必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): Republic of China (ROC)

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 119.14.159.46
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 27143
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;119.14.159.46.			IN	A

;; AUTHORITY SECTION:
.			260	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022091402 1800 900 604800 86400

;; Query time: 27 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Sep 15 07:58:25 CST 2022
;; MSG SIZE  rcvd: 106
HOST信息:
b';; connection timed out; no servers could be reached
'
NSLOOKUP信息:
;; Got SERVFAIL reply from 183.60.83.19, trying next server
Server:		183.60.82.98
Address:	183.60.82.98#53

** server can't find 46.159.14.119.in-addr.arpa: SERVFAIL

相关IP信息:
最新评论:
IP 类型 评论内容 时间
171.13.5.102 attack
Rude login attack (3 tries in 1d)
2019-09-21 00:39:53
195.48.56.14 attackspam
445/tcp 445/tcp 445/tcp...
[2019-07-25/09-19]13pkt,1pt.(tcp)
2019-09-21 00:45:02
119.96.221.11 attackbots
20.09.2019 13:39:52 SMTP access blocked by firewall
2019-09-21 00:43:29
193.112.74.137 attack
(sshd) Failed SSH login from 193.112.74.137 (CN/China/-): 3 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: Sep 20 16:35:22 andromeda sshd[19333]: Invalid user sinusbot from 193.112.74.137 port 34731
Sep 20 16:35:24 andromeda sshd[19333]: Failed password for invalid user sinusbot from 193.112.74.137 port 34731 ssh2
Sep 20 16:47:08 andromeda sshd[20749]: Invalid user marilia from 193.112.74.137 port 51083
2019-09-21 00:54:11
177.32.65.38 attackspambots
Sep 20 11:24:14 markkoudstaal sshd[26336]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=177.32.65.38
Sep 20 11:24:16 markkoudstaal sshd[26336]: Failed password for invalid user alex from 177.32.65.38 port 59169 ssh2
Sep 20 11:29:32 markkoudstaal sshd[26859]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=177.32.65.38
2019-09-21 00:21:47
185.234.219.51 attackspambots
Rude login attack (26 tries in 1d)
2019-09-21 01:05:24
185.53.168.160 attackbotsspam
Sep 20 14:52:14 heicom postfix/smtpd\[23521\]: warning: unknown\[185.53.168.160\]: SASL LOGIN authentication failed: authentication failure
Sep 20 15:08:33 heicom postfix/smtpd\[23608\]: warning: unknown\[185.53.168.160\]: SASL LOGIN authentication failed: authentication failure
Sep 20 15:35:52 heicom postfix/smtpd\[25598\]: warning: unknown\[185.53.168.160\]: SASL LOGIN authentication failed: authentication failure
Sep 20 15:40:12 heicom postfix/smtpd\[23521\]: warning: unknown\[185.53.168.160\]: SASL LOGIN authentication failed: authentication failure
Sep 20 16:23:38 heicom postfix/smtpd\[27347\]: warning: unknown\[185.53.168.160\]: SASL LOGIN authentication failed: authentication failure
...
2019-09-21 01:03:19
176.31.191.61 attack
SSH Brute Force, server-1 sshd[29663]: Failed password for invalid user packet from 176.31.191.61 port 45158 ssh2
2019-09-21 00:56:28
112.64.137.178 attackspambots
SSH Brute Force, server-1 sshd[26995]: Failed password for invalid user rudy from 112.64.137.178 port 2375 ssh2
2019-09-21 00:59:42
49.88.112.80 attack
SSH authentication failure x 6 reported by Fail2Ban
...
2019-09-21 01:02:16
134.209.51.28 attack
[munged]::443 134.209.51.28 - - [20/Sep/2019:11:12:46 +0200] "POST /[munged]: HTTP/1.1" 200 9079 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
[munged]::443 134.209.51.28 - - [20/Sep/2019:11:12:49 +0200] "POST /[munged]: HTTP/1.1" 200 9079 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
[munged]::443 134.209.51.28 - - [20/Sep/2019:11:12:53 +0200] "POST /[munged]: HTTP/1.1" 200 9079 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
[munged]::443 134.209.51.28 - - [20/Sep/2019:11:12:56 +0200] "POST /[munged]: HTTP/1.1" 200 9079 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
[munged]::443 134.209.51.28 - - [20/Sep/2019:11:13:00 +0200] "POST /[munged]: HTTP/1.1" 200 9079 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
[munged]::443 134.209.51.28 - - [20/Sep/2019:11:13:05 +0200] "POST /[munged]: HTTP/1.1" 200 9079 "-" "Mozilla/5.0 (X11; Ubun
2019-09-21 00:29:04
190.128.230.14 attackspam
Sep 20 15:56:35 meumeu sshd[25459]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=190.128.230.14 
Sep 20 15:56:36 meumeu sshd[25459]: Failed password for invalid user ospite from 190.128.230.14 port 57058 ssh2
Sep 20 16:02:56 meumeu sshd[26733]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=190.128.230.14 
...
2019-09-21 00:55:42
121.60.80.120 attackbotsspam
23/tcp 23/tcp 23/tcp...
[2019-09-19]82pkt,1pt.(tcp)
2019-09-21 01:12:47
171.241.110.114 attackbots
SSH Brute Force, server-1 sshd[23617]: Failed password for invalid user admin from 171.241.110.114 port 47066 ssh2
2019-09-21 00:48:26
185.166.131.146 attack
xmlrpc attack
2019-09-21 00:25:36

最近上报的IP列表

138.117.229.0 200.34.239.180 175.169.26.80 43.134.178.233
201.251.155.249 20.238.51.35 23.250.32.192 144.168.152.73
181.215.190.36 191.96.157.30 179.176.177.8 199.67.248.21
181.215.73.246 104.227.120.251 45.13.184.95 185.136.204.244
220.135.222.190 112.212.109.48 182.180.166.241 14.189.146.67