必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): Thailand

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 119.59.104.14
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 37320
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;119.59.104.14.			IN	A

;; AUTHORITY SECTION:
.			418	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022021702 1800 900 604800 86400

;; Query time: 21 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 18 06:35:13 CST 2022
;; MSG SIZE  rcvd: 106
HOST信息:
Host 14.104.59.119.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 14.104.59.119.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
27.154.58.154 attackspambots
Invalid user hadoop from 27.154.58.154 port 35439
2020-04-20 03:19:09
49.235.13.95 attackspambots
Apr 19 13:20:58 ny01 sshd[24830]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.235.13.95
Apr 19 13:21:00 ny01 sshd[24830]: Failed password for invalid user rj from 49.235.13.95 port 50842 ssh2
Apr 19 13:25:34 ny01 sshd[25763]: Failed password for root from 49.235.13.95 port 43282 ssh2
2020-04-20 02:50:22
122.155.11.89 attack
(sshd) Failed SSH login from 122.155.11.89 (TH/Thailand/-/-/-/[AS9335 CAT Telecom Public Company Limited]): 1 in the last 3600 secs
2020-04-20 02:46:23
77.42.96.93 attackspambots
Unauthorized connection attempt detected from IP address 77.42.96.93 to port 23
2020-04-20 02:56:09
79.122.97.57 attackbots
T: f2b ssh aggressive 3x
2020-04-20 03:14:07
112.18.29.152 attack
Apr 19 20:11:12  sshd\[9153\]: User root from 112.18.29.152 not allowed because not listed in AllowUsersApr 19 20:11:15  sshd\[9153\]: Failed password for invalid user root from 112.18.29.152 port 49519 ssh2
...
2020-04-20 02:48:17
51.255.233.72 attack
Apr 19 21:13:36 santamaria sshd\[25440\]: Invalid user nv from 51.255.233.72
Apr 19 21:13:36 santamaria sshd\[25440\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.255.233.72
Apr 19 21:13:38 santamaria sshd\[25440\]: Failed password for invalid user nv from 51.255.233.72 port 43892 ssh2
...
2020-04-20 03:16:42
143.215.216.144 attackbotsspam
Invalid user tester1 from 143.215.216.144 port 48734
2020-04-20 03:04:47
106.12.23.198 attackspambots
Apr 19 20:04:29 pornomens sshd\[3763\]: Invalid user git from 106.12.23.198 port 51260
Apr 19 20:04:29 pornomens sshd\[3763\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.23.198
Apr 19 20:04:29 pornomens sshd\[3762\]: Invalid user git from 106.12.23.198 port 51258
Apr 19 20:04:29 pornomens sshd\[3762\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.23.198
...
2020-04-20 03:10:45
129.146.103.40 attack
2020-04-19T18:23:56.207995amanda2.illicoweb.com sshd\[47808\]: Invalid user userftp from 129.146.103.40 port 43346
2020-04-19T18:23:56.210752amanda2.illicoweb.com sshd\[47808\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.146.103.40
2020-04-19T18:23:57.924709amanda2.illicoweb.com sshd\[47808\]: Failed password for invalid user userftp from 129.146.103.40 port 43346 ssh2
2020-04-19T18:28:35.455708amanda2.illicoweb.com sshd\[48018\]: Invalid user admin from 129.146.103.40 port 39676
2020-04-19T18:28:35.457957amanda2.illicoweb.com sshd\[48018\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.146.103.40
...
2020-04-20 02:57:44
211.219.114.39 attackspam
Apr 19 20:18:19 raspberrypi sshd[29572]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=211.219.114.39
2020-04-20 02:59:13
78.29.8.245 attackbots
Apr 19 19:40:00 server sshd[3589]: Failed password for root from 78.29.8.245 port 60448 ssh2
Apr 19 19:44:29 server sshd[4529]: Failed password for root from 78.29.8.245 port 49594 ssh2
Apr 19 19:48:57 server sshd[5441]: Failed password for invalid user test from 78.29.8.245 port 38742 ssh2
2020-04-20 03:14:55
126.73.98.250 attackbots
DATE:2020-04-19 17:49:06, IP:126.73.98.250, PORT:ssh SSH brute force auth on honeypot server (epe-honey1-hq)
2020-04-20 03:07:46
68.183.133.156 attackspambots
k+ssh-bruteforce
2020-04-20 03:15:17
36.90.16.22 attack
1587297551 - 04/19/2020 13:59:11 Host: 36.90.16.22/36.90.16.22 Port: 445 TCP Blocked
2020-04-20 02:53:24

最近上报的IP列表

119.59.104.23 119.59.104.26 119.59.104.36 119.59.111.107
119.59.120.12 119.59.120.137 119.59.120.136 119.59.113.164
119.59.120.28 119.59.120.29 119.59.120.3 119.59.120.47
119.59.120.8 119.59.125.186 119.59.126.37 119.59.97.119
119.59.98.110 119.59.97.138 119.59.97.17 119.6.235.187