必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): China

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 114.99.85.48
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 44208
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;114.99.85.48.			IN	A

;; AUTHORITY SECTION:
.			113	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022030501 1800 900 604800 86400

;; Query time: 24 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Mar 06 11:16:58 CST 2022
;; MSG SIZE  rcvd: 105
HOST信息:
Host 48.85.99.114.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 48.85.99.114.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
50.64.152.76 attackbots
Aug 31 12:05:47 php2 sshd\[9570\]: Invalid user john from 50.64.152.76
Aug 31 12:05:47 php2 sshd\[9570\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=s0106bc9b68acafab.vc.shawcable.net
Aug 31 12:05:49 php2 sshd\[9570\]: Failed password for invalid user john from 50.64.152.76 port 36398 ssh2
Aug 31 12:09:57 php2 sshd\[10055\]: Invalid user hduser from 50.64.152.76
Aug 31 12:09:57 php2 sshd\[10055\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=s0106bc9b68acafab.vc.shawcable.net
2019-09-01 06:19:42
45.55.224.209 attack
Aug 31 12:05:01 auw2 sshd\[31517\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.55.224.209  user=root
Aug 31 12:05:03 auw2 sshd\[31517\]: Failed password for root from 45.55.224.209 port 35440 ssh2
Aug 31 12:09:52 auw2 sshd\[32072\]: Invalid user yamamoto from 45.55.224.209
Aug 31 12:09:52 auw2 sshd\[32072\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.55.224.209
Aug 31 12:09:54 auw2 sshd\[32072\]: Failed password for invalid user yamamoto from 45.55.224.209 port 57788 ssh2
2019-09-01 06:23:45
117.68.197.99 attackspam
Aug3113:28:20server4pure-ftpd:\(\?@121.13.237.38\)[WARNING]Authenticationfailedforuser[www]Aug3113:28:24server4pure-ftpd:\(\?@121.13.237.38\)[WARNING]Authenticationfailedforuser[www]Aug3112:39:36server4pure-ftpd:\(\?@183.184.50.184\)[WARNING]Authenticationfailedforuser[www]Aug3113:31:48server4pure-ftpd:\(\?@117.68.197.99\)[WARNING]Authenticationfailedforuser[www]Aug3112:38:58server4pure-ftpd:\(\?@183.184.50.184\)[WARNING]Authenticationfailedforuser[www]Aug3112:39:04server4pure-ftpd:\(\?@183.184.50.184\)[WARNING]Authenticationfailedforuser[www]Aug3112:39:10server4pure-ftpd:\(\?@183.184.50.184\)[WARNING]Authenticationfailedforuser[www]Aug3113:08:03server4pure-ftpd:\(\?@125.93.81.120\)[WARNING]Authenticationfailedforuser[www]Aug3112:39:17server4pure-ftpd:\(\?@183.184.50.184\)[WARNING]Authenticationfailedforuser[www]Aug3112:38:52server4pure-ftpd:\(\?@183.184.50.184\)[WARNING]Authenticationfailedforuser[www]IPAddressesBlocked:121.13.237.38\(CN/China/-\)183.184.50.184\(CN/China/184.50.184.183.adsl-pool.sx.cn\)
2019-09-01 05:44:50
203.186.158.178 attack
2019-08-31T21:45:07.798737hub.schaetter.us sshd\[3427\]: Invalid user taras from 203.186.158.178
2019-08-31T21:45:07.831556hub.schaetter.us sshd\[3427\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=203186158178.ctinets.com
2019-08-31T21:45:09.222532hub.schaetter.us sshd\[3427\]: Failed password for invalid user taras from 203.186.158.178 port 19905 ssh2
2019-08-31T21:53:58.056394hub.schaetter.us sshd\[3447\]: Invalid user red5 from 203.186.158.178
2019-08-31T21:53:58.099215hub.schaetter.us sshd\[3447\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=203186158178.ctinets.com
...
2019-09-01 06:00:48
193.147.107.45 attackspam
2019-08-31T08:12:57.100844ldap.arvenenaske.de sshd[31081]: Connection from 193.147.107.45 port 38670 on 5.199.128.55 port 22
