必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): None

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 114.97.214.40
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 14538
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;114.97.214.40.			IN	A

;; AUTHORITY SECTION:
.			363	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022030400 1800 900 604800 86400

;; Query time: 18 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Mar 05 03:36:04 CST 2022
;; MSG SIZE  rcvd: 106
HOST信息:
Host 40.214.97.114.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 40.214.97.114.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
183.221.243.216 attackspam
May 11 05:55:20 ns381471 sshd[13218]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=183.221.243.216
May 11 05:55:22 ns381471 sshd[13218]: Failed password for invalid user oracle from 183.221.243.216 port 57656 ssh2
2020-05-11 13:14:49
91.121.2.33 attack
ssh brute force
2020-05-11 12:57:00
79.137.254.51 attackspam
LAV,DEF GET /en//wp-includes/wlwmanifest.xml
2020-05-11 13:12:23
14.251.119.100 attack
Unauthorised access (May 11) SRC=14.251.119.100 LEN=52 TTL=108 ID=9484 DF TCP DPT=445 WINDOW=8192 SYN
2020-05-11 12:59:28
51.91.97.153 attackspam
May 11 06:38:35 PorscheCustomer sshd[10561]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.91.97.153
May 11 06:38:37 PorscheCustomer sshd[10561]: Failed password for invalid user plover from 51.91.97.153 port 45442 ssh2
May 11 06:42:23 PorscheCustomer sshd[10743]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.91.97.153
...
2020-05-11 12:50:11
117.6.97.138 attackbots
20 attempts against mh-ssh on cloud
2020-05-11 12:35:39
206.189.202.165 attackspam
May 11 05:46:36 DAAP sshd[25127]: Invalid user joshua from 206.189.202.165 port 34958
May 11 05:46:36 DAAP sshd[25127]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=206.189.202.165
May 11 05:46:36 DAAP sshd[25127]: Invalid user joshua from 206.189.202.165 port 34958
May 11 05:46:38 DAAP sshd[25127]: Failed password for invalid user joshua from 206.189.202.165 port 34958 ssh2
May 11 05:55:28 DAAP sshd[25220]: Invalid user user from 206.189.202.165 port 55156
...
2020-05-11 13:08:33
121.63.17.157 attackbots
Port probing on unauthorized port 23
2020-05-11 13:01:29
202.77.105.100 attack
2020-05-11T04:22:25.257689shield sshd\[28240\]: Invalid user recepcao from 202.77.105.100 port 33802
2020-05-11T04:22:25.261387shield sshd\[28240\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=202.77.105.100
2020-05-11T04:22:27.611457shield sshd\[28240\]: Failed password for invalid user recepcao from 202.77.105.100 port 33802 ssh2
2020-05-11T04:31:21.114008shield sshd\[30333\]: Invalid user plex from 202.77.105.100 port 40523
2020-05-11T04:31:21.117692shield sshd\[30333\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=202.77.105.100
2020-05-11 13:13:32
49.232.165.42 attackspambots
May 11 04:09:38 game-panel sshd[2458]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.232.165.42
May 11 04:09:40 game-panel sshd[2458]: Failed password for invalid user admin1 from 49.232.165.42 port 54490 ssh2
May 11 04:14:10 game-panel sshd[2675]: Failed password for root from 49.232.165.42 port 49212 ssh2
2020-05-11 12:35:16
83.48.89.147 attackbotsspam
2020-05-11T13:40:00.721517vivaldi2.tree2.info sshd[31160]: Invalid user jenkins from 83.48.89.147
2020-05-11T13:40:00.738489vivaldi2.tree2.info sshd[31160]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=147.red-83-48-89.staticip.rima-tde.net
2020-05-11T13:40:00.721517vivaldi2.tree2.info sshd[31160]: Invalid user jenkins from 83.48.89.147
2020-05-11T13:40:02.591517vivaldi2.tree2.info sshd[31160]: Failed password for invalid user jenkins from 83.48.89.147 port 32947 ssh2
2020-05-11T13:43:38.272054vivaldi2.tree2.info sshd[31358]: Invalid user alberto from 83.48.89.147
...
2020-05-11 12:44:49
111.229.48.141 attackspambots
Brute force attempt
2020-05-11 12:49:49
152.136.76.230 attackbots
2020-05-10T21:55:45.250255linuxbox-skyline sshd[79623]: Invalid user light from 152.136.76.230 port 42249
...
2020-05-11 12:51:41
103.48.192.48 attackspambots
May 11 06:59:02 h2779839 sshd[5930]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.48.192.48  user=root
May 11 06:59:04 h2779839 sshd[5930]: Failed password for root from 103.48.192.48 port 20483 ssh2
May 11 07:03:04 h2779839 sshd[6036]: Invalid user t from 103.48.192.48 port 53584
May 11 07:03:04 h2779839 sshd[6036]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.48.192.48
May 11 07:03:04 h2779839 sshd[6036]: Invalid user t from 103.48.192.48 port 53584
May 11 07:03:06 h2779839 sshd[6036]: Failed password for invalid user t from 103.48.192.48 port 53584 ssh2
May 11 07:06:59 h2779839 sshd[6085]: Invalid user zabbix from 103.48.192.48 port 30182
May 11 07:06:59 h2779839 sshd[6085]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.48.192.48
May 11 07:06:59 h2779839 sshd[6085]: Invalid user zabbix from 103.48.192.48 port 30182
May 11 07:07:01 h2779839 sshd[
...
2020-05-11 13:20:09
157.245.221.244 attack
May 11 05:44:58 server sshd[28610]: Failed password for invalid user saman from 157.245.221.244 port 38306 ssh2
May 11 05:52:51 server sshd[34295]: Failed password for root from 157.245.221.244 port 33942 ssh2
May 11 05:55:45 server sshd[36815]: Failed password for invalid user lt from 157.245.221.244 port 60952 ssh2
2020-05-11 12:51:13

最近上报的IP列表

115.225.33.50 114.97.214.30 114.97.214.41 114.97.214.43
114.97.214.46 114.97.214.44 114.97.214.48 114.97.214.50
114.97.214.53 114.97.215.242 115.225.33.76 114.97.215.247
114.97.215.250 114.97.215.248 114.97.215.254 114.97.215.244
114.97.215.26 114.97.215.30 114.97.215.28 114.97.215.32