必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): None

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
IP 类型 评论内容 时间
117.14.146.143 attack
Unauthorized connection attempt detected, IP banned.
2020-02-03 19:20:41
117.14.146.255 attackbotsspam
The IP has triggered Cloudflare WAF. CF-Ray: 5413ee117e8ca40f | WAF_Rule_ID: 3b40188685924a32bf11d40edea05a27 | WAF_Kind: firewall | CF_Action: challenge | Country: CN | CF_IPClass: noRecord | Protocol: HTTP/1.1 | Method: GET | Host: img.skk.moe | User-Agent: Mozilla/5.067805899 Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/63.0.3239.132 Safari/537.36 | CF_DC: LAX. Report generated by Cloudflare-WAF-to-AbuseIPDB (https://github.com/SukkaW/Cloudflare-WAF-to-AbuseIPDB).
2019-12-08 04:34:05
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 117.14.146.45
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 1559
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;117.14.146.45.			IN	A

;; AUTHORITY SECTION:
.			455	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022022001 1800 900 604800 86400

;; Query time: 64 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Feb 21 05:48:54 CST 2022
;; MSG SIZE  rcvd: 106
HOST信息:
45.146.14.117.in-addr.arpa domain name pointer dns45.online.tj.cn.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
45.146.14.117.in-addr.arpa	name = dns45.online.tj.cn.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
222.247.38.150 attack
2020-02-05T09:39:14.122395vostok sshd\[7594\]: Invalid user weblogic@123 from 222.247.38.150 port 35287 | Triggered by Fail2Ban at Vostok web server
2020-02-05 22:42:21
161.117.178.197 attackspam
Feb  5 13:41:15 yesfletchmain sshd\[19911\]: Invalid user todd from 161.117.178.197 port 44594
Feb  5 13:41:15 yesfletchmain sshd\[19911\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=161.117.178.197
Feb  5 13:41:17 yesfletchmain sshd\[19911\]: Failed password for invalid user todd from 161.117.178.197 port 44594 ssh2
Feb  5 13:48:56 yesfletchmain sshd\[19992\]: Invalid user sentry from 161.117.178.197 port 40650
Feb  5 13:48:56 yesfletchmain sshd\[19992\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=161.117.178.197
...
2020-02-05 23:09:19
187.115.128.212 attack
2020-02-05T14:26:33.717178shield sshd\[21223\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=187.115.128.212  user=root
2020-02-05T14:26:36.291504shield sshd\[21223\]: Failed password for root from 187.115.128.212 port 58854 ssh2
2020-02-05T14:29:22.676551shield sshd\[21668\]: Invalid user com from 187.115.128.212 port 54076
2020-02-05T14:29:22.680803shield sshd\[21668\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=187.115.128.212
2020-02-05T14:29:24.788635shield sshd\[21668\]: Failed password for invalid user com from 187.115.128.212 port 54076 ssh2
2020-02-05 22:36:29
213.32.10.226 attack
Feb  5 16:00:46 silence02 sshd[10971]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=213.32.10.226
Feb  5 16:00:48 silence02 sshd[10971]: Failed password for invalid user zarichnaya from 213.32.10.226 port 42368 ssh2
Feb  5 16:03:47 silence02 sshd[11187]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=213.32.10.226
2020-02-05 23:26:36
113.125.58.0 attackbots
2020-2-5 3:22:07 PM: failed ssh attempt
2020-02-05 22:39:58
188.242.86.43 attackbots
2020-02-05T13:49:06.604188abusebot-3.cloudsearch.cf sshd[15877]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.242.86.43  user=root
2020-02-05T13:49:08.371285abusebot-3.cloudsearch.cf sshd[15877]: Failed password for root from 188.242.86.43 port 57746 ssh2
