必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): China

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 124.14.14.220
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 55351
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;124.14.14.220.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025013100 1800 900 604800 86400

;; Query time: 69 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Jan 31 22:01:58 CST 2025
;; MSG SIZE  rcvd: 106
HOST信息:
b'Host 220.14.14.124.in-addr.arpa not found: 2(SERVFAIL)
'
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 220.14.14.124.in-addr.arpa: NXDOMAIN

相关IP信息:
最新评论:
IP 类型 评论内容 时间
123.21.176.199 attackbots
Dec 17 07:26:29 mail postfix/submission/smtpd[27799]: warning: unknown[123.21.176.199]: SASL PLAIN authentication failed: 
Dec 17 07:26:37 mail postfix/submission/smtpd[27799]: warning: unknown[123.21.176.199]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Dec 17 07:26:45 mail postfix/submission/smtpd[27799]: warning: unknown[123.21.176.199]: SASL PLAIN authentication failed:
2019-12-17 15:32:06
185.143.223.104 attack
Dec 17 07:48:56 debian-2gb-nbg1-2 kernel: \[218116.451634\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=185.143.223.104 DST=195.201.40.59 LEN=40 TOS=0x00 PREC=0x00 TTL=246 ID=46074 PROTO=TCP SPT=59270 DPT=5215 WINDOW=1024 RES=0x00 SYN URGP=0
2019-12-17 15:17:45
37.210.227.12 attackspambots
Dec 17 08:15:58 mail sshd[17042]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=37.210.227.12 
Dec 17 08:16:00 mail sshd[17042]: Failed password for invalid user kusano from 37.210.227.12 port 35492 ssh2
Dec 17 08:22:57 mail sshd[20614]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=37.210.227.12
2019-12-17 15:34:49
189.2.65.162 attackbotsspam
Absender hat Spam-Falle ausgel?st
2019-12-17 15:43:55
49.235.219.96 attackbots
Dec 17 08:10:29 vps647732 sshd[22716]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.235.219.96
Dec 17 08:10:31 vps647732 sshd[22716]: Failed password for invalid user named from 49.235.219.96 port 51686 ssh2
...
2019-12-17 15:26:42
41.185.31.37 attackbots
Dec 17 08:36:18 sd-53420 sshd\[5766\]: Invalid user rosvold from 41.185.31.37
Dec 17 08:36:18 sd-53420 sshd\[5766\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=41.185.31.37
Dec 17 08:36:20 sd-53420 sshd\[5766\]: Failed password for invalid user rosvold from 41.185.31.37 port 42152 ssh2
Dec 17 08:36:59 sd-53420 sshd\[6030\]: Invalid user roswati from 41.185.31.37
Dec 17 08:36:59 sd-53420 sshd\[6030\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=41.185.31.37
...
2019-12-17 15:37:45
40.92.20.24 attackspambots
Dec 17 09:29:46 debian-2gb-vpn-nbg1-1 kernel: [942553.736939] [UFW BLOCK] IN=eth0 OUT= MAC=96:00:00:38:96:44:d2:74:7f:6e:37:e3:08:00 SRC=40.92.20.24 DST=78.46.192.101 LEN=52 TOS=0x02 PREC=0x00 TTL=106 ID=27163 DF PROTO=TCP SPT=36064 DPT=25 WINDOW=8192 RES=0x00 CWR ECE SYN URGP=0
2019-12-17 15:28:35
49.232.34.247 attackbotsspam
2019-12-17T07:23:00.052074scmdmz1 sshd\[14449\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.232.34.247  user=root
2019-12-17T07:23:02.221467scmdmz1 sshd\[14449\]: Failed password for root from 49.232.34.247 port 41098 ssh2
2019-12-17T07:30:41.206340scmdmz1 sshd\[15244\]: Invalid user virtualdomains from 49.232.34.247 port 34048
...
2019-12-17 15:05:06
122.49.216.108 attackspam
Dec 17 08:08:12 mail postfix/smtpd[11786]: warning: unknown[122.49.216.108]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Dec 17 08:14:08 mail postfix/smtpd[16268]: warning: unknown[122.49.216.108]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Dec 17 08:14:25 mail postfix/smtpd[14749]: warning: unknown[122.49.216.108]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
2019-12-17 15:32:26
140.143.228.18 attackspam
Dec 17 07:59:39 localhost sshd\[11477\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=140.143.228.18  user=root
Dec 17 07:59:41 localhost sshd\[11477\]: Failed password for root from 140.143.228.18 port 51258 ssh2
Dec 17 08:06:36 localhost sshd\[11968\]: Invalid user jerry from 140.143.228.18
Dec 17 08:06:36 localhost sshd\[11968\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=140.143.228.18
Dec 17 08:06:38 localhost sshd\[11968\]: Failed password for invalid user jerry from 140.143.228.18 port 47722 ssh2
...
2019-12-17 15:15:38
182.180.128.132 attackbots
Dec 17 08:02:11 mail sshd[11055]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.180.128.132 
Dec 17 08:02:13 mail sshd[11055]: Failed password for invalid user P@$$W0RD456 from 182.180.128.132 port 35642 ssh2
Dec 17 08:09:41 mail sshd[14478]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.180.128.132
2019-12-17 15:30:26
54.87.68.224 attackbots
Port Scan
2019-12-17 15:22:30
142.93.26.245 attack
Dec 17 07:21:18 web8 sshd\[30136\]: Invalid user ftp from 142.93.26.245
Dec 17 07:21:18 web8 sshd\[30136\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.26.245
Dec 17 07:21:19 web8 sshd\[30136\]: Failed password for invalid user ftp from 142.93.26.245 port 39360 ssh2
Dec 17 07:26:38 web8 sshd\[363\]: Invalid user janith from 142.93.26.245
Dec 17 07:26:38 web8 sshd\[363\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.26.245
2019-12-17 15:38:00
201.236.240.145 attackspambots
1576564200 - 12/17/2019 07:30:00 Host: 201.236.240.145/201.236.240.145 Port: 445 TCP Blocked
2019-12-17 15:12:36
117.254.49.226 attackspam
Unauthorized connection attempt detected from IP address 117.254.49.226 to port 445
2019-12-17 15:24:49

最近上报的IP列表

127.122.119.204 60.63.87.176 26.7.179.230 45.20.8.229
147.187.208.0 255.88.13.145 124.48.198.250 121.132.66.105
23.244.51.73 53.116.85.115 31.230.29.107 94.209.201.104
254.192.175.19 93.42.244.3 59.204.104.60 204.125.106.247
103.153.7.189 157.25.8.131 203.145.106.199 249.210.105.73