必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): China

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 117.14.158.83
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 45114
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;117.14.158.83.			IN	A

;; AUTHORITY SECTION:
.			598	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022030400 1800 900 604800 86400

;; Query time: 130 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Mar 04 19:51:10 CST 2022
;; MSG SIZE  rcvd: 106
HOST信息:
83.158.14.117.in-addr.arpa domain name pointer dns83.online.tj.cn.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
83.158.14.117.in-addr.arpa	name = dns83.online.tj.cn.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
190.104.149.36 attackspam
2020-01-12T19:05:08.7730671495-001 sshd[32453]: Invalid user jp from 190.104.149.36 port 50159
2020-01-12T19:05:08.7795541495-001 sshd[32453]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=190.104.149.36
2020-01-12T19:05:08.7730671495-001 sshd[32453]: Invalid user jp from 190.104.149.36 port 50159
2020-01-12T19:05:10.6196331495-001 sshd[32453]: Failed password for invalid user jp from 190.104.149.36 port 50159 ssh2
2020-01-12T19:07:26.1002191495-001 sshd[32570]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=190.104.149.36  user=root
2020-01-12T19:07:28.0824221495-001 sshd[32570]: Failed password for root from 190.104.149.36 port 59038 ssh2
2020-01-12T19:09:53.8031821495-001 sshd[32702]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=190.104.149.36  user=root
2020-01-12T19:09:55.7686801495-001 sshd[32702]: Failed password for root from 190.104.149.36 port 39682 ss
...
2020-01-13 08:50:47
142.93.40.250 attackspam
Jan 12 17:49:54 hostnameproxy sshd[12677]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.40.250  user=r.r
Jan 12 17:49:56 hostnameproxy sshd[12677]: Failed password for r.r from 142.93.40.250 port 57708 ssh2
Jan 12 17:52:46 hostnameproxy sshd[12754]: Invalid user 1 from 142.93.40.250 port 32882
Jan 12 17:52:46 hostnameproxy sshd[12754]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.40.250
Jan 12 17:52:48 hostnameproxy sshd[12754]: Failed password for invalid user 1 from 142.93.40.250 port 32882 ssh2
Jan 12 17:55:35 hostnameproxy sshd[12861]: Invalid user alexandre from 142.93.40.250 port 36288
Jan 12 17:55:35 hostnameproxy sshd[12861]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.40.250
Jan 12 17:55:37 hostnameproxy sshd[12861]: Failed password for invalid user alexandre from 142.93.40.250 port 36288 ssh2
Jan 12 17:58:30 host........
------------------------------
2020-01-13 08:39:03
35.247.126.13 attackbotsspam
Jan 12 23:28:18 mail1 sshd\[26719\]: Invalid user dick from 35.247.126.13 port 45440
Jan 12 23:28:18 mail1 sshd\[26719\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=35.247.126.13
Jan 12 23:28:21 mail1 sshd\[26719\]: Failed password for invalid user dick from 35.247.126.13 port 45440 ssh2
Jan 12 23:32:22 mail1 sshd\[27618\]: Invalid user erick from 35.247.126.13 port 40198
Jan 12 23:32:22 mail1 sshd\[27618\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=35.247.126.13
...
2020-01-13 08:41:21
85.195.212.6 attackbotsspam
Jan 12 21:23:09 work-partkepr sshd\[3659\]: Invalid user admin from 85.195.212.6 port 33028
Jan 12 21:23:09 work-partkepr sshd\[3659\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=85.195.212.6
...
2020-01-13 08:44:02
185.53.88.108 attackbotsspam
ET SCAN Sipvicious Scan - port: 5060 proto: UDP cat: Attempted Information Leak
2020-01-13 08:49:36
95.220.199.110 attack
Unauthorized connection attempt detected from IP address 95.220.199.110 to port 2220 [J]
2020-01-13 08:28:21
98.143.227.144 attackbots
none
2020-01-13 08:29:22
216.126.239.124 attackspam
(sshd) Failed SSH login from 216.126.239.124 (US/United States/-): 1 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_TRIGGER; Logs: Jan 12 16:23:10 host sshd[62926]: Did not receive identification string from 216.126.239.124 port 36612
2020-01-13 08:39:36
45.55.233.213 attackspambots
Jan 12 12:08:52 XXX sshd[26829]: Invalid user lz from 45.55.233.213 port 35714
2020-01-13 08:21:49
123.113.191.117 attack
01/12/2020-16:23:38.731576 123.113.191.117 Protocol: 6 ET SCAN Suspicious inbound to MSSQL port 1433
2020-01-13 08:29:03
61.177.172.128 attackspam
Jan 13 01:30:27 odroid64 sshd\[7504\]: User root from 61.177.172.128 not allowed because not listed in AllowUsers
Jan 13 01:30:27 odroid64 sshd\[7504\]: Failed none for invalid user root from 61.177.172.128 port 47332 ssh2
...
2020-01-13 08:33:56
112.3.30.123 attackspam
2020-01-12T21:52:24.234661game.arvenenaske.de sshd[84753]: Invalid user www from 112.3.30.123 port 51860
2020-01-12T21:52:24.241194game.arvenenaske.de sshd[84753]: pam_sss(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.3.30.123 user=www
2020-01-12T21:52:24.241780game.arvenenaske.de sshd[84753]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.3.30.123
2020-01-12T21:52:24.234661game.arvenenaske.de sshd[84753]: Invalid user www from 112.3.30.123 port 51860
2020-01-12T21:52:26.881744game.arvenenaske.de sshd[84753]: Failed password for invalid user www from 112.3.30.123 port 51860 ssh2
2020-01-12T22:02:14.414038game.arvenenaske.de sshd[84891]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.3.30.123  user=r.r
2020-01-12T22:02:16.050627game.arvenenaske.de sshd[84891]: Failed password for r.r from 112.3.30.123 port 42286 ssh2
2020-01-12T22:05:44.131471game........
------------------------------
2020-01-13 08:44:34
185.176.27.122 attackspam
25245/tcp 22986/tcp 47711/tcp...
[2020-01-10/13]720pkt,720pt.(tcp)
2020-01-13 08:33:19
85.113.147.238 attack
1578864177 - 01/12/2020 22:22:57 Host: 85.113.147.238/85.113.147.238 Port: 445 TCP Blocked
2020-01-13 08:47:37
103.221.252.46 attackspam
Jan 13 01:17:28 vpn01 sshd[1014]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.221.252.46
Jan 13 01:17:31 vpn01 sshd[1014]: Failed password for invalid user dominic from 103.221.252.46 port 54416 ssh2
...
2020-01-13 08:22:16

最近上报的IP列表

117.14.158.36 114.111.32.164 117.14.159.131 117.14.159.55
117.14.159.76 117.14.172.13 117.14.164.140 117.14.159.188
117.14.159.61 117.14.172.177 117.14.159.97 117.14.172.246
114.111.32.211 117.14.172.80 117.14.173.116 117.14.158.56
117.14.172.107 117.14.173.68 117.14.172.61 117.14.173.7