 attackbots
Feb  6 13:44:52 ws26vmsma01 sshd[191761]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.44.240.12
Feb  6 13:44:54 ws26vmsma01 sshd[191761]: Failed password for invalid user ech from 142.44.240.12 port 39666 ssh2
...
2020-02-07 00:01:15
122.224.55.101 attack
Feb  6 17:01:32 silence02 sshd[1425]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.224.55.101
Feb  6 17:01:33 silence02 sshd[1425]: Failed password for invalid user aep from 122.224.55.101 port 44302 ssh2
Feb  6 17:05:06 silence02 sshd[1717]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.224.55.101
2020-02-07 00:13:29
14.29.180.58 attackbotsspam
2020-2-6 2:44:58 PM: failed ssh attempt
2020-02-06 23:59:17
45.64.139.234 attack
Sending SPAM email
2020-02-06 23:34:12
49.255.20.158 attack
Feb  6 15:19:18 master sshd[28100]: Failed password for invalid user xeq from 49.255.20.158 port 2584 ssh2
2020-02-06 23:58:32
47.110.149.19 attackbots
Lines containing failures of 47.110.149.19 (max 1000)
Feb  4 09:15:03 Server sshd[14043]: Invalid user student1 from 47.110.149.19 port 29794
Feb  4 09:15:03 Server sshd[14043]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=47.110.149.19
Feb  4 09:15:05 Server sshd[14043]: Failed password for invalid user student1 from 47.110.149.19 port 29794 ssh2


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=47.110.149.19
2020-02-07 00:16:52
165.166.1.242 attackspam
RDP Bruteforce
2020-02-07 00:14:59
103.76.175.130 attack
Feb  6 05:36:51 hpm sshd\[10193\]: Invalid user tan from 103.76.175.130
Feb  6 05:36:51 hpm sshd\[10193\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.76.175.130
Feb  6 05:36:53 hpm sshd\[10193\]: Failed password for invalid user tan from 103.76.175.130 port 34236 ssh2
Feb  6 05:40:50 hpm sshd\[10817\]: Invalid user hon from 103.76.175.130
Feb  6 05:40:50 hpm sshd\[10817\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.76.175.130
2020-02-06 23:55:56
218.92.0.212 attack
$f2bV_matches
2020-02-07 00:21:32
103.43.79.223 attackspam
2020-02-06T14:44:54.9658251240 sshd\[5460\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.43.79.223  user=root
2020-02-06T14:44:57.3537181240 sshd\[5460\]: Failed password for root from 103.43.79.223 port 28920 ssh2
2020-02-06T14:44:59.8725741240 sshd\[5462\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.43.79.223  user=root
...
2020-02-06 23:56:16
199.192.105.249 attackspambots
Feb  6 16:36:41 legacy sshd[27724]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=199.192.105.249
Feb  6 16:36:42 legacy sshd[27724]: Failed password for invalid user zxa from 199.192.105.249 port 50513 ssh2
Feb  6 16:39:59 legacy sshd[27936]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=199.192.105.249
...
2020-02-06 23:43:47
200.217.241.66 attackspambots
Unauthorized connection attempt detected from IP address 200.217.241.66 to port 445
2020-02-07 00:01:46
60.249.188.117 attackspam
Unauthorized connection attempt from IP address 60.249.188.117 on Port 445(SMB)
2020-02-06 23:41:49

最近上报的IP列表

9.32.135.72 6.65.177.36 23.2.47.221 230.174.119.63
76.195.208.224 90.102.55.104 135.95.82.58 135.72.105.206
41.115.70.215 191.200.45.48 180.54.23.153 60.242.207.131
14.142.89.226 38.100.95.70 120.170.204.154 42.223.97.29
25.5.82.200 73.22.110.220 136.240.167.15 174.127.39.86