必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): United States of America (the)

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 128.215.104.114
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 29744
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;128.215.104.114.		IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025021100 1800 900 604800 86400

;; Query time: 13 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Feb 11 22:37:48 CST 2025
;; MSG SIZE  rcvd: 108
HOST信息:
Host 114.104.215.128.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 114.104.215.128.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
112.9.88.30 attackbots
(Oct 12)  LEN=40 TOS=0x04 TTL=47 ID=51371 TCP DPT=8080 WINDOW=46856 SYN 
 (Oct 12)  LEN=40 TOS=0x04 TTL=49 ID=1523 TCP DPT=8080 WINDOW=46856 SYN 
 (Oct 12)  LEN=40 TOS=0x04 TTL=47 ID=62704 TCP DPT=8080 WINDOW=57936 SYN 
 (Oct 11)  LEN=40 TOS=0x04 TTL=47 ID=62227 TCP DPT=8080 WINDOW=46856 SYN 
 (Oct 11)  LEN=40 TOS=0x04 TTL=47 ID=58018 TCP DPT=8080 WINDOW=46856 SYN 
 (Oct 11)  LEN=40 TOS=0x04 TTL=49 ID=65533 TCP DPT=8080 WINDOW=57936 SYN 
 (Oct 11)  LEN=40 TOS=0x04 TTL=50 ID=10694 TCP DPT=8080 WINDOW=46856 SYN 
 (Oct  9)  LEN=40 TOS=0x04 TTL=47 ID=60009 TCP DPT=8080 WINDOW=46856 SYN 
 (Oct  8)  LEN=40 TOS=0x04 TTL=49 ID=47566 TCP DPT=8080 WINDOW=57936 SYN 
 (Oct  7)  LEN=40 TOS=0x04 TTL=47 ID=44060 TCP DPT=8080 WINDOW=57936 SYN 
 (Oct  7)  LEN=40 TOS=0x04 TTL=49 ID=35935 TCP DPT=8080 WINDOW=46856 SYN 
 (Oct  7)  LEN=40 TOS=0x04 TTL=49 ID=64078 TCP DPT=8080 WINDOW=46856 SYN
2019-10-12 15:29:08
54.38.192.96 attackspam
2019-10-12T09:03:11.558164  sshd[22766]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=54.38.192.96  user=root
2019-10-12T09:03:13.512845  sshd[22766]: Failed password for root from 54.38.192.96 port 54476 ssh2
2019-10-12T09:07:14.493892  sshd[22860]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=54.38.192.96  user=root
2019-10-12T09:07:15.806417  sshd[22860]: Failed password for root from 54.38.192.96 port 37456 ssh2
2019-10-12T09:11:20.354128  sshd[22900]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=54.38.192.96  user=root
2019-10-12T09:11:22.107908  sshd[22900]: Failed password for root from 54.38.192.96 port 48684 ssh2
...
2019-10-12 15:53:29
128.199.137.252 attackbotsspam
Oct 11 21:25:04 kapalua sshd\[32751\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.199.137.252  user=root
Oct 11 21:25:06 kapalua sshd\[32751\]: Failed password for root from 128.199.137.252 port 54344 ssh2
Oct 11 21:29:58 kapalua sshd\[723\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.199.137.252  user=root
Oct 11 21:30:00 kapalua sshd\[723\]: Failed password for root from 128.199.137.252 port 36430 ssh2
Oct 11 21:34:45 kapalua sshd\[1173\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.199.137.252  user=root
2019-10-12 15:41:01
157.230.128.195 attackbotsspam
Oct 11 21:40:39 hanapaa sshd\[7802\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.230.128.195  user=root
Oct 11 21:40:41 hanapaa sshd\[7802\]: Failed password for root from 157.230.128.195 port 40794 ssh2
Oct 11 21:45:01 hanapaa sshd\[8182\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.230.128.195  user=root
Oct 11 21:45:04 hanapaa sshd\[8182\]: Failed password for root from 157.230.128.195 port 51564 ssh2
Oct 11 21:49:11 hanapaa sshd\[8502\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.230.128.195  user=root
2019-10-12 15:49:26
168.0.149.233 attack
Port 1433 Scan
2019-10-12 15:56:30
178.176.176.191 attack
Unauthorised access (Oct 12) SRC=178.176.176.191 LEN=52 TTL=113 ID=24751 DF TCP DPT=445 WINDOW=8192 SYN
2019-10-12 15:53:05
183.250.26.178 attack
Port 1433 Scan
2019-10-12 15:43:42
27.254.153.10 attack
[Fri Oct 11 06:42:44 2019] [error] [client 27.254.153.10] File does not exist: /home/shidong/public_html/test
2019-10-12 15:45:40
88.135.229.34 attack
Automatic report - Port Scan Attack
2019-10-12 15:44:35
125.22.98.171 attackspam
Oct 11 21:08:36 eddieflores sshd\[6431\]: Invalid user 6y5t4r3e2w1q from 125.22.98.171
Oct 11 21:08:36 eddieflores sshd\[6431\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=125.22.98.171
Oct 11 21:08:38 eddieflores sshd\[6431\]: Failed password for invalid user 6y5t4r3e2w1q from 125.22.98.171 port 37498 ssh2
Oct 11 21:13:34 eddieflores sshd\[6904\]: Invalid user P@ssword123!@\# from 125.22.98.171
Oct 11 21:13:34 eddieflores sshd\[6904\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=125.22.98.171
2019-10-12 15:26:47
112.85.42.195 attack
Oct 12 07:45:16 game-panel sshd[29473]: Failed password for root from 112.85.42.195 port 53935 ssh2
Oct 12 07:46:12 game-panel sshd[29496]: Failed password for root from 112.85.42.195 port 33305 ssh2
Oct 12 07:46:14 game-panel sshd[29496]: Failed password for root from 112.85.42.195 port 33305 ssh2
2019-10-12 15:59:21
43.248.123.194 attackbotsspam
Oct 12 09:04:41 MK-Soft-VM4 sshd[6343]: Failed password for root from 43.248.123.194 port 52310 ssh2
...
2019-10-12 16:02:59
106.13.56.72 attackbotsspam
$f2bV_matches
2019-10-12 16:13:20
69.162.108.171 attackspam
Portscan or hack attempt detected by psad/fwsnort
2019-10-12 15:59:55
203.195.235.135 attackbots
Oct 12 07:56:40 mail sshd\[22466\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=203.195.235.135  user=root
Oct 12 07:56:42 mail sshd\[22466\]: Failed password for root from 203.195.235.135 port 36902 ssh2
Oct 12 08:01:51 mail sshd\[22682\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=203.195.235.135  user=root
...
2019-10-12 16:04:12

最近上报的IP列表

121.120.182.208 145.96.124.94 191.184.219.217 98.79.30.18
187.68.122.151 5.154.173.39 139.214.47.152 86.207.253.15
67.49.188.181 136.115.115.169 162.212.167.202 237.119.23.70
198.76.214.127 232.141.51.60 64.208.197.151 207.110.78.178
84.232.176.13 26.3.47.57 243.141.226.18 52.254.217.190