必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): Shanghai

国家(country): China

运营商(isp): China Telecom

主机名(hostname): unknown

机构(organization): China Telecom (Group)

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 114.90.140.96
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 57434
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;114.90.140.96.			IN	A

;; AUTHORITY SECTION:
.			3600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019071800 1800 900 604800 86400

;; Query time: 2 msec
;; SERVER: 67.207.67.2#53(67.207.67.2)
;; WHEN: Fri Jul 19 01:04:06 CST 2019
;; MSG SIZE  rcvd: 117
HOST信息:
Host 96.140.90.114.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		67.207.67.2
Address:	67.207.67.2#53

** server can't find 96.140.90.114.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
223.240.111.5 attackspambots
Brute force SMTP login attempted.
...
2020-03-31 01:11:35
113.1.40.18 attackbotsspam
(ftpd) Failed FTP login from 113.1.40.18 (CN/China/-): 1 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_TRIGGER; Logs: Mar 30 18:25:11 ir1 pure-ftpd: (?@113.1.40.18) [WARNING] Authentication failed for user [anonymous]
2020-03-31 01:28:34
183.236.187.134 attackbots
Unauthorised access (Mar 30) SRC=183.236.187.134 LEN=40 TTL=50 ID=10820 TCP DPT=23 WINDOW=38901 SYN
2020-03-31 01:21:27
223.240.84.196 attack
Brute force SMTP login attempted.
...
2020-03-31 01:02:52
77.37.205.54 attack
Brute force attack against VPN service
2020-03-31 01:00:00
189.214.24.108 attackbotsspam
Automatic report - Port Scan Attack
2020-03-31 00:52:02
104.148.40.78 attackspam
port
2020-03-31 01:25:02
192.241.166.199 attackbots
Mar 30 15:55:54 debian-2gb-nbg1-2 kernel: \[7835611.709828\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=192.241.166.199 DST=195.201.40.59 LEN=44 TOS=0x00 PREC=0x00 TTL=54 ID=0 DF PROTO=TCP SPT=22 DPT=7932 WINDOW=29200 RES=0x00 ACK SYN URGP=0
2020-03-31 00:36:20
223.247.223.194 attackbots
Brute force SMTP login attempted.
...
2020-03-31 00:47:45
150.116.36.102 attackbotsspam
Honeypot attack, port: 445, PTR: 102-36-116-150-static.chief.net.tw.
2020-03-31 00:38:39
223.241.247.214 attackspambots
Brute force SMTP login attempted.
...
2020-03-31 00:58:31
222.186.31.83 attack
v+ssh-bruteforce
2020-03-31 01:27:15
80.210.19.156 attackspam
Honeypot attack, port: 5555, PTR: PTR record not found
2020-03-31 00:45:43
138.36.99.176 attackspambots
(sshd) Failed SSH login from 138.36.99.176 (AR/Argentina/138-36-99-176.reduno.com.ar): 5 in the last 3600 secs
2020-03-31 01:21:40
5.101.219.153 attack
B: Magento admin pass test (wrong country)
2020-03-31 01:15:35

最近上报的IP列表

2003:c0:5f25:8538:ddc1:f32b:f497:88f 201.210.149.75 170.145.218.205 183.89.26.203
112.107.236.248 60.149.251.150 37.175.152.86 178.190.185.33
105.227.247.193 58.240.245.147 218.177.179.80 43.249.83.16
66.87.151.99 75.21.218.158 81.173.49.96 31.252.66.75
89.210.24.127 2a02:560:4244:300:40be:6550:b5cb:ee7b 220.45.80.247 104.24.126.75