必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): Japan

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 118.108.26.114
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 58775
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;118.108.26.114.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025021400 1800 900 604800 86400

;; Query time: 17 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 14 19:08:39 CST 2025
;; MSG SIZE  rcvd: 107
HOST信息:
114.26.108.118.in-addr.arpa domain name pointer FL1-118-108-26-114.ygt.mesh.ad.jp.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
114.26.108.118.in-addr.arpa	name = FL1-118-108-26-114.ygt.mesh.ad.jp.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
14.107.82.244 attackbotsspam
Automatic report - Port Scan
2019-10-27 19:49:57
179.7.194.242 attack
Lines containing failures of 179.7.194.242
Oct 27 04:41:06 MAKserver05 sshd[4039]: Did not receive identification string from 179.7.194.242 port 58413
Oct 27 04:41:08 MAKserver05 sshd[4040]: Invalid user system from 179.7.194.242 port 58146
Oct 27 04:41:08 MAKserver05 sshd[4040]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=179.7.194.242 
Oct 27 04:41:10 MAKserver05 sshd[4040]: Failed password for invalid user system from 179.7.194.242 port 58146 ssh2


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=179.7.194.242
2019-10-27 19:20:35
159.65.231.86 attackbotsspam
Oct 27 01:19:21 h2065291 sshd[4823]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.65.231.86  user=r.r
Oct 27 01:19:23 h2065291 sshd[4823]: Failed password for r.r from 159.65.231.86 port 48670 ssh2
Oct 27 01:19:23 h2065291 sshd[4823]: Received disconnect from 159.65.231.86: 11: Bye Bye [preauth]
Oct 27 01:42:55 h2065291 sshd[5622]: Invalid user NetLinx from 159.65.231.86
Oct 27 01:42:55 h2065291 sshd[5622]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.65.231.86 
Oct 27 01:42:57 h2065291 sshd[5622]: Failed password for invalid user NetLinx from 159.65.231.86 port 40954 ssh2
Oct 27 01:42:57 h2065291 sshd[5622]: Received disconnect from 159.65.231.86: 11: Bye Bye [preauth]
Oct 27 01:46:24 h2065291 sshd[5634]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.65.231.86  user=r.r
Oct 27 01:46:26 h2065291 sshd[5634]: Failed password for r.r f........
-------------------------------
2019-10-27 19:23:00
51.83.98.104 attackspambots
Oct 27 06:03:22 site1 sshd\[955\]: Invalid user swallow520 from 51.83.98.104Oct 27 06:03:24 site1 sshd\[955\]: Failed password for invalid user swallow520 from 51.83.98.104 port 60098 ssh2Oct 27 06:07:09 site1 sshd\[1136\]: Invalid user passidc from 51.83.98.104Oct 27 06:07:11 site1 sshd\[1136\]: Failed password for invalid user passidc from 51.83.98.104 port 41928 ssh2Oct 27 06:10:47 site1 sshd\[1457\]: Invalid user hun1989\*\* from 51.83.98.104Oct 27 06:10:49 site1 sshd\[1457\]: Failed password for invalid user hun1989\*\* from 51.83.98.104 port 51990 ssh2
...
2019-10-27 19:29:42
195.123.237.194 attackspam
Oct 27 02:21:01 mailserver sshd[8725]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=195.123.237.194  user=r.r
Oct 27 02:21:04 mailserver sshd[8725]: Failed password for r.r from 195.123.237.194 port 53324 ssh2
Oct 27 02:21:04 mailserver sshd[8725]: Received disconnect from 195.123.237.194 port 53324:11: Bye Bye [preauth]
Oct 27 02:21:04 mailserver sshd[8725]: Disconnected from 195.123.237.194 port 53324 [preauth]
Oct 27 02:28:46 mailserver sshd[9115]: Invalid user vnc from 195.123.237.194
Oct 27 02:28:46 mailserver sshd[9115]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=195.123.237.194
Oct 27 02:28:48 mailserver sshd[9115]: Failed password for invalid user vnc from 195.123.237.194 port 35112 ssh2
Oct 27 02:28:48 mailserver sshd[9115]: Received disconnect from 195.123.237.194 port 35112:11: Bye Bye [preauth]
Oct 27 02:28:48 mailserver sshd[9115]: Disconnected from 195.123.237.194 port ........
-------------------------------
2019-10-27 19:42:51
109.194.54.130 attack
Invalid user oracle from 109.194.54.130 port 45752
2019-10-27 19:34:50
140.238.40.219 attackbotsspam
Oct 27 00:56:58 CT721 sshd[18737]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=140.238.40.219  user=r.r
Oct 27 00:57:00 CT721 sshd[18737]: Failed password for r.r from 140.238.40.219 port 41958 ssh2
Oct 27 00:57:00 CT721 sshd[18737]: Received disconnect from 140.238.40.219: 11: Bye Bye [preauth]
Oct 27 01:19:58 CT721 sshd[19396]: Invalid user pass from 140.238.40.219
Oct 27 01:19:58 CT721 sshd[19396]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=140.238.40.219
Oct 27 01:20:00 CT721 sshd[19396]: Failed password for invalid user pass from 140.238.40.219 port 9462 ssh2
Oct 27 01:20:01 CT721 sshd[19396]: Received disconnect from 140.238.40.219: 11: Bye Bye [preauth]
Oct 27 01:24:05 CT721 sshd[19469]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=140.238.40.219  user=r.r
Oct 27 01:24:07 CT721 sshd[19469]: Failed password for r.r from 140.238.40.219........
-------------------------------
2019-10-27 19:15:31
14.230.4.73 attackspambots
Lines containing failures of 14.230.4.73 (max 1000)
Oct 27 02:09:48 mm sshd[15364]: Invalid user test from 14.230.4.73 port=
 59422
Oct 27 02:09:48 mm sshd[15364]: pam_unix(sshd:auth): authentication fai=
lure; logname=3D uid=3D0 euid=3D0 tty=3Dssh ruser=3D rhost=3D14.230.4.7=
3
Oct 27 02:09:50 mm sshd[15364]: Failed password for invalid user test f=
rom 14.230.4.73 port 59422 ssh2
Oct 27 02:09:51 mm sshd[15364]: Received disconnect from 14.230.4.73 po=
rt 59422:11: Bye Bye [preauth]
Oct 27 02:09:51 mm sshd[15364]: Disconnected from invalid user test 14.=
230.4.73 port 59422 [preauth]
Oct 27 02:22:57 mm sshd[15465]: pam_unix(sshd:auth): authentication fai=
lure; logname=3D uid=3D0 euid=3D0 tty=3Dssh ruser=3D rhost=3D14.230.4.7=
3  user=3Dr.r
Oct 27 02:22:59 mm sshd[15465]: Failed password for r.r from 14.230.4.=
73 port 8978 ssh2
Oct 27 02:23:00 mm sshd[15465]: Received disconnect from 14.230.4.73 po=
rt 8978:11: Bye Bye [preauth]
Oct 27 02:23:00 mm sshd[15465]: Disconne........
------------------------------
2019-10-27 19:48:18
185.74.5.119 attackspambots
Automatic report - Banned IP Access
2019-10-27 19:39:02
128.199.55.13 attackbotsspam
Oct 27 11:40:07 vmanager6029 sshd\[25770\]: Invalid user At123\~ from 128.199.55.13 port 33227
Oct 27 11:40:07 vmanager6029 sshd\[25770\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.199.55.13
Oct 27 11:40:10 vmanager6029 sshd\[25770\]: Failed password for invalid user At123\~ from 128.199.55.13 port 33227 ssh2
2019-10-27 19:13:24
192.241.246.50 attackspambots
2019-10-27T07:45:31.658709abusebot-2.cloudsearch.cf sshd\[26083\]: Invalid user 1qazZAQ!@\$% from 192.241.246.50 port 51000
2019-10-27 19:17:03
49.116.163.34 attackspam
IP Ban Report :  
 https://help-dysk.pl/wordpress-firewall-plugins/ip/49.116.163.34/ 
 
