必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): Shanghai

省份(region): Shanghai

国家(country): China

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 14.108.102.139
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 17632
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;14.108.102.139.			IN	A

;; AUTHORITY SECTION:
.			247	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2021122500 1800 900 604800 86400

;; Query time: 16 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Dec 25 19:37:58 CST 2021
;; MSG SIZE  rcvd: 107
HOST信息:
Host 139.102.108.14.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 139.102.108.14.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
213.132.246.230 attackspam
[Aegis] @ 2019-11-24 04:53:18  0000 -> Sendmail rejected message.
2019-11-24 14:25:22
174.138.15.92 attackspambots
Nov 24 06:23:40 localhost sshd\[21080\]: Invalid user ts3server from 174.138.15.92 port 57892
Nov 24 06:23:40 localhost sshd\[21080\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=174.138.15.92
Nov 24 06:23:42 localhost sshd\[21080\]: Failed password for invalid user ts3server from 174.138.15.92 port 57892 ssh2
Nov 24 06:29:51 localhost sshd\[21347\]: Invalid user goree from 174.138.15.92 port 37398
Nov 24 06:29:51 localhost sshd\[21347\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=174.138.15.92
...
2019-11-24 14:49:34
178.212.89.128 attackbotsspam
3389BruteforceFW21
2019-11-24 14:27:29
51.75.195.222 attackspam
2019-11-24T07:29:51.035662scmdmz1 sshd\[19039\]: Invalid user rasdzv3 from 51.75.195.222 port 48246
2019-11-24T07:29:51.038293scmdmz1 sshd\[19039\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.ip-51-75-195.eu
2019-11-24T07:29:52.716559scmdmz1 sshd\[19039\]: Failed password for invalid user rasdzv3 from 51.75.195.222 port 48246 ssh2
...
2019-11-24 14:46:54
178.128.171.124 attackspam
failed_logins
2019-11-24 14:50:20
182.254.172.63 attackbots
Nov 24 07:25:25 sd-53420 sshd\[3533\]: Invalid user Founder123 from 182.254.172.63
Nov 24 07:25:25 sd-53420 sshd\[3533\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.254.172.63
Nov 24 07:25:28 sd-53420 sshd\[3533\]: Failed password for invalid user Founder123 from 182.254.172.63 port 59726 ssh2
Nov 24 07:29:36 sd-53420 sshd\[4710\]: Invalid user bailey from 182.254.172.63
Nov 24 07:29:36 sd-53420 sshd\[4710\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.254.172.63
...
2019-11-24 14:55:35
5.195.233.41 attack
Nov 23 20:41:36 sachi sshd\[10978\]: Invalid user admin from 5.195.233.41
Nov 23 20:41:36 sachi sshd\[10978\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=5.195.233.41
Nov 23 20:41:38 sachi sshd\[10978\]: Failed password for invalid user admin from 5.195.233.41 port 44044 ssh2
Nov 23 20:45:36 sachi sshd\[11294\]: Invalid user aruncs from 5.195.233.41
Nov 23 20:45:36 sachi sshd\[11294\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=5.195.233.41
2019-11-24 14:53:45
138.68.30.2 attack
11/24/2019-07:29:55.129981 138.68.30.2 Protocol: 6 ET POLICY Cleartext WordPress Login
2019-11-24 14:45:51
195.248.255.22 attackspambots
IP Ban Report :  
 https://help-dysk.pl/wordpress-firewall-plugins/ip/195.248.255.22/ 
 
 PL - 1H : (226)  
 Protection Against DDoS WordPress plugin :  
 "odzyskiwanie danych help-dysk" 
 IP Address Ranges by Country : PL 
 NAME ASN : ASN42717 
 