2019-08-31T08:12:57.437084ldap.arvenenaske.de sshd[31081]: Invalid user teamspeak from 193.147.107.45 port 38670
2019-08-31T08:12:57.441383ldap.arvenenaske.de sshd[31081]: pam_sss(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=193.147.107.45 user=teamspeak
2019-08-31T08:12:57.442469ldap.arvenenaske.de sshd[31081]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=193.147.107.45
2019-08-31T08:12:57.100844ldap.arvenenaske.de sshd[31081]: Connection from 193.147.107.45 port 38670 on 5.199.128.55 port 22
2019-08-31T08:12:57.437084ldap.arvenenaske.de sshd[31081]: Invalid user teamspeak from 193.147.107.45 port 38670
2019-08-31T08:12:59.254770ldap.arvenenaske.de sshd[31081]: Failed password for invalid user teamspeak from 193.147.107.45 port 38670 ssh2
2019-08-31T08:21:38.332847ldap.ar........
------------------------------
2019-09-01 06:13:38
36.110.50.217 attackbots
Aug 31 23:48:32 eventyay sshd[20496]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=36.110.50.217
Aug 31 23:48:34 eventyay sshd[20496]: Failed password for invalid user gast. from 36.110.50.217 port 43342 ssh2
Aug 31 23:53:55 eventyay sshd[21746]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=36.110.50.217
...
2019-09-01 06:03:39
23.129.64.204 attackspam
Aug 31 21:53:56 MK-Soft-VM4 sshd\[25488\]: Invalid user robert from 23.129.64.204 port 39011
Aug 31 21:53:56 MK-Soft-VM4 sshd\[25488\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=23.129.64.204
Aug 31 21:53:58 MK-Soft-VM4 sshd\[25488\]: Failed password for invalid user robert from 23.129.64.204 port 39011 ssh2
...
2019-09-01 06:01:18
138.201.243.66 attackspam
22 attempts against mh_ha-misbehave-ban on lb.any-lamp.com
2019-09-01 05:46:36
95.0.208.130 attack
Unauthorized connection attempt from IP address 95.0.208.130 on Port 445(SMB)
2019-09-01 05:43:39
106.13.123.29 attackbotsspam
2019-08-31T21:53:56.806895abusebot-7.cloudsearch.cf sshd\[7471\]: Invalid user alex from 106.13.123.29 port 40798
2019-09-01 06:01:39
187.209.66.39 attackspambots
Unauthorized connection attempt from IP address 187.209.66.39 on Port 445(SMB)
2019-09-01 05:43:57
178.128.87.245 attackbots
2019-08-31T22:19:32.145602abusebot-7.cloudsearch.cf sshd\[7649\]: Invalid user peter from 178.128.87.245 port 36132
2019-09-01 06:22:33
186.26.127.18 attackspam
Unauthorized connection attempt from IP address 186.26.127.18 on Port 445(SMB)
2019-09-01 05:45:15
106.12.88.32 attackspam
Aug 31 11:49:19 kapalua sshd\[14122\]: Invalid user brother from 106.12.88.32
Aug 31 11:49:19 kapalua sshd\[14122\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.88.32
Aug 31 11:49:21 kapalua sshd\[14122\]: Failed password for invalid user brother from 106.12.88.32 port 35980 ssh2
Aug 31 11:53:59 kapalua sshd\[14599\]: Invalid user guest from 106.12.88.32
Aug 31 11:53:59 kapalua sshd\[14599\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.88.32
2019-09-01 05:58:34
84.241.26.213 attack
Sep  1 00:53:40 taivassalofi sshd[26371]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=84.241.26.213
Sep  1 00:53:42 taivassalofi sshd[26371]: Failed password for invalid user ncic from 84.241.26.213 port 54452 ssh2
...
2019-09-01 06:08:26

最近上报的IP列表

114.99.85.210 114.99.86.116 114.237.61.91 114.99.86.119
114.99.87.183 114.99.9.110 114.99.9.107 114.99.9.11
114.99.9.102 114.99.9.105 114.99.9.113 114.237.62.109
114.99.9.111 114.237.62.116 114.237.62.124 114.237.62.136
114.193.250.34 114.237.62.145 114.237.91.129 114.237.91.185