必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): unknown

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 119.76.132.14
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 49081
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;119.76.132.14.			IN	A

;; AUTHORITY SECTION:
.			595	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022030900 1800 900 604800 86400

;; Query time: 88 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Mar 09 15:55:47 CST 2022
;; MSG SIZE  rcvd: 106
HOST信息:
14.132.76.119.in-addr.arpa domain name pointer ppp-119-76-132-14.revip17.asianet.co.th.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
14.132.76.119.in-addr.arpa	name = ppp-119-76-132-14.revip17.asianet.co.th.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
101.78.149.142 attack
20 attempts against mh-ssh on cloud
2020-09-02 06:27:21
222.186.180.130 attackbotsspam
Sep  1 15:29:54 dignus sshd[7483]: Failed password for root from 222.186.180.130 port 31808 ssh2
Sep  1 15:29:56 dignus sshd[7483]: Failed password for root from 222.186.180.130 port 31808 ssh2
Sep  1 15:29:59 dignus sshd[7512]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.180.130  user=root
Sep  1 15:30:01 dignus sshd[7512]: Failed password for root from 222.186.180.130 port 41550 ssh2
Sep  1 15:30:03 dignus sshd[7512]: Failed password for root from 222.186.180.130 port 41550 ssh2
...
2020-09-02 06:31:27
69.119.85.43 attackspam
(sshd) Failed SSH login from 69.119.85.43 (US/United States/-): 5 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: Sep  1 21:26:31 server sshd[22265]: Invalid user admin from 69.119.85.43
Sep  1 21:26:33 server sshd[22265]: Failed password for invalid user admin from 69.119.85.43 port 48878 ssh2
Sep  1 21:31:03 server sshd[22753]: Failed password for ftp from 69.119.85.43 port 45744 ssh2
Sep  1 21:34:37 server sshd[23143]: Invalid user ftp-user from 69.119.85.43
Sep  1 21:34:39 server sshd[23143]: Failed password for invalid user ftp-user from 69.119.85.43 port 34062 ssh2
2020-09-02 06:30:13
189.204.140.49 attackspam
Unauthorized connection attempt from IP address 189.204.140.49 on Port 445(SMB)
2020-09-02 06:55:53
128.14.226.159 attackspam
Aug  3 06:52:44 server sshd[23021]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.14.226.159  user=root
Aug  3 06:52:46 server sshd[23021]: Failed password for invalid user root from 128.14.226.159 port 58538 ssh2
Aug  3 09:37:36 server sshd[32338]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.14.226.159  user=root
Aug  3 09:37:39 server sshd[32338]: Failed password for invalid user root from 128.14.226.159 port 39586 ssh2
2020-09-02 06:26:30
49.145.104.168 attackspam
Automatic report - XMLRPC Attack
2020-09-02 06:22:27
184.105.139.89 spambotsattackproxy
malware
2020-09-02 06:28:20
103.25.251.233 attackbotsspam
"XSS Attack Detected via libinjection - Matched Data: XSS data found within ARGS_NAMES:
2020-09-02 06:21:35
224.0.0.252 botsattackproxy
there are unmediated big problems with this ip range still, in someway utilising bt tv stream packets unbeknowing to bt home hub wifi customers. devices become host servers and use of US at&t proxy ip's on some home hub locations routing other traffic. BT do not use proxy's on home hub connections
2020-09-02 06:23:55
178.128.45.173 attackspam
SSH Invalid Login
2020-09-02 06:50:24
200.125.190.170 attackspambots
Sep  1 22:00:25 journals sshd\[68610\]: Invalid user marketing from 200.125.190.170
Sep  1 22:00:25 journals sshd\[68610\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=200.125.190.170
Sep  1 22:00:27 journals sshd\[68610\]: Failed password for invalid user marketing from 200.125.190.170 port 48998 ssh2
Sep  1 22:05:17 journals sshd\[69183\]: Invalid user bash from 200.125.190.170
Sep  1 22:05:17 journals sshd\[69183\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=200.125.190.170
...
2020-09-02 06:27:38
52.173.253.120 attackbots
Invalid user tomcat from 52.173.253.120 port 1792
2020-09-02 06:35:09
124.199.133.231 attackbotsspam
SSH/22 MH Probe, BF, Hack -
2020-09-02 06:49:12
112.206.78.249 attack
"XSS Attack Detected via libinjection - Matched Data: XSS data found within ARGS_NAMES:
2020-09-02 06:38:11
51.161.107.124 attack
[ssh] SSH attack
2020-09-02 06:44:25

最近上报的IP列表

119.76.132.137 119.76.132.140 119.76.132.146 211.5.7.237
119.76.132.148 119.76.132.153 119.76.132.157 119.76.132.16
119.76.132.162 48.31.6.127 119.76.132.166 119.76.132.168
132.49.190.0 119.76.132.176 119.76.132.182 119.76.132.184
119.76.132.191 119.76.132.197 119.76.132.198 119.76.132.20