必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): None

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
IP 类型 评论内容 时间
114.99.11.120 attackbots
postfix
2020-04-16 01:48:18
114.99.11.211 attack
Unauthorized connection attempt detected from IP address 114.99.11.211 to port 6656 [T]
2020-01-30 08:01:12
114.99.115.175 attackbots
Unauthorized connection attempt detected from IP address 114.99.115.175 to port 6656 [T]
2020-01-28 08:53:48
114.99.114.63 attackbotsspam
account brute force by foreign IP
2019-08-06 11:23:37
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 114.99.11.131
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 14297
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;114.99.11.131.			IN	A

;; AUTHORITY SECTION:
.			218	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022030400 1800 900 604800 86400

;; Query time: 20 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Mar 05 01:53:22 CST 2022
;; MSG SIZE  rcvd: 106
HOST信息:
Host 131.11.99.114.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 131.11.99.114.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
182.253.90.40 attackspambots
20/6/10@06:59:36: FAIL: Alarm-Network address from=182.253.90.40
...
2020-06-10 23:58:05
103.54.29.167 attackspam
5x Failed Password
2020-06-10 23:36:40
220.133.159.154 attackspambots
Honeypot attack, port: 81, PTR: 220-133-159-154.HINET-IP.hinet.net.
2020-06-10 23:56:13
106.13.123.29 attackspambots
Jun 10 17:28:54 vmi345603 sshd[17404]: Failed password for root from 106.13.123.29 port 50170 ssh2
...
2020-06-10 23:40:48
103.74.120.171 attackbotsspam
Icarus honeypot on github
2020-06-11 00:01:47
89.187.178.171 attackbotsspam
1,83-01/03 [bc01/m20] PostRequest-Spammer scoring: maputo01_x2b
2020-06-10 23:52:01
187.243.6.106 attack
$f2bV_matches
2020-06-10 23:46:10
106.12.77.32 attackspambots
Jun 10 15:18:31 lukav-desktop sshd\[21065\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.77.32  user=root
Jun 10 15:18:33 lukav-desktop sshd\[21065\]: Failed password for root from 106.12.77.32 port 41614 ssh2
Jun 10 15:22:48 lukav-desktop sshd\[21164\]: Invalid user gujarat from 106.12.77.32
Jun 10 15:22:48 lukav-desktop sshd\[21164\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.77.32
Jun 10 15:22:50 lukav-desktop sshd\[21164\]: Failed password for invalid user gujarat from 106.12.77.32 port 33742 ssh2
2020-06-10 23:56:28
185.176.27.54 attackspambots
06/10/2020-11:36:45.824167 185.176.27.54 Protocol: 6 ET DROP Dshield Block Listed Source group 1
2020-06-10 23:42:03
106.12.161.86 attack
Jun 10 14:46:20 vps sshd[518242]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.161.86
Jun 10 14:46:21 vps sshd[518242]: Failed password for invalid user toto from 106.12.161.86 port 59334 ssh2
Jun 10 14:55:36 vps sshd[558050]: Invalid user deb from 106.12.161.86 port 33062
Jun 10 14:55:36 vps sshd[558050]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.161.86
Jun 10 14:55:38 vps sshd[558050]: Failed password for invalid user deb from 106.12.161.86 port 33062 ssh2
...
2020-06-11 00:05:49
46.165.139.150 attack
Automatic report - Port Scan Attack
2020-06-10 23:46:40
222.186.15.62 attackspambots
nginx/honey/a4a6f
2020-06-10 23:39:15
80.213.238.67 attackbots
Jun 10 15:20:30 serwer sshd\[18722\]: Invalid user postgres from 80.213.238.67 port 55672
Jun 10 15:20:30 serwer sshd\[18722\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=80.213.238.67
Jun 10 15:20:32 serwer sshd\[18722\]: Failed password for invalid user postgres from 80.213.238.67 port 55672 ssh2
...
2020-06-10 23:30:09
202.162.217.173 attack
20/6/10@06:59:40: FAIL: Alarm-Network address from=202.162.217.173
...
2020-06-10 23:51:32
106.13.210.71 attack
Jun 10 14:02:08 abendstille sshd\[1327\]: Invalid user pgsql from 106.13.210.71
Jun 10 14:02:08 abendstille sshd\[1327\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.210.71
Jun 10 14:02:10 abendstille sshd\[1327\]: Failed password for invalid user pgsql from 106.13.210.71 port 34788 ssh2
Jun 10 14:05:06 abendstille sshd\[4365\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.210.71  user=root
Jun 10 14:05:08 abendstille sshd\[4365\]: Failed password for root from 106.13.210.71 port 51252 ssh2
...
2020-06-11 00:00:17

最近上报的IP列表

112.66.213.140 112.66.213.168 112.66.213.169 112.66.213.180
112.66.213.187 112.66.213.199 112.66.213.20 112.66.213.186
112.66.213.255 112.66.213.43 112.66.213.53 112.66.213.70
112.66.213.37 112.66.213.74 112.66.213.90 114.99.11.132
112.66.214.106 112.66.214.146 112.66.214.15 114.99.11.134