必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): None

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 116.246.14.34
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 6976
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;116.246.14.34.			IN	A

;; AUTHORITY SECTION:
.			249	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022022000 1800 900 604800 86400

;; Query time: 64 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Feb 20 20:20:52 CST 2022
;; MSG SIZE  rcvd: 106
HOST信息:
Host 34.14.246.116.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 34.14.246.116.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
42.115.113.206 attackbotsspam
Jun 12 14:05:42 debian-2gb-nbg1-2 kernel: \[14222264.344622\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=42.115.113.206 DST=195.201.40.59 LEN=40 TOS=0x00 PREC=0x00 TTL=49 ID=62348 PROTO=TCP SPT=39883 DPT=8000 WINDOW=37826 RES=0x00 SYN URGP=0
2020-06-12 23:48:20
202.163.126.134 attack
Jun 12 13:59:56 buvik sshd[13602]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=202.163.126.134
Jun 12 13:59:58 buvik sshd[13602]: Failed password for invalid user vadim from 202.163.126.134 port 49545 ssh2
Jun 12 14:06:05 buvik sshd[15032]: Invalid user sysop from 202.163.126.134
...
2020-06-12 23:20:35
14.215.165.133 attackbots
Jun 12 14:45:44 abendstille sshd\[18038\]: Invalid user ftpuser from 14.215.165.133
Jun 12 14:45:44 abendstille sshd\[18038\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=14.215.165.133
Jun 12 14:45:45 abendstille sshd\[18038\]: Failed password for invalid user ftpuser from 14.215.165.133 port 52212 ssh2
Jun 12 14:48:04 abendstille sshd\[20374\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=14.215.165.133  user=root
Jun 12 14:48:05 abendstille sshd\[20374\]: Failed password for root from 14.215.165.133 port 47590 ssh2
...
2020-06-12 23:56:29
151.56.35.38 attackspambots
Automatic report - Port Scan Attack
2020-06-12 23:14:21
106.54.194.77 attackspambots
Jun 10 12:52:34 myhostname sshd[10238]: Invalid user userbot from 106.54.194.77
Jun 10 12:52:34 myhostname sshd[10238]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.54.194.77
Jun 10 12:52:36 myhostname sshd[10238]: Failed password for invalid user userbot from 106.54.194.77 port 46476 ssh2
Jun 10 12:52:37 myhostname sshd[10238]: Received disconnect from 106.54.194.77 port 46476:11: Bye Bye [preauth]
Jun 10 12:52:37 myhostname sshd[10238]: Disconnected from 106.54.194.77 port 46476 [preauth]


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=106.54.194.77
2020-06-12 23:25:13
49.232.87.218 attack
Jun 12 17:30:57 srv-ubuntu-dev3 sshd[43199]: Invalid user Rauna from 49.232.87.218
Jun 12 17:30:57 srv-ubuntu-dev3 sshd[43199]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.232.87.218
Jun 12 17:30:57 srv-ubuntu-dev3 sshd[43199]: Invalid user Rauna from 49.232.87.218
Jun 12 17:30:59 srv-ubuntu-dev3 sshd[43199]: Failed password for invalid user Rauna from 49.232.87.218 port 39602 ssh2
Jun 12 17:33:57 srv-ubuntu-dev3 sshd[43718]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.232.87.218  user=root
Jun 12 17:33:59 srv-ubuntu-dev3 sshd[43718]: Failed password for root from 49.232.87.218 port 42500 ssh2
Jun 12 17:36:50 srv-ubuntu-dev3 sshd[44238]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.232.87.218  user=root
Jun 12 17:36:52 srv-ubuntu-dev3 sshd[44238]: Failed password for root from 49.232.87.218 port 45390 ssh2
Jun 12 17:39:49 srv-ubuntu-dev3 sshd[44694
...
2020-06-12 23:40:01
85.209.0.79 attackspam
Bruteforce detected by fail2ban
2020-06-12 23:19:05
24.230.34.148 attackbots
Jun 12 17:20:14 prox sshd[28120]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=24.230.34.148
2020-06-12 23:53:48
177.207.137.57 attackspambots
IP 177.207.137.57 attacked honeypot on port: 5000 at 6/12/2020 1:05:54 PM
2020-06-12 23:17:09
157.55.39.47 attack
Automatic report - Banned IP Access
2020-06-12 23:59:24
117.51.142.192 attackspam
Jun 12 14:05:49 mail sshd[30188]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=117.51.142.192  user=root
Jun 12 14:05:50 mail sshd[30188]: Failed password for root from 117.51.142.192 port 48687 ssh2
...
2020-06-12 23:39:40
158.69.123.134 attackbotsspam
Jun 12 17:32:48 vps647732 sshd[3350]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=158.69.123.134
Jun 12 17:32:51 vps647732 sshd[3350]: Failed password for invalid user demo from 158.69.123.134 port 60934 ssh2
...
2020-06-12 23:51:13
187.149.40.85 attackspam
Invalid user oracle from 187.149.40.85 port 46029
2020-06-12 23:43:30
156.146.36.100 attackbotsspam
(From teresita.bonnett31@gmail.com) Stem cell therapy has proven itself to be one of the most effective treatments for COPD (Chronic Obstructive Pulmonary Disorder). IMC is the leader in stem cell therapies in Mexico. For more information on how we can treat COPD please visit:
https://bit.ly/copd-integramedicalcenter
2020-06-12 23:22:08
46.38.150.142 attackbots
Jun 12 17:19:40 relay postfix/smtpd\[29352\]: warning: unknown\[46.38.150.142\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Jun 12 17:20:25 relay postfix/smtpd\[6883\]: warning: unknown\[46.38.150.142\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Jun 12 17:20:31 relay postfix/smtpd\[9753\]: warning: unknown\[46.38.150.142\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Jun 12 17:21:31 relay postfix/smtpd\[16691\]: warning: unknown\[46.38.150.142\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Jun 12 17:21:33 relay postfix/smtpd\[3355\]: warning: unknown\[46.38.150.142\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
...
2020-06-12 23:29:12

最近上报的IP列表

116.237.238.235 116.24.65.196 116.251.204.41 116.249.91.209
116.251.205.20 116.251.205.207 116.251.205.6 116.254.1.129
116.251.205.22 116.255.119.230 116.255.129.7 116.255.129.216
104.21.234.26 116.255.131.10 116.255.131.19 116.255.137.67
116.255.144.235 116.255.147.237 116.255.134.200 116.255.145.229