必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): Hong Kong

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 14.0.136.128
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 50717
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;14.0.136.128.			IN	A

;; AUTHORITY SECTION:
.			600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022020700 1800 900 604800 86400

;; Query time: 15 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Feb 07 15:39:17 CST 2022
;; MSG SIZE  rcvd: 105
HOST信息:
128.136.0.14.in-addr.arpa domain name pointer 14-0-136-128.static.pccw-hkt.com.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
128.136.0.14.in-addr.arpa	name = 14-0-136-128.static.pccw-hkt.com.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
114.85.3.57 attack
Honeypot attack, port: 445, PTR: PTR record not found
2019-09-02 05:58:11
114.7.120.10 attackbotsspam
Sep  1 11:30:32 web1 sshd\[25719\]: Invalid user sarah from 114.7.120.10
Sep  1 11:30:32 web1 sshd\[25719\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=114.7.120.10
Sep  1 11:30:34 web1 sshd\[25719\]: Failed password for invalid user sarah from 114.7.120.10 port 50175 ssh2
Sep  1 11:35:18 web1 sshd\[26215\]: Invalid user tasatje from 114.7.120.10
Sep  1 11:35:18 web1 sshd\[26215\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=114.7.120.10
2019-09-02 05:48:51
223.237.2.237 attackbots
Unauthorized connection attempt from IP address 223.237.2.237 on Port 445(SMB)
2019-09-02 05:53:26
201.163.180.183 attackspam
2019-09-01T20:52:56.161493abusebot-3.cloudsearch.cf sshd\[25024\]: Invalid user admin from 201.163.180.183 port 53236
2019-09-02 05:31:32
117.60.134.28 attackspambots
SSH/22 MH Probe, BF, Hack -
2019-09-02 05:48:00
82.200.139.170 attackspambots
Sep  1 07:16:36 *** sshd[26579]: Failed password for invalid user training from 82.200.139.170 port 55414 ssh2
Sep  1 07:25:19 *** sshd[26782]: Failed password for invalid user eoffice from 82.200.139.170 port 49810 ssh2
Sep  1 07:29:45 *** sshd[26850]: Failed password for invalid user gianni from 82.200.139.170 port 38308 ssh2
Sep  1 07:34:00 *** sshd[26907]: Failed password for invalid user caratvodka from 82.200.139.170 port 55060 ssh2
Sep  1 07:38:23 *** sshd[26964]: Failed password for invalid user arma3server from 82.200.139.170 port 43564 ssh2
Sep  1 07:47:19 *** sshd[27203]: Failed password for invalid user uno from 82.200.139.170 port 48828 ssh2
Sep  1 07:56:13 *** sshd[27316]: Failed password for invalid user mech from 82.200.139.170 port 54028 ssh2
Sep  1 08:00:46 *** sshd[27403]: Failed password for invalid user sly from 82.200.139.170 port 42598 ssh2
Sep  1 08:05:18 *** sshd[27538]: Failed password for invalid user pqc from 82.200.139.170 port 59350 ssh2
Sep  1 08:09:45 *** sshd[27656]: Failed pa
2019-09-02 05:59:08
202.65.140.66 attack
2019-09-01T15:26:42.524148mizuno.rwx.ovh sshd[23285]: Connection from 202.65.140.66 port 33028 on 78.46.61.178 port 22
2019-09-01T15:26:43.514372mizuno.rwx.ovh sshd[23285]: Invalid user fu from 202.65.140.66 port 33028
2019-09-01T15:26:43.524901mizuno.rwx.ovh sshd[23285]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=202.65.140.66
2019-09-01T15:26:42.524148mizuno.rwx.ovh sshd[23285]: Connection from 202.65.140.66 port 33028 on 78.46.61.178 port 22
2019-09-01T15:26:43.514372mizuno.rwx.ovh sshd[23285]: Invalid user fu from 202.65.140.66 port 33028
2019-09-01T15:26:45.887417mizuno.rwx.ovh sshd[23285]: Failed password for invalid user fu from 202.65.140.66 port 33028 ssh2
...
2019-09-02 06:09:20
190.186.170.83 attackspam
Sep  1 22:19:44 server sshd[29554]: Failed password for invalid user jesse from 190.186.170.83 port 58904 ssh2
Sep  1 22:34:11 server sshd[32998]: Failed password for invalid user suresh from 190.186.170.83 port 35618 ssh2
Sep  1 22:38:53 server sshd[34165]: Failed password for root from 190.186.170.83 port 50572 ssh2
2019-09-02 06:11:46
58.27.132.70 attack
Unauthorized connection attempt from IP address 58.27.132.70 on Port 445(SMB)
2019-09-02 05:51:49
52.163.126.214 attackspambots
Sep  1 23:48:48 localhost sshd\[4557\]: Invalid user bryce from 52.163.126.214 port 56288
Sep  1 23:48:48 localhost sshd\[4557\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=52.163.126.214
Sep  1 23:48:50 localhost sshd\[4557\]: Failed password for invalid user bryce from 52.163.126.214 port 56288 ssh2
2019-09-02 05:55:19
138.99.16.120 attack
Brute forcing RDP port 3389
2019-09-02 05:49:53
139.59.170.23 attackbotsspam
Sep  2 03:29:09 areeb-Workstation sshd[31367]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.170.23
Sep  2 03:29:11 areeb-Workstation sshd[31367]: Failed password for invalid user test from 139.59.170.23 port 41438 ssh2
...
2019-09-02 06:05:29
180.76.97.86 attackbots
Sep  1 23:44:55 plex sshd[368]: Invalid user coracaobobo from 180.76.97.86 port 49494
2019-09-02 06:04:43
213.33.209.98 attackspam
Unauthorized connection attempt from IP address 213.33.209.98 on Port 445(SMB)
2019-09-02 06:16:54
45.55.243.124 attack
Sep  1 15:16:37 Tower sshd[2772]: Connection from 45.55.243.124 port 52106 on 192.168.10.220 port 22
Sep  1 15:16:37 Tower sshd[2772]: Invalid user anand from 45.55.243.124 port 52106
Sep  1 15:16:37 Tower sshd[2772]: error: Could not get shadow information for NOUSER
Sep  1 15:16:37 Tower sshd[2772]: Failed password for invalid user anand from 45.55.243.124 port 52106 ssh2
Sep  1 15:16:37 Tower sshd[2772]: Received disconnect from 45.55.243.124 port 52106:11: Bye Bye [preauth]
Sep  1 15:16:37 Tower sshd[2772]: Disconnected from invalid user anand 45.55.243.124 port 52106 [preauth]
2019-09-02 05:30:18

最近上报的IP列表

182.137.233.128 58.253.146.117 108.214.49.232 217.146.82.20
103.69.216.225 120.229.93.242 170.150.181.254 107.174.20.131
46.100.78.16 112.137.132.89 124.121.127.135 2.61.89.171
67.78.78.198 119.136.155.182 187.162.47.129 83.233.188.133
163.179.167.53 5.227.217.26 120.34.165.248 112.94.100.209