必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): China

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 117.14.172.13
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 1721
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;117.14.172.13.			IN	A

;; AUTHORITY SECTION:
.			558	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022030400 1800 900 604800 86400

;; Query time: 47 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Mar 04 19:51:12 CST 2022
;; MSG SIZE  rcvd: 106
HOST信息:
13.172.14.117.in-addr.arpa domain name pointer dns13.online.tj.cn.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
13.172.14.117.in-addr.arpa	name = dns13.online.tj.cn.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
122.51.60.39 attack
leo_www
2020-10-14 08:55:33
41.66.245.222 attack
Automatic report - Port Scan Attack
2020-10-14 08:22:41
112.85.42.184 attackspambots
Oct 14 02:51:17 OPSO sshd\[23506\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.85.42.184  user=root
Oct 14 02:51:19 OPSO sshd\[23506\]: Failed password for root from 112.85.42.184 port 2936 ssh2
Oct 14 02:51:22 OPSO sshd\[23506\]: Failed password for root from 112.85.42.184 port 2936 ssh2
Oct 14 02:51:26 OPSO sshd\[23506\]: Failed password for root from 112.85.42.184 port 2936 ssh2
Oct 14 02:51:29 OPSO sshd\[23506\]: Failed password for root from 112.85.42.184 port 2936 ssh2
2020-10-14 08:51:39
106.12.242.123 attackbotsspam
Oct 13 23:54:21 ip-172-31-16-56 sshd\[6082\]: Invalid user temp from 106.12.242.123\
Oct 13 23:54:23 ip-172-31-16-56 sshd\[6082\]: Failed password for invalid user temp from 106.12.242.123 port 48000 ssh2\
Oct 13 23:58:15 ip-172-31-16-56 sshd\[6134\]: Invalid user web from 106.12.242.123\
Oct 13 23:58:17 ip-172-31-16-56 sshd\[6134\]: Failed password for invalid user web from 106.12.242.123 port 46096 ssh2\
Oct 14 00:02:21 ip-172-31-16-56 sshd\[6162\]: Failed password for root from 106.12.242.123 port 44194 ssh2\
2020-10-14 08:35:05
113.111.55.173 attack
Oct 13 16:47:12 mockhub sshd[1359967]: Failed password for invalid user rjf from 113.111.55.173 port 60169 ssh2
Oct 13 16:49:51 mockhub sshd[1360034]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=113.111.55.173  user=root
Oct 13 16:49:53 mockhub sshd[1360034]: Failed password for root from 113.111.55.173 port 51527 ssh2
...
2020-10-14 08:38:19
163.172.83.228 attackbots
Lines containing failures of 163.172.83.228
Oct 12 05:35:33 nemesis sshd[28437]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=163.172.83.228  user=r.r
Oct 12 05:35:35 nemesis sshd[28437]: Failed password for r.r from 163.172.83.228 port 35474 ssh2
Oct 12 05:35:36 nemesis sshd[28437]: Received disconnect from 163.172.83.228 port 35474:11: Bye Bye [preauth]
Oct 12 05:35:36 nemesis sshd[28437]: Disconnected from authenticating user r.r 163.172.83.228 port 35474 [preauth]
Oct 12 05:48:45 nemesis sshd[32463]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=163.172.83.228  user=r.r
Oct 12 05:48:48 nemesis sshd[32463]: Failed password for r.r from 163.172.83.228 port 56098 ssh2
Oct 12 05:48:48 nemesis sshd[32463]: Received disconnect from 163.172.83.228 port 56098:11: Bye Bye [preauth]
Oct 12 05:48:48 nemesis sshd[32463]: Disconnected from authenticating user r.r 163.172.83.228 port 56098 [preaut........
------------------------------
2020-10-14 08:39:18
58.221.72.170 attack
Fail2Ban - SMTP Bruteforce Attempt
2020-10-14 08:43:47
106.13.199.185 attackspam
Oct 14 00:55:57 Ubuntu-1404-trusty-64-minimal sshd\[22541\]: Invalid user kirk from 106.13.199.185
Oct 14 00:55:57 Ubuntu-1404-trusty-64-minimal sshd\[22541\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.199.185
Oct 14 00:55:59 Ubuntu-1404-trusty-64-minimal sshd\[22541\]: Failed password for invalid user kirk from 106.13.199.185 port 40344 ssh2
Oct 14 01:04:02 Ubuntu-1404-trusty-64-minimal sshd\[31459\]: Invalid user claudia from 106.13.199.185
Oct 14 01:04:02 Ubuntu-1404-trusty-64-minimal sshd\[31459\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.199.185
2020-10-14 08:36:13
111.229.218.60 attackspam
Oct 14 00:57:41 marvibiene sshd[12031]: Failed password for root from 111.229.218.60 port 40520 ssh2
2020-10-14 08:46:46
152.136.30.135 attackspambots
[f2b] sshd bruteforce, retries: 1
2020-10-14 08:48:02
36.133.177.139 attackbotsspam
Oct 13 22:53:40 vserver sshd\[2938\]: Invalid user yoshihiro from 36.133.177.139Oct 13 22:53:42 vserver sshd\[2938\]: Failed password for invalid user yoshihiro from 36.133.177.139 port 35318 ssh2Oct 13 22:57:42 vserver sshd\[2969\]: Invalid user help from 36.133.177.139Oct 13 22:57:44 vserver sshd\[2969\]: Failed password for invalid user help from 36.133.177.139 port 34734 ssh2
...
2020-10-14 08:30:36
124.239.148.63 attack
Oct 14 02:16:56 h2779839 sshd[15588]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=124.239.148.63  user=root
Oct 14 02:16:58 h2779839 sshd[15588]: Failed password for root from 124.239.148.63 port 46776 ssh2
Oct 14 02:20:02 h2779839 sshd[15620]: Invalid user vaibhav from 124.239.148.63 port 60013
Oct 14 02:20:02 h2779839 sshd[15620]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=124.239.148.63
Oct 14 02:20:02 h2779839 sshd[15620]: Invalid user vaibhav from 124.239.148.63 port 60013
Oct 14 02:20:05 h2779839 sshd[15620]: Failed password for invalid user vaibhav from 124.239.148.63 port 60013 ssh2
Oct 14 02:23:07 h2779839 sshd[15688]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=124.239.148.63  user=root
Oct 14 02:23:09 h2779839 sshd[15688]: Failed password for root from 124.239.148.63 port 16749 ssh2
Oct 14 02:26:20 h2779839 sshd[15722]: Invalid user simon from 
...
2020-10-14 08:37:45
78.180.183.87 attack
Icarus honeypot on github
2020-10-14 09:01:57
109.167.231.99 attackspam
Scanned 3 times in the last 24 hours on port 22
2020-10-14 08:48:26
112.85.42.189 attack
Failed password for invalid user from 112.85.42.189 port 12273 ssh2
2020-10-14 09:01:35

最近上报的IP列表

117.14.159.76 117.14.164.140 117.14.159.188 117.14.159.61
117.14.172.177 117.14.159.97 117.14.172.246 114.111.32.211
117.14.172.80 117.14.173.116 117.14.158.56 117.14.172.107
117.14.173.68 117.14.172.61 117.14.173.7 117.14.173.240
117.14.173.253 114.111.32.212 117.14.242.223 117.14.28.23