 IP : 195.248.255.22 
 
 CIDR : 195.248.254.0/23 
 
 PREFIX COUNT : 2 
 
 UNIQUE IP COUNT : 1536 
 
 
 ATTACKS DETECTED ASN42717 :  
  1H - 1 
  3H - 1 
  6H - 1 
 12H - 1 
 24H - 1 
 
 DateTime : 2019-11-24 07:29:27 
 
 INFO : Port Scan TELNET Detected and Blocked by ADMIN  - data recovery
2019-11-24 15:02:56
77.154.194.148 attackbotsspam
Nov 24 07:11:31 vps647732 sshd[29874]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=77.154.194.148
Nov 24 07:11:34 vps647732 sshd[29874]: Failed password for invalid user botmaster from 77.154.194.148 port 50474 ssh2
...
2019-11-24 14:29:46
132.232.31.25 attackbots
Nov 23 19:57:46 web1 sshd\[12063\]: Invalid user hathorn from 132.232.31.25
Nov 23 19:57:46 web1 sshd\[12063\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=132.232.31.25
Nov 23 19:57:47 web1 sshd\[12063\]: Failed password for invalid user hathorn from 132.232.31.25 port 34736 ssh2
Nov 23 20:06:01 web1 sshd\[12976\]: Invalid user jjjjjjj from 132.232.31.25
Nov 23 20:06:01 web1 sshd\[12976\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=132.232.31.25
2019-11-24 14:16:08
218.92.0.198 attackspambots
Nov 24 07:13:16 dcd-gentoo sshd[10806]: User root from 218.92.0.198 not allowed because none of user's groups are listed in AllowGroups
Nov 24 07:13:21 dcd-gentoo sshd[10806]: error: PAM: Authentication failure for illegal user root from 218.92.0.198
Nov 24 07:13:16 dcd-gentoo sshd[10806]: User root from 218.92.0.198 not allowed because none of user's groups are listed in AllowGroups
Nov 24 07:13:21 dcd-gentoo sshd[10806]: error: PAM: Authentication failure for illegal user root from 218.92.0.198
Nov 24 07:13:16 dcd-gentoo sshd[10806]: User root from 218.92.0.198 not allowed because none of user's groups are listed in AllowGroups
Nov 24 07:13:21 dcd-gentoo sshd[10806]: error: PAM: Authentication failure for illegal user root from 218.92.0.198
Nov 24 07:13:21 dcd-gentoo sshd[10806]: Failed keyboard-interactive/pam for invalid user root from 218.92.0.198 port 34664 ssh2
...
2019-11-24 14:23:28
177.189.244.193 attackbots
Nov 23 20:05:21 php1 sshd\[22262\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=177.189.244.193  user=root
Nov 23 20:05:23 php1 sshd\[22262\]: Failed password for root from 177.189.244.193 port 38902 ssh2
Nov 23 20:10:06 php1 sshd\[22729\]: Invalid user junius from 177.189.244.193
Nov 23 20:10:06 php1 sshd\[22729\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=177.189.244.193
Nov 23 20:10:08 php1 sshd\[22729\]: Failed password for invalid user junius from 177.189.244.193 port 56707 ssh2
2019-11-24 14:22:20
45.143.221.15 attackspambots
\[2019-11-24 01:49:34\] NOTICE\[2754\] chan_sip.c: Registration from '"560" \' failed for '45.143.221.15:5396' - Wrong password
\[2019-11-24 01:49:34\] SECURITY\[2765\] res_security_log.c: SecurityEvent="InvalidPassword",EventTV="2019-11-24T01:49:34.686-0500",Severity="Error",Service="SIP",EventVersion="2",AccountID="560",SessionID="0x7f26c4b7dbd8",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/45.143.221.15/5396",Challenge="0bcdcf02",ReceivedChallenge="0bcdcf02",ReceivedHash="f91013ba058efdcb2df8232890834e3c"
\[2019-11-24 01:49:34\] NOTICE\[2754\] chan_sip.c: Registration from '"560" \' failed for '45.143.221.15:5396' - Wrong password
\[2019-11-24 01:49:34\] SECURITY\[2765\] res_security_log.c: SecurityEvent="InvalidPassword",EventTV="2019-11-24T01:49:34.814-0500",Severity="Error",Service="SIP",EventVersion="2",AccountID="560",SessionID="0x7f26c47c51a8",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/45.1
2019-11-24 14:52:11
185.176.27.30 attack
Portscan or hack attempt detected by psad/fwsnort
2019-11-24 14:44:45

最近上报的IP列表

175.247.215.60 35.201.94.102 76.161.11.217 51.91.239.207
61.41.170.47 72.234.8.182 164.4.119.73 20.157.201.19
220.235.45.9 95.145.69.93 3.242.14.45 40.154.176.227
171.57.183.92 137.237.149.214 169.242.20.245 222.15.44.57
40.117.177.244 76.13.4.191 84.228.166.234 65.99.161.11