必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): China

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 14.115.105.149
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 31699
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;14.115.105.149.			IN	A

;; AUTHORITY SECTION:
.			506	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022022700 1800 900 604800 86400

;; Query time: 55 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Feb 27 17:40:53 CST 2022
;; MSG SIZE  rcvd: 107
HOST信息:
Host 149.105.115.14.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 149.105.115.14.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
36.76.119.73 attackbots
1592914082 - 06/23/2020 14:08:02 Host: 36.76.119.73/36.76.119.73 Port: 445 TCP Blocked
2020-06-23 21:28:25
106.75.222.121 attack
2020-06-23T15:12:29.181843sd-86998 sshd[8139]: Invalid user tiziano from 106.75.222.121 port 34134
2020-06-23T15:12:29.186991sd-86998 sshd[8139]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.75.222.121
2020-06-23T15:12:29.181843sd-86998 sshd[8139]: Invalid user tiziano from 106.75.222.121 port 34134
2020-06-23T15:12:31.590139sd-86998 sshd[8139]: Failed password for invalid user tiziano from 106.75.222.121 port 34134 ssh2
2020-06-23T15:22:10.523675sd-86998 sshd[9669]: Invalid user tt from 106.75.222.121 port 60990
...
2020-06-23 21:47:57
111.67.202.120 attackspam
2020-06-23T06:31:56.100542-07:00 suse-nuc sshd[18161]: Invalid user jean from 111.67.202.120 port 58000
...
2020-06-23 21:54:34
107.170.91.121 attackspam
Jun 23 08:20:32 ny01 sshd[3251]: Failed password for root from 107.170.91.121 port 44285 ssh2
Jun 23 08:23:44 ny01 sshd[3652]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=107.170.91.121
Jun 23 08:23:46 ny01 sshd[3652]: Failed password for invalid user pyramide from 107.170.91.121 port 45030 ssh2
2020-06-23 21:41:53
196.52.43.105 attackbots
 TCP (SYN) 196.52.43.105:62649 -> port 888, len 44
2020-06-23 21:34:10
180.249.215.41 attackspam
Jun 23 08:46:26 lamijardin sshd[7810]: Invalid user debian from 180.249.215.41
Jun 23 08:46:26 lamijardin sshd[7810]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.249.215.41
Jun 23 08:46:29 lamijardin sshd[7810]: Failed password for invalid user debian from 180.249.215.41 port 59180 ssh2
Jun 23 08:46:29 lamijardin sshd[7810]: Received disconnect from 180.249.215.41 port 59180:11: Bye Bye [preauth]
Jun 23 08:46:29 lamijardin sshd[7810]: Disconnected from 180.249.215.41 port 59180 [preauth]
Jun 23 08:56:50 lamijardin sshd[7869]: Invalid user user1 from 180.249.215.41
Jun 23 08:56:50 lamijardin sshd[7869]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.249.215.41
Jun 23 08:56:52 lamijardin sshd[7869]: Failed password for invalid user user1 from 180.249.215.41 port 49886 ssh2
Jun 23 08:56:52 lamijardin sshd[7869]: Received disconnect from 180.249.215.41 port 49886:11: Bye Bye [preaut........
-------------------------------
2020-06-23 22:09:21
137.74.173.182 attack
2020-06-23T13:34:41.015349shield sshd\[15167\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=aula.madridemprende.es  user=root
2020-06-23T13:34:42.476664shield sshd\[15167\]: Failed password for root from 137.74.173.182 port 36250 ssh2
2020-06-23T13:37:52.167532shield sshd\[15858\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=aula.madridemprende.es  user=root
2020-06-23T13:37:54.321140shield sshd\[15858\]: Failed password for root from 137.74.173.182 port 35736 ssh2
2020-06-23T13:41:03.107889shield sshd\[16393\]: Invalid user alex from 137.74.173.182 port 35338
2020-06-23 21:46:54
185.39.11.38 attack
 TCP (SYN) 185.39.11.38:47147 -> port 25419, len 44
2020-06-23 21:41:23
185.143.72.34 attackspambots
2020-06-21 07:57:38 dovecot_login authenticator failed for \(User\) \[185.143.72.34\]: 535 Incorrect authentication data \(set_id=israel@no-server.de\)
2020-06-21 07:58:02 dovecot_login authenticator failed for \(User\) \[185.143.72.34\]: 535 Incorrect authentication data \(set_id=israel@no-server.de\)
2020-06-21 07:58:15 dovecot_login authenticator failed for \(User\) \[185.143.72.34\]: 535 Incorrect authentication data \(set_id=upload@no-server.de\)
2020-06-21 07:58:27 dovecot_login authenticator failed for \(User\) \[185.143.72.34\]: 535 Incorrect authentication data \(set_id=upload@no-server.de\)
2020-06-21 07:58:30 dovecot_login authenticator failed for \(User\) \[185.143.72.34\]: 535 Incorrect authentication data \(set_id=upload@no-server.de\)
...
2020-06-23 21:56:09
198.50.250.134 attack
PHI,DEF GET /w00tw00t.at.ISC.SANS.DFind:)
2020-06-23 22:06:22
186.113.18.109 attackspambots
$f2bV_matches
2020-06-23 21:31:02
195.3.157.88 attackbots
Unauthorized connection attempt detected from IP address 195.3.157.88 to port 22
2020-06-23 21:48:20
52.250.113.250 attackspambots
Jun 23 07:18:39 rudra sshd[73692]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=52.250.113.250  user=r.r
Jun 23 07:18:41 rudra sshd[73692]: Failed password for r.r from 52.250.113.250 port 57464 ssh2
Jun 23 07:18:41 rudra sshd[73692]: Received disconnect from 52.250.113.250: 11: Bye Bye [preauth]
Jun 23 07:21:41 rudra sshd[74521]: Invalid user lfy from 52.250.113.250
Jun 23 07:21:41 rudra sshd[74521]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=52.250.113.250 
Jun 23 07:21:42 rudra sshd[74521]: Failed password for invalid user lfy from 52.250.113.250 port 50264 ssh2
Jun 23 07:21:43 rudra sshd[74521]: Received disconnect from 52.250.113.250: 11: Bye Bye [preauth]
Jun 23 07:24:20 rudra sshd[74768]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=52.250.113.250  user=r.r
Jun 23 07:24:22 rudra sshd[74768]: Failed password for r.r from 52.250.113.250........
-------------------------------
2020-06-23 21:30:28
42.101.34.85 attack
Unauthorized connection attempt detected from IP address 42.101.34.85 to port 9781
2020-06-23 21:49:47
112.196.166.144 attack
Jun 23 13:34:40 rush sshd[17408]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.196.166.144
Jun 23 13:34:42 rush sshd[17408]: Failed password for invalid user dereck from 112.196.166.144 port 33716 ssh2
Jun 23 13:43:56 rush sshd[17680]: Failed password for root from 112.196.166.144 port 44024 ssh2
...
2020-06-23 21:44:45

最近上报的IP列表

14.115.105.152 14.115.105.163 14.115.105.155 14.115.105.168
14.115.105.170 14.115.105.166 14.115.105.172 14.115.105.18
14.115.105.179 14.115.107.219 14.115.107.217 48.65.72.12
14.115.107.2 14.115.107.210 14.115.107.20 14.115.107.229
14.115.107.213 14.115.107.204 14.115.107.209 14.115.107.23