必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): Germany

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 130.73.236.14
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 13190
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;130.73.236.14.			IN	A

;; AUTHORITY SECTION:
.			29	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025022800 1800 900 604800 86400

;; Query time: 42 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 28 16:10:51 CST 2025
;; MSG SIZE  rcvd: 106
HOST信息:
Host 14.236.73.130.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 14.236.73.130.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
14.248.73.162 attackspambots
Aug 30 18:09:55 mail1 sshd[28926]: Invalid user admin from 14.248.73.162 port 52246
Aug 30 18:09:55 mail1 sshd[28926]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=14.248.73.162
Aug 30 18:09:57 mail1 sshd[28926]: Failed password for invalid user admin from 14.248.73.162 port 52246 ssh2


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=14.248.73.162
2019-08-31 03:23:49
198.50.175.30 attackspam
C1,WP GET /lesemaus/wp-login.php
2019-08-31 02:45:44
121.27.204.195 attack
Unauthorised access (Aug 30) SRC=121.27.204.195 LEN=40 TTL=49 ID=36921 TCP DPT=8080 WINDOW=50070 SYN 
Unauthorised access (Aug 30) SRC=121.27.204.195 LEN=40 TTL=49 ID=52210 TCP DPT=8080 WINDOW=31794 SYN 
Unauthorised access (Aug 29) SRC=121.27.204.195 LEN=40 TTL=49 ID=16406 TCP DPT=8080 WINDOW=5324 SYN 
Unauthorised access (Aug 29) SRC=121.27.204.195 LEN=40 TTL=49 ID=40890 TCP DPT=8080 WINDOW=16965 SYN 
Unauthorised access (Aug 29) SRC=121.27.204.195 LEN=40 TTL=49 ID=62462 TCP DPT=8080 WINDOW=44876 SYN 
Unauthorised access (Aug 28) SRC=121.27.204.195 LEN=40 TTL=49 ID=27826 TCP DPT=8080 WINDOW=55963 SYN 
Unauthorised access (Aug 28) SRC=121.27.204.195 LEN=40 TTL=49 ID=42115 TCP DPT=8080 WINDOW=710 SYN
2019-08-31 02:57:21
159.65.146.153 attack
Aug 30 15:08:23 TORMINT sshd\[29164\]: Invalid user user from 159.65.146.153
Aug 30 15:08:23 TORMINT sshd\[29164\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.65.146.153
Aug 30 15:08:25 TORMINT sshd\[29164\]: Failed password for invalid user user from 159.65.146.153 port 46154 ssh2
...
2019-08-31 03:13:30
128.199.242.84 attackbots
fraudulent SSH attempt
2019-08-31 02:39:35
51.254.37.192 attackbotsspam
Aug 30 23:27:22 itv-usvr-01 sshd[31995]: Invalid user adriana from 51.254.37.192
Aug 30 23:27:22 itv-usvr-01 sshd[31995]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.254.37.192
Aug 30 23:27:22 itv-usvr-01 sshd[31995]: Invalid user adriana from 51.254.37.192
Aug 30 23:27:24 itv-usvr-01 sshd[31995]: Failed password for invalid user adriana from 51.254.37.192 port 43534 ssh2
2019-08-31 02:46:40
203.121.116.11 attackspam
Aug 30 20:41:37 eventyay sshd[10391]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=203.121.116.11
Aug 30 20:41:39 eventyay sshd[10391]: Failed password for invalid user Minecraft from 203.121.116.11 port 56834 ssh2
Aug 30 20:46:28 eventyay sshd[11617]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=203.121.116.11
...
2019-08-31 02:48:16
51.89.185.224 attack
Aug 30 20:28:57 icinga sshd[30022]: Failed password for root from 51.89.185.224 port 46188 ssh2
...
2019-08-31 02:44:16
51.38.90.195 attackspam
Aug 30 19:43:06 cvbmail sshd\[26525\]: Invalid user atir from 51.38.90.195
Aug 30 19:43:06 cvbmail sshd\[26525\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.38.90.195
Aug 30 19:43:08 cvbmail sshd\[26525\]: Failed password for invalid user atir from 51.38.90.195 port 53584 ssh2
2019-08-31 03:02:06
59.42.51.187 attackbotsspam
Aug 30 14:25:38 microserver sshd[47744]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=59.42.51.187  user=ntp
Aug 30 14:25:40 microserver sshd[47744]: Failed password for ntp from 59.42.51.187 port 31098 ssh2
Aug 30 14:34:48 microserver sshd[48560]: Invalid user bb from 59.42.51.187 port 22353
Aug 30 14:34:48 microserver sshd[48560]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=59.42.51.187
Aug 30 14:34:50 microserver sshd[48560]: Failed password for invalid user bb from 59.42.51.187 port 22353 ssh2
Aug 30 16:03:36 microserver sshd[59755]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=59.42.51.187  user=motion
Aug 30 16:03:38 microserver sshd[59755]: Failed password for motion from 59.42.51.187 port 35429 ssh2
Aug 30 16:08:03 microserver sshd[60357]: Invalid user xtra from 59.42.51.187 port 31508
Aug 30 16:08:03 microserver sshd[60357]: pam_unix(sshd:auth): authentication failure; log
2019-08-31 03:20:41
103.50.37.17 attackspam
Aug 30 12:46:24 xb3 sshd[1034]: Failed password for invalid user alejandro from 103.50.37.17 port 16329 ssh2
Aug 30 12:46:24 xb3 sshd[1034]: Received disconnect from 103.50.37.17: 11: Bye Bye [preauth]
Aug 30 13:05:51 xb3 sshd[1494]: Received disconnect from 103.50.37.17: 11: Bye Bye [preauth]
Aug 30 13:11:05 xb3 sshd[3832]: Failed password for invalid user gordon from 103.50.37.17 port 28349 ssh2
Aug 30 13:11:06 xb3 sshd[3832]: Received disconnect from 103.50.37.17: 11: Bye Bye [preauth]
Aug 30 13:16:20 xb3 sshd[6206]: Failed password for invalid user wch from 103.50.37.17 port 45971 ssh2
Aug 30 13:16:20 xb3 sshd[6206]: Received disconnect from 103.50.37.17: 11: Bye Bye [preauth]
Aug 30 13:21:06 xb3 sshd[5895]: Failed password for invalid user butter from 103.50.37.17 port 65014 ssh2
Aug 30 13:21:06 xb3 sshd[5895]: Received disconnect from 103.50.37.17: 11: Bye Bye [preauth]
Aug 30 13:25:52 xb3 sshd[5138]: Failed password for invalid user knox from 103.50.37.17 port 17........
-------------------------------
2019-08-31 02:46:10
201.145.27.102 attack
Aug 30 21:25:10 dedicated sshd[26461]: Invalid user off from 201.145.27.102 port 34860
2019-08-31 03:26:59
218.215.186.102 attackspam
" "
2019-08-31 03:14:53
23.92.225.228 attackspam
Aug 30 18:24:21 www_kotimaassa_fi sshd[2430]: Failed password for root from 23.92.225.228 port 37189 ssh2
...
2019-08-31 02:45:13
103.81.251.167 attack
BURG,WP GET /wp-login.php
2019-08-31 03:10:06

最近上报的IP列表

142.205.196.21 239.66.95.10 170.157.37.125 130.175.52.4
196.10.133.251 167.195.43.245 12.144.19.20 20.127.230.239
69.217.165.205 177.155.228.247 210.246.190.145 240.168.164.16
5.162.204.255 108.104.38.52 117.150.101.173 137.15.29.94
231.180.9.34 37.94.90.170 29.255.75.112 244.94.62.226