必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): Korea Republic of

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 14.129.114.190
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 57475
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;14.129.114.190.			IN	A

;; AUTHORITY SECTION:
.			382	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022021702 1800 900 604800 86400

;; Query time: 68 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 18 12:07:53 CST 2022
;; MSG SIZE  rcvd: 107
HOST信息:
190.114.129.14.in-addr.arpa domain name pointer gasan-servers-114.makeshop.co.kr.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
190.114.129.14.in-addr.arpa	name = gasan-servers-114.makeshop.co.kr.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
191.221.230.62 attackspam
Lines containing failures of 191.221.230.62
Sep 23 16:10:43 cdb sshd[23630]: Invalid user was from 191.221.230.62 port 37684
Sep 23 16:10:43 cdb sshd[23630]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=191.221.230.62
Sep 23 16:10:45 cdb sshd[23630]: Failed password for invalid user was from 191.221.230.62 port 37684 ssh2
Sep 23 16:10:45 cdb sshd[23630]: Received disconnect from 191.221.230.62 port 37684:11: Bye Bye [preauth]
Sep 23 16:10:45 cdb sshd[23630]: Disconnected from invalid user was 191.221.230.62 port 37684 [preauth]
Sep 23 16:12:56 cdb sshd[23698]: Invalid user ubuntu from 191.221.230.62 port 60418
Sep 23 16:12:56 cdb sshd[23698]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=191.221.230.62
Sep 23 16:12:57 cdb sshd[23698]: Failed password for invalid user ubuntu from 191.221.230.62 port 60418 ssh2
Sep 23 16:12:57 cdb sshd[23698]: Received disconnect from 191.221.230.62 port 6........
------------------------------
2020-09-25 10:17:22
113.117.137.77 attackbotsspam
POSTFIX Brute-Force attempt
2020-09-25 09:41:24
52.212.22.61 attackspambots
Blocked by Sophos UTM Network Protection . /    / proto=6  .  srcport=443  .  dstport=33005  .     (3314)
2020-09-25 09:52:03
167.99.84.254 attackbotsspam
Multiple web server 500 error code (Internal Error).
2020-09-25 10:06:41
111.229.142.192 attackspambots
Sep 25 02:03:15 email sshd\[15107\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.229.142.192  user=root
Sep 25 02:03:17 email sshd\[15107\]: Failed password for root from 111.229.142.192 port 45338 ssh2
Sep 25 02:07:05 email sshd\[15819\]: Invalid user jc from 111.229.142.192
Sep 25 02:07:05 email sshd\[15819\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.229.142.192
Sep 25 02:07:07 email sshd\[15819\]: Failed password for invalid user jc from 111.229.142.192 port 41602 ssh2
...
2020-09-25 10:15:33
40.115.187.141 attackspambots
Sep 25 04:12:26 * sshd[18546]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=40.115.187.141
Sep 25 04:12:29 * sshd[18546]: Failed password for invalid user mailpro from 40.115.187.141 port 53246 ssh2
2020-09-25 10:17:45
121.69.135.162 attackspambots
SSH Brute-Forcing (server2)
2020-09-25 09:47:33
52.170.40.84 attackspambots
Cowrie Honeypot: Unauthorised SSH/Telnet login attempt with user "mikayelvardumyan" at 2020-09-25T01:10:43Z
2020-09-25 09:46:49
192.99.246.187 attack
Sep 24 21:51:59 wordpress wordpress(www.ruhnke.cloud)[23750]: Blocked authentication attempt for admin from 192.99.246.187
2020-09-25 09:45:32
77.232.184.4 attackspambots
Blocked by Sophos UTM Network Protection . /    / proto=6  .  srcport=59341  .  dstport=1433  .     (3315)
2020-09-25 09:43:00
5.255.253.175 attack
[Fri Sep 25 02:51:48.422282 2020] [:error] [pid 16463:tid 140589363676928] [client 5.255.253.175:42582] [client 5.255.253.175] ModSecurity: