必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): China

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 14.127.104.69
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 34025
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;14.127.104.69.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025020301 1800 900 604800 86400

;; Query time: 60 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Feb 04 03:05:44 CST 2025
;; MSG SIZE  rcvd: 106
HOST信息:
Host 69.104.127.14.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 69.104.127.14.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
189.115.61.5 attackbots
Unauthorized connection attempt from IP address 189.115.61.5 on Port 445(SMB)
2020-09-21 07:51:07
100.3.129.59 attack
Auto Detect Rule!
proto TCP (SYN), 100.3.129.59:9706->gjan.info:1433, len 40
2020-09-21 07:55:40
142.93.68.181 attackbots
 TCP (SYN) 142.93.68.181:47400 -> port 23052, len 44
2020-09-21 07:47:37
210.55.3.250 attackspam
Sep 20 20:04:12 firewall sshd[3678]: Failed password for invalid user mysql from 210.55.3.250 port 55682 ssh2
Sep 20 20:12:56 firewall sshd[3933]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=210.55.3.250  user=root
Sep 20 20:12:58 firewall sshd[3933]: Failed password for root from 210.55.3.250 port 53890 ssh2
...
2020-09-21 08:07:36
184.17.81.72 attackbotsspam
2020-09-20T15:53:08.101979vps-d63064a2 sshd[59216]: User root from 184.17.81.72 not allowed because not listed in AllowUsers
2020-09-20T15:53:09.610351vps-d63064a2 sshd[59216]: Failed password for invalid user root from 184.17.81.72 port 51824 ssh2
2020-09-20T15:57:10.914232vps-d63064a2 sshd[59256]: User root from 184.17.81.72 not allowed because not listed in AllowUsers
2020-09-20T15:57:10.929833vps-d63064a2 sshd[59256]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=184.17.81.72  user=root
2020-09-20T15:57:10.914232vps-d63064a2 sshd[59256]: User root from 184.17.81.72 not allowed because not listed in AllowUsers
2020-09-20T15:57:13.308386vps-d63064a2 sshd[59256]: Failed password for invalid user root from 184.17.81.72 port 38200 ssh2
...
2020-09-21 12:01:38
49.49.248.141 attackspambots
Web scan/attack: detected 1 distinct attempts within a 12-hour window (Tomcat Vulnerability Scan)
2020-09-21 07:48:45
106.53.238.111 attackspambots
Sep 20 22:51:52 gitlab sshd[232150]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.53.238.111 
Sep 20 22:51:52 gitlab sshd[232150]: Invalid user admin from 106.53.238.111 port 51622
Sep 20 22:51:54 gitlab sshd[232150]: Failed password for invalid user admin from 106.53.238.111 port 51622 ssh2
Sep 20 22:55:23 gitlab sshd[232387]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.53.238.111  user=root
Sep 20 22:55:25 gitlab sshd[232387]: Failed password for root from 106.53.238.111 port 55930 ssh2
...
2020-09-21 07:44:43
180.76.169.198 attackspam
Sep 21 01:31:14 abendstille sshd\[10631\]: Invalid user deploy from 180.76.169.198
Sep 21 01:31:14 abendstille sshd\[10631\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.76.169.198
Sep 21 01:31:15 abendstille sshd\[10631\]: Failed password for invalid user deploy from 180.76.169.198 port 34460 ssh2
Sep 21 01:38:07 abendstille sshd\[18366\]: Invalid user test from 180.76.169.198
Sep 21 01:38:07 abendstille sshd\[18366\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.76.169.198
...
2020-09-21 07:49:38
83.96.16.43 attackbots
Auto Detect Rule!
proto TCP (SYN), 83.96.16.43:53622->gjan.info:23, len 40
2020-09-21 08:05:14
192.241.237.61 attackspambots
Found on   CINS badguys     / proto=6  .  srcport=43791  .  dstport=443  .     (2315)
2020-09-21 08:02:41
167.172.238.159 attack
Failed password for root from 167.172.238.159 port 54358 ssh2
2020-09-21 07:50:23
111.225.153.88 attack
(smtpauth) Failed SMTP AUTH login from 111.225.153.88 (CN/China/-): 10 in the last 300 secs
2020-09-21 07:52:19
102.65.90.61 attack
Sep 20 16:01:33 roki-contabo sshd\[24714\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=102.65.90.61  user=root
Sep 20 16:01:35 roki-contabo sshd\[24714\]: Failed password for root from 102.65.90.61 port 55900 ssh2
Sep 20 21:04:55 roki-contabo sshd\[27398\]: Invalid user admin from 102.65.90.61
Sep 20 21:04:55 roki-contabo sshd\[27398\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=102.65.90.61
Sep 20 21:04:57 roki-contabo sshd\[27398\]: Failed password for invalid user admin from 102.65.90.61 port 58504 ssh2
...
2020-09-21 12:09:02
5.135.181.53 attackspambots
Invalid user mailto from 5.135.181.53 port 38022
2020-09-21 07:53:05
201.77.130.3 attack
2020-09-20T23:59:05.318722shield sshd\[30258\]: Invalid user alex from 201.77.130.3 port 56110
2020-09-20T23:59:05.331230shield sshd\[30258\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=201.77.130.3
2020-09-20T23:59:07.577825shield sshd\[30258\]: Failed password for invalid user alex from 201.77.130.3 port 56110 ssh2
2020-09-21T00:03:38.332580shield sshd\[30572\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=201.77.130.3  user=root
2020-09-21T00:03:40.049857shield sshd\[30572\]: Failed password for root from 201.77.130.3 port 33356 ssh2
2020-09-21 08:08:39

最近上报的IP列表

14.137.180.134 103.192.152.24 39.150.68.83 53.109.109.146
82.104.140.161 20.162.59.146 250.200.145.178 138.235.119.146
31.139.158.141 80.183.143.19 7.15.109.178 123.134.9.141
203.14.129.10 246.94.109.1 6.24.159.183 242.19.13.202
30.154.243.14 3.137.177.191 56.136.5.187 44.140.51.48