必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): None

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
IP 类型 评论内容 时间
117.14.114.139 attackbotsspam
The IP has triggered Cloudflare WAF. CF-Ray: 543610ab5f8f7764 | WAF_Rule_ID: 3b40188685924a32bf11d40edea05a27 | WAF_Kind: firewall | CF_Action: drop | Country: CN | CF_IPClass: noRecord | Protocol: HTTP/1.1 | Method: GET | Host: img.skk.moe | User-Agent: Mozilla/5.0101097241 Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/69.0.3497.81 Safari/537.36 | CF_DC: LAX. Report generated by Cloudflare-WAF-to-AbuseIPDB (https://github.com/SukkaW/Cloudflare-WAF-to-AbuseIPDB).
2019-12-12 04:44:31
117.14.114.22 attackbotsspam
WEB_SERVER 403 Forbidden
2019-11-03 03:41:06
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 117.14.114.102
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 29234
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;117.14.114.102.			IN	A

;; AUTHORITY SECTION:
.			538	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022022001 1800 900 604800 86400

;; Query time: 194 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Feb 21 12:10:06 CST 2022
;; MSG SIZE  rcvd: 107
HOST信息:
102.114.14.117.in-addr.arpa domain name pointer dns102.online.tj.cn.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
102.114.14.117.in-addr.arpa	name = dns102.online.tj.cn.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
192.241.154.215 attackspam
php WP PHPmyadamin ABUSE blocked for 12h
2019-07-01 10:21:19
120.92.104.116 attack
Jul  1 00:50:54 rpi sshd\[5376\]: Invalid user move from 120.92.104.116 port 48232
Jul  1 00:50:54 rpi sshd\[5376\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=120.92.104.116
Jul  1 00:50:56 rpi sshd\[5376\]: Failed password for invalid user move from 120.92.104.116 port 48232 ssh2
2019-07-01 10:21:52
108.62.121.142 attack
Brute force attack to crack SMTP password (port 25 / 587)
2019-07-01 10:04:10
223.171.42.175 attackbotsspam
Jun 28 13:36:32 xxxxxxx0 sshd[23693]: Invalid user admin from 223.171.42.175 port 33115
Jun 28 13:36:32 xxxxxxx0 sshd[23693]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=223.171.42.175
Jun 28 13:36:34 xxxxxxx0 sshd[23693]: Failed password for invalid user admin from 223.171.42.175 port 33115 ssh2
Jun 28 13:40:49 xxxxxxx0 sshd[24336]: Invalid user admin from 223.171.42.175 port 61621
Jun 28 13:40:50 xxxxxxx0 sshd[24336]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=223.171.42.175

........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=223.171.42.175
2019-07-01 10:45:23
182.75.201.82 attackbots
Jul  1 04:06:22 SilenceServices sshd[31627]: Failed password for root from 182.75.201.82 port 36789 ssh2
Jul  1 04:08:03 SilenceServices sshd[32666]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.75.201.82
Jul  1 04:08:05 SilenceServices sshd[32666]: Failed password for invalid user minecraft from 182.75.201.82 port 53376 ssh2
2019-07-01 10:13:49
157.230.34.75 attackbots
DATE:2019-07-01_00:50:28, IP:157.230.34.75, PORT:telnet Telnet brute force auth on honeypot server (honey-neo-dc)
2019-07-01 10:40:41
149.90.214.65 attack
Automatic report - SSH Brute-Force Attack
2019-07-01 10:44:11
77.40.62.232 attackspam
Brute force attack stopped by firewall
2019-07-01 10:02:42
200.76.226.243 attackbotsspam
Jul  1 04:08:57 bouncer sshd\[14077\]: Invalid user admin from 200.76.226.243 port 47238
Jul  1 04:08:57 bouncer sshd\[14077\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=200.76.226.243 
Jul  1 04:08:58 bouncer sshd\[14077\]: Failed password for invalid user admin from 200.76.226.243 port 47238 ssh2
...
2019-07-01 10:38:23
42.236.101.194 attack
Scanning unused Default website or suspicious access to valid sites from IP marked as abusive
2019-07-01 10:24:29
128.199.240.120 attackbots
Jun 24 23:37:28 dns4 sshd[25792]: Invalid user lydie from 128.199.240.120
Jun 24 23:37:28 dns4 sshd[25792]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.199.240.120 
Jun 24 23:37:31 dns4 sshd[25792]: Failed password for invalid user lydie from 128.199.240.120 port 41702 ssh2
Jun 24 23:37:31 dns4 sshd[25793]: Received disconnect from 128.199.240.120: 11: Bye Bye
Jun 24 23:40:57 dns4 sshd[25863]: Invalid user suman from 128.199.240.120
Jun 24 23:40:57 dns4 sshd[25863]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.199.240.120 
Jun 24 23:40:59 dns4 sshd[25863]: Failed password for invalid user suman from 128.199.240.120 port 50508 ssh2


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=128.199.240.120
2019-07-01 10:13:08
123.232.125.198 attackspambots
WordPress login Brute force / Web App Attack on client site.
2019-07-01 10:07:39
27.50.24.83 attackspambots
2019-07-01T02:20:58.883497abusebot-6.cloudsearch.cf sshd\[18971\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=27.50.24.83  user=root
2019-07-01 10:33:23
80.104.34.234 attackbotsspam
Jun 28 07:50:12 xxxxxxx8434580 sshd[31677]: Invalid user cloud from 80.104.34.234
Jun 28 07:50:14 xxxxxxx8434580 sshd[31677]: Failed password for invalid user cloud from 80.104.34.234 port 49679 ssh2
Jun 28 07:50:14 xxxxxxx8434580 sshd[31677]: Received disconnect from 80.104.34.234: 11: Bye Bye [preauth]
Jun 28 07:53:19 xxxxxxx8434580 sshd[31711]: Invalid user kong from 80.104.34.234
Jun 28 07:53:21 xxxxxxx8434580 sshd[31711]: Failed password for invalid user kong from 80.104.34.234 port 55564 ssh2
Jun 28 07:53:21 xxxxxxx8434580 sshd[31711]: Received disconnect from 80.104.34.234: 11: Bye Bye [preauth]


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=80.104.34.234
2019-07-01 10:17:12
34.219.36.191 attack
Scanning unused Default website or suspicious access to valid sites from IP marked as abusive
2019-07-01 10:37:17

最近上报的IP列表

117.14.113.40 117.14.114.171 117.14.114.248 117.14.114.75
117.14.146.126 117.14.144.239 117.14.114.69 117.14.146.89
117.14.144.237 117.14.114.249 117.14.150.157 117.14.147.156
117.14.153.60 117.14.154.245 117.14.154.128 117.14.157.99
117.14.159.35 117.14.158.37 117.14.158.239 117.140.125.232