必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): Republic of China (ROC)

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 119.14.134.7
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 28347
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;119.14.134.7.			IN	A

;; AUTHORITY SECTION:
.			199	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2020092600 1800 900 604800 86400

;; Query time: 65 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Sep 26 20:07:52 CST 2020
;; MSG SIZE  rcvd: 116
HOST信息:
7.134.14.119.in-addr.arpa domain name pointer host-7.134-14-119.dynamic.totalbb.net.tw.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
7.134.14.119.in-addr.arpa	name = host-7.134-14-119.dynamic.totalbb.net.tw.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
122.51.238.211 attack
Automatic report BANNED IP
2020-03-22 06:49:23
149.153.157.161 proxy
Admin plese
2020-03-22 06:50:19
51.161.51.148 attackbots
2020-03-21T16:10:17.402057linuxbox-skyline sshd[68608]: Invalid user andoria from 51.161.51.148 port 54044
...
2020-03-22 06:37:50
94.241.26.42 attackbotsspam
DATE:2020-03-21 22:06:03, IP:94.241.26.42, PORT:telnet Telnet brute force auth on honeypot server (epe-honey1-hq)
2020-03-22 06:27:55
149.153.157.161 attackproxy
Admin
2020-03-22 06:44:32
51.75.27.230 attackbotsspam
Automatic report - SSH Brute-Force Attack
2020-03-22 06:28:32
134.209.186.72 attackbots
Mar 21 23:56:55 pkdns2 sshd\[10924\]: Invalid user login from 134.209.186.72Mar 21 23:56:58 pkdns2 sshd\[10924\]: Failed password for invalid user login from 134.209.186.72 port 53882 ssh2Mar 22 00:01:50 pkdns2 sshd\[11152\]: Invalid user ismail from 134.209.186.72Mar 22 00:01:52 pkdns2 sshd\[11152\]: Failed password for invalid user ismail from 134.209.186.72 port 33396 ssh2Mar 22 00:06:20 pkdns2 sshd\[11364\]: Invalid user dp from 134.209.186.72Mar 22 00:06:22 pkdns2 sshd\[11364\]: Failed password for invalid user dp from 134.209.186.72 port 39712 ssh2
...
2020-03-22 06:27:08
80.82.64.134 attackbots
2020-03-21T17:45:45.761768sorsha.thespaminator.com sshd[14586]: Invalid user admin from 80.82.64.134 port 12278
2020-03-21T17:45:48.459021sorsha.thespaminator.com sshd[14586]: Failed password for invalid user admin from 80.82.64.134 port 12278 ssh2
...
2020-03-22 06:39:44
77.75.76.162 attack
20 attempts against mh-misbehave-ban on pluto
2020-03-22 06:59:23
181.213.45.17 attackbotsspam
Mar 21 22:04:40 DAAP sshd[27886]: Invalid user wftuser from 181.213.45.17 port 34112
Mar 21 22:04:40 DAAP sshd[27886]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=181.213.45.17
Mar 21 22:04:40 DAAP sshd[27886]: Invalid user wftuser from 181.213.45.17 port 34112
Mar 21 22:04:41 DAAP sshd[27886]: Failed password for invalid user wftuser from 181.213.45.17 port 34112 ssh2
Mar 21 22:09:44 DAAP sshd[28005]: Invalid user a from 181.213.45.17 port 58533
...
2020-03-22 06:24:37
73.70.218.63 attackbots
Mar 21 22:09:09 mout sshd[12403]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=73.70.218.63  user=pi
Mar 21 22:09:11 mout sshd[12403]: Failed password for pi from 73.70.218.63 port 60836 ssh2
Mar 21 22:09:11 mout sshd[12403]: Connection closed by 73.70.218.63 port 60836 [preauth]
2020-03-22 06:55:24
51.91.157.114 attackbots
Mar 21 21:14:34 vlre-nyc-1 sshd\[32748\]: Invalid user nesta from 51.91.157.114
Mar 21 21:14:34 vlre-nyc-1 sshd\[32748\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.91.157.114
Mar 21 21:14:36 vlre-nyc-1 sshd\[32748\]: Failed password for invalid user nesta from 51.91.157.114 port 43072 ssh2
Mar 21 21:20:02 vlre-nyc-1 sshd\[445\]: Invalid user admin from 51.91.157.114
Mar 21 21:20:02 vlre-nyc-1 sshd\[445\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.91.157.114
...
2020-03-22 06:30:26
188.254.0.183 attack
Mar 21 22:30:10 rotator sshd\[3527\]: Invalid user ib from 188.254.0.183Mar 21 22:30:12 rotator sshd\[3527\]: Failed password for invalid user ib from 188.254.0.183 port 51760 ssh2Mar 21 22:34:04 rotator sshd\[4085\]: Invalid user openvpn from 188.254.0.183Mar 21 22:34:06 rotator sshd\[4085\]: Failed password for invalid user openvpn from 188.254.0.183 port 39128 ssh2Mar 21 22:38:14 rotator sshd\[4922\]: Invalid user jenkins from 188.254.0.183Mar 21 22:38:16 rotator sshd\[4922\]: Failed password for invalid user jenkins from 188.254.0.183 port 54730 ssh2
...
2020-03-22 06:28:49
124.156.102.254 attackbotsspam
Mar 21 23:08:35 localhost sshd\[27582\]: Invalid user ql from 124.156.102.254
Mar 21 23:08:35 localhost sshd\[27582\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=124.156.102.254
Mar 21 23:08:37 localhost sshd\[27582\]: Failed password for invalid user ql from 124.156.102.254 port 50544 ssh2
Mar 21 23:14:28 localhost sshd\[27955\]: Invalid user fujimoto from 124.156.102.254
Mar 21 23:14:28 localhost sshd\[27955\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=124.156.102.254
...
2020-03-22 06:27:33
91.243.167.131 attackbotsspam
Automatic report - Port Scan Attack
2020-03-22 07:00:07

最近上报的IP列表

102.149.63.70 135.231.109.180 51.91.176.108 205.185.121.13
188.124.244.119 68.0.2.93 162.67.147.173 37.235.52.41
190.120.249.98 37.147.85.156 64.64.239.39 84.158.163.29
172.83.45.188 180.76.178.253 26.75.17.23 0.1.30.12
85.237.180.209 47.209.21.9 223.233.93.136 180.94.54.4