 CN - 1H : (286)  
 Protection Against DDoS WordPress plugin :  
 "odzyskiwanie danych help-dysk" 
 IP Address Ranges by Country : CN 
 NAME ASN : ASN4134 
 
 IP : 49.116.163.34 
 
 CIDR : 49.112.0.0/13 
 
 PREFIX COUNT : 5430 
 
 UNIQUE IP COUNT : 106919680 
 
 
 ATTACKS DETECTED ASN4134 :  
  1H - 42 
  3H - 84 
  6H - 84 
 12H - 87 
 24H - 87 
 
 DateTime : 2019-10-27 04:44:35 
 
 INFO : Port Scan TELNET Detected and Blocked by ADMIN  - data recovery
2019-10-27 19:49:39
104.40.4.156 attackbotsspam
Oct 27 11:13:58 lnxmysql61 sshd[29374]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.40.4.156
2019-10-27 19:41:41
182.61.34.79 attackbotsspam
Oct 27 06:57:22 vps647732 sshd[30616]: Failed password for root from 182.61.34.79 port 42312 ssh2
Oct 27 07:02:36 vps647732 sshd[30648]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.61.34.79
...
2019-10-27 19:21:52
2.186.151.150 attackbots
[portscan] tcp/23 [TELNET]
in spfbl.net:'listed'
*(RWIN=38480)(10271127)
2019-10-27 19:21:34

最近上报的IP列表

41.251.182.219 151.165.167.85 144.234.120.51 16.18.73.162
192.180.255.248 153.132.93.95 83.19.63.112 49.30.7.115
210.57.127.186 205.229.61.67 242.122.26.239 119.73.221.19
37.118.138.26 147.115.147.167 239.143.214.174 124.96.165.213
185.81.188.16 120.141.145.223 90.165.6.204 73.22.162.156