必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): China

运营商(isp): ChinaNet Anhui Province Network

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
类型 评论内容 时间
attackspam
Unauthorized connection attempt detected from IP address 114.99.247.139 to port 23 [T]
2020-04-11 20:10:43
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 114.99.247.139
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 12403
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;114.99.247.139.			IN	A

;; AUTHORITY SECTION:
.			254	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2020041100 1800 900 604800 86400

;; Query time: 96 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Apr 11 20:10:27 CST 2020
;; MSG SIZE  rcvd: 118
HOST信息:
Host 139.247.99.114.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 139.247.99.114.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
100.26.11.51 attackbots
Automatic report - Banned IP Access
2020-07-05 14:40:07
128.199.188.42 attackspambots
Unauthorized connection attempt detected from IP address 128.199.188.42 to port 5798
2020-07-05 14:42:57
167.71.140.30 attackbots
167.71.140.30 - - [05/Jul/2020:06:53:33 +0100] "POST /wp-login.php HTTP/1.1" 200 2261 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
167.71.140.30 - - [05/Jul/2020:06:53:35 +0100] "POST /wp-login.php HTTP/1.1" 200 2234 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
167.71.140.30 - - [05/Jul/2020:06:53:35 +0100] "POST /xmlrpc.php HTTP/1.1" 403 219 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
...
2020-07-05 14:25:35
218.240.137.68 attackbots
Invalid user siteadmin from 218.240.137.68 port 14796
2020-07-05 14:45:12
223.204.249.203 attackspam
"XSS Attack Detected via libinjection - Matched Data: XSS data found within ARGS_NAMES:
2020-07-05 14:40:44
61.177.172.61 attackbots
Jul  5 08:06:25 ns381471 sshd[23916]: Failed password for root from 61.177.172.61 port 62994 ssh2
Jul  5 08:06:38 ns381471 sshd[23916]: Failed password for root from 61.177.172.61 port 62994 ssh2
Jul  5 08:06:38 ns381471 sshd[23916]: error: maximum authentication attempts exceeded for root from 61.177.172.61 port 62994 ssh2 [preauth]
2020-07-05 14:08:22
106.12.95.45 attackspam
Jul  5 11:25:41 webhost01 sshd[15140]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.95.45
Jul  5 11:25:43 webhost01 sshd[15140]: Failed password for invalid user aps from 106.12.95.45 port 60096 ssh2
...
2020-07-05 14:36:01
77.222.132.189 attackbots
2020-07-05T08:29:35.521764sd-86998 sshd[25752]: Invalid user www-data from 77.222.132.189 port 52422
2020-07-05T08:29:35.527264sd-86998 sshd[25752]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=77.222.132.189
2020-07-05T08:29:35.521764sd-86998 sshd[25752]: Invalid user www-data from 77.222.132.189 port 52422
2020-07-05T08:29:37.510264sd-86998 sshd[25752]: Failed password for invalid user www-data from 77.222.132.189 port 52422 ssh2
2020-07-05T08:32:44.826312sd-86998 sshd[26170]: Invalid user payment from 77.222.132.189 port 49284
...
2020-07-05 14:41:19
201.132.119.2 attackbotsspam
Jul  5 07:34:13 inter-technics sshd[8704]: Invalid user zabbix from 201.132.119.2 port 5966
Jul  5 07:34:13 inter-technics sshd[8704]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=201.132.119.2
Jul  5 07:34:13 inter-technics sshd[8704]: Invalid user zabbix from 201.132.119.2 port 5966
Jul  5 07:34:15 inter-technics sshd[8704]: Failed password for invalid user zabbix from 201.132.119.2 port 5966 ssh2
Jul  5 07:37:17 inter-technics sshd[8923]: Invalid user avendoria from 201.132.119.2 port 55160
...
2020-07-05 14:15:47
141.98.9.153 attackbots
Unauthorized connection attempt detected from IP address 141.98.9.153 to port 4345 [T]
2020-07-05 14:43:16
138.197.210.82 attack
"fail2ban match"
2020-07-05 14:20:28
76.68.63.123 attackspambots
Automatic report - Port Scan Attack
2020-07-05 14:30:08
138.197.151.129 attack
Jul  5 05:53:11 scw-tender-jepsen sshd[19446]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.197.151.129
Jul  5 05:53:13 scw-tender-jepsen sshd[19446]: Failed password for invalid user lfy from 138.197.151.129 port 42516 ssh2
2020-07-05 14:35:44
164.90.185.155 attack
Jul  4 21:42:59 XXX sshd[16213]: User r.r from 164.90.185.155 not allowed because none of user's groups are listed in AllowGroups
Jul  4 21:42:59 XXX sshd[16213]: Received disconnect from 164.90.185.155: 11: Bye Bye [preauth]
Jul  4 21:42:59 XXX sshd[16215]: Invalid user admin from 164.90.185.155
Jul  4 21:42:59 XXX sshd[16215]: Received disconnect from 164.90.185.155: 11: Bye Bye [preauth]
Jul  4 21:42:59 XXX sshd[16217]: Invalid user user from 164.90.185.155
Jul  4 21:42:59 XXX sshd[16217]: Received disconnect from 164.90.185.155: 11: Bye Bye [preauth]
Jul  4 21:42:59 XXX sshd[16219]: Invalid user ubnt from 164.90.185.155
Jul  4 21:42:59 XXX sshd[16219]: Received disconnect from 164.90.185.155: 11: Bye Bye [preauth]
Jul  4 21:43:00 XXX sshd[16221]: Invalid user admin from 164.90.185.155
Jul  4 21:43:00 XXX sshd[16221]: Received disconnect from 164.90.185.155: 11: Bye Bye [preauth]
Jul  4 21:43:00 XXX sshd[16223]: Invalid user guest from 164.90.185.155
Jul  4 21:43:00 ........
-------------------------------
2020-07-05 14:13:23
103.14.33.229 attack
Jul  5 06:43:39 h2779839 sshd[24315]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.14.33.229  user=root
Jul  5 06:43:41 h2779839 sshd[24315]: Failed password for root from 103.14.33.229 port 45630 ssh2
Jul  5 06:46:46 h2779839 sshd[24371]: Invalid user ftp from 103.14.33.229 port 60464
Jul  5 06:46:46 h2779839 sshd[24371]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.14.33.229
Jul  5 06:46:46 h2779839 sshd[24371]: Invalid user ftp from 103.14.33.229 port 60464
Jul  5 06:46:48 h2779839 sshd[24371]: Failed password for invalid user ftp from 103.14.33.229 port 60464 ssh2
Jul  5 06:49:58 h2779839 sshd[24394]: Invalid user wangjing from 103.14.33.229 port 47070
Jul  5 06:49:58 h2779839 sshd[24394]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.14.33.229
Jul  5 06:49:58 h2779839 sshd[24394]: Invalid user wangjing from 103.14.33.229 port 47070
Jul  5 06:5
...
2020-07-05 14:23:47

最近上报的IP列表

111.231.52.208 51.15.155.111 60.169.208.5 27.255.246.13
38.135.39.41 178.93.22.39 222.252.20.146 102.142.59.94
61.191.85.222 141.68.71.72 56.147.19.102 146.22.123.5
39.40.49.72 219.233.49.254 52.164.203.103 119.188.246.167
60.174.233.174 51.16.167.6 49.232.24.193 176.32.16.112