2020-02-05T13:49:12.234866abusebot-3.cloudsearch.cf sshd[15877]: Failed password for root from 188.242.86.43 port 57746 ssh2
2020-02-05T13:49:06.604188abusebot-3.cloudsearch.cf sshd[15877]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.242.86.43  user=root
2020-02-05T13:49:08.371285abusebot-3.cloudsearch.cf sshd[15877]: Failed password for root from 188.242.86.43 port 57746 ssh2
2020-02-05T13:49:12.234866abusebot-3.cloudsearch.cf sshd[15877]: Failed password for root from 188.242.86.43 port 57746 ssh2
2020-02-05T13:49:06.604188abusebot-3.cloudsearch.cf sshd[15877]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruse
...
2020-02-05 22:49:48
181.52.251.209 attackspam
Feb  5 10:14:52 plusreed sshd[7443]: Invalid user smg from 181.52.251.209
...
2020-02-05 23:22:16
51.75.33.86 attackspam
Hits on port : 1080
2020-02-05 22:52:04
106.12.222.252 attack
Feb  5 15:47:42 dedicated sshd[9698]: Invalid user bbj from 106.12.222.252 port 47386
2020-02-05 22:48:22
129.213.107.56 attackbotsspam
Feb  5 05:04:59 hpm sshd\[22808\]: Invalid user hamada from 129.213.107.56
Feb  5 05:04:59 hpm sshd\[22808\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.213.107.56
Feb  5 05:05:00 hpm sshd\[22808\]: Failed password for invalid user hamada from 129.213.107.56 port 40136 ssh2
Feb  5 05:08:13 hpm sshd\[23207\]: Invalid user hxeadm from 129.213.107.56
Feb  5 05:08:13 hpm sshd\[23207\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.213.107.56
2020-02-05 23:13:15
211.58.11.234 attack
Feb  5 04:18:51 hpm sshd\[17399\]: Invalid user ubuntu from 211.58.11.234
Feb  5 04:18:51 hpm sshd\[17399\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=211.58.11.234
Feb  5 04:18:52 hpm sshd\[17399\]: Failed password for invalid user ubuntu from 211.58.11.234 port 50527 ssh2
Feb  5 04:23:20 hpm sshd\[17922\]: Invalid user zhouh from 211.58.11.234
Feb  5 04:23:20 hpm sshd\[17922\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=211.58.11.234
2020-02-05 22:40:12
93.174.93.123 attack
Feb  5 14:04:34 [host] kernel: [4106982.163073] [U
Feb  5 14:12:28 [host] kernel: [4107455.863935] [U
Feb  5 14:29:29 [host] kernel: [4108477.310810] [U
Feb  5 14:30:27 [host] kernel: [4108535.306000] [U
Feb  5 14:55:36 [host] kernel: [4110043.956909] [U
Feb  5 15:03:29 [host] kernel: [4110516.323053] [U
Feb  5 15:21:14 [host] kernel: [4111580.927697] [U
Feb  5 15:27:58 [host] kernel: [4111985.584424] [U
Feb  5 15:34:13 [host] kernel: [4112359.820253] [U
Feb  5 14:04:34 [host] kernel: [4106982.163073] [U
Feb  5 14:12:28 [host] kernel: [4107455.863935] [U
Feb  5 14:29:29 [host] kernel: [4108477.310810] [U
Feb  5 14:30:27 [host] kernel: [4108535.306000] [U
Feb  5 14:55:36 [host] kernel: [4110043.956909] [U
Feb  5 15:03:29 [host] kernel: [4110516.323053] [U
Feb  5 15:21:14 [host] kernel: [4111580.927697] [U
Feb  5 15:27:58 [host] kernel: [4111985.584424] [U
Feb  5 15:34:13 [host] kernel: [4112359.820253] [U
2020-02-05 23:11:33
216.244.66.229 attackbotsspam
Automated report (2020-02-05T13:49:24+00:00). Misbehaving bot detected at this address.
2020-02-05 22:44:02
14.174.125.135 attackspambots
1580910558 - 02/05/2020 14:49:18 Host: 14.174.125.135/14.174.125.135 Port: 445 TCP Blocked
2020-02-05 22:45:15
69.196.150.210 attackbots
Automatic report - XMLRPC Attack
2020-02-05 22:57:43

最近上报的IP列表

117.14.146.163 117.14.147.83 117.14.147.2 117.14.149.1
117.14.156.26 117.14.157.227 117.14.152.117 117.111.11.223
117.14.154.205 117.14.154.201 117.14.177.120 117.140.205.173
117.140.73.125 117.144.123.9 117.144.205.50 117.144.171.38
117.141.214.93 117.146.52.227 117.145.190.32 117.146.55.197