必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): None

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 137.115.194.214
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 37980
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;137.115.194.214.		IN	A

;; AUTHORITY SECTION:
.			483	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2020033001 1800 900 604800 86400

;; Query time: 101 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Mar 31 07:49:37 CST 2020
;; MSG SIZE  rcvd: 119
HOST信息:
Host 214.194.115.137.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 214.194.115.137.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
63.221.158.82 attack
[SMB remote code execution attempt: port tcp/445]
*(RWIN=1024)(08041230)
2019-08-05 03:48:04
162.243.144.193 attack
[portscan] tcp/23 [TELNET]
*(RWIN=65535)(08041230)
2019-08-05 04:06:03
85.113.45.145 attackbots
[portscan] Port scan
2019-08-05 03:44:50
185.55.64.144 attackspam
[portscan] tcp/23 [TELNET]
*(RWIN=2846)(08041230)
2019-08-05 03:32:16
61.35.146.68 attackbots
[SMB remote code execution attempt: port tcp/445]
*(RWIN=1024)(08041230)
2019-08-05 03:48:19
94.249.100.172 attackspam
[portscan] tcp/23 [TELNET]
[scan/connect: 4 time(s)]
*(RWIN=625)(08041230)
2019-08-05 04:16:17
201.167.5.150 attack
[SMB remote code execution attempt: port tcp/445]
*(RWIN=8192)(08041230)
2019-08-05 03:58:44
41.162.117.34 attack
[SMB remote code execution attempt: port tcp/445]
*(RWIN=8192)(08041230)
2019-08-05 03:52:45
42.59.195.148 attackbotsspam
[portscan] tcp/23 [TELNET]
*(RWIN=51422)(08041230)
2019-08-05 03:52:14
201.16.137.207 attack
445/tcp
[2019-08-04]1pkt
2019-08-05 03:59:01
208.100.26.228 attackbots
08/04/2019-15:50:53.895724 208.100.26.228 Protocol: 6 ET SCAN NMAP -sS window 1024
2019-08-05 03:56:22
103.117.172.181 attackbotsspam
[SMB remote code execution attempt: port tcp/445]
[scan/connect: 3 time(s)]
*(RWIN=8192)(08041230)
2019-08-05 04:14:59
134.209.114.236 attack
[portscan] tcp/23 [TELNET]
*(RWIN=65535)(08041230)
2019-08-05 04:06:52
150.95.172.156 attackbotsspam
[SMB remote code execution attempt: port tcp/445]
*(RWIN=1024)(08041230)
2019-08-05 03:40:03
104.151.23.2 attackbotsspam
Port Scan: TCP/445
2019-08-05 04:14:08

最近上报的IP列表

154.160.11.234 79.229.85.181 1.237.234.44 189.156.54.145
98.195.108.175 116.100.77.192 115.75.16.183 162.144.81.85
45.174.220.57 255.130.177.20 120.210.176.72 43.254.55.132
68.102.126.209 2a03:b0c0:3:d0::1bc:b001 223.74.148.62 164.155.93.4
67.200.141.231 37.119.175.101 35.186.121.159 105.255.194.93