必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): Shanghai

国家(country): China

运营商(isp): China Telecom

主机名(hostname): unknown

机构(organization): China Telecom (Group)

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 114.90.139.215
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 63508
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;114.90.139.215.			IN	A

;; AUTHORITY SECTION:
.			3600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019070901 1800 900 604800 86400

;; Query time: 2 msec
;; SERVER: 67.207.67.2#53(67.207.67.2)
;; WHEN: Wed Jul 10 02:33:41 CST 2019
;; MSG SIZE  rcvd: 118
HOST信息:
Host 215.139.90.114.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		67.207.67.2
Address:	67.207.67.2#53

** server can't find 215.139.90.114.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
104.95.50.248 attackbots
SSH login attempts.
2020-07-10 02:55:18
180.151.56.113 attackbots
SSH login attempts.
2020-07-10 02:50:37
218.92.0.171 attackspam
Jul  9 20:59:25 home sshd[10912]: Failed password for root from 218.92.0.171 port 16558 ssh2
Jul  9 20:59:28 home sshd[10912]: Failed password for root from 218.92.0.171 port 16558 ssh2
Jul  9 20:59:32 home sshd[10912]: Failed password for root from 218.92.0.171 port 16558 ssh2
Jul  9 20:59:38 home sshd[10912]: error: maximum authentication attempts exceeded for root from 218.92.0.171 port 16558 ssh2 [preauth]
...
2020-07-10 03:12:00
205.200.88.141 attack
SSH login attempts.
2020-07-10 02:48:55
88.86.103.175 attackbotsspam
SSH login attempts.
2020-07-10 02:53:19
83.102.40.112 attackbotsspam
SSH login attempts.
2020-07-10 03:13:30
50.62.113.1 attackbots
SSH login attempts.
2020-07-10 02:44:38
153.122.152.200 attackbotsspam
SSH login attempts.
2020-07-10 03:02:35
153.122.52.35 attackspam
SSH login attempts.
2020-07-10 02:49:12
81.201.125.167 attack
detected by Fail2Ban
2020-07-10 02:39:28
80.249.144.89 attackbotsspam
Brute force attempt
2020-07-10 03:05:48
159.203.77.59 attack
2020-07-09T07:28:35.429787hostname sshd[19634]: Failed password for invalid user elmar from 159.203.77.59 port 58728 ssh2
...
2020-07-10 03:15:45
156.244.174.153 attackspam
SSH login attempts.
2020-07-10 02:54:55
177.134.172.102 attack
Jul  9 14:12:23 Tower sshd[7758]: Connection from 177.134.172.102 port 44597 on 192.168.10.220 port 22 rdomain ""
Jul  9 14:12:24 Tower sshd[7758]: Invalid user dmsrtime from 177.134.172.102 port 44597
Jul  9 14:12:24 Tower sshd[7758]: error: Could not get shadow information for NOUSER
Jul  9 14:12:24 Tower sshd[7758]: Failed password for invalid user dmsrtime from 177.134.172.102 port 44597 ssh2
Jul  9 14:12:25 Tower sshd[7758]: Received disconnect from 177.134.172.102 port 44597:11: Bye Bye [preauth]
Jul  9 14:12:25 Tower sshd[7758]: Disconnected from invalid user dmsrtime 177.134.172.102 port 44597 [preauth]
2020-07-10 02:45:52
169.239.39.15 attackbotsspam
SSH login attempts.
2020-07-10 03:17:53

最近上报的IP列表

124.191.125.228 45.83.88.42 205.95.247.73 124.152.90.211
63.240.247.144 84.47.100.204 106.137.200.145 164.46.9.146
51.89.134.145 64.101.161.154 173.160.192.63 222.153.46.118
206.110.65.185 45.228.82.47 121.160.44.42 133.66.219.121
222.137.74.148 112.214.171.58 91.52.130.220 53.239.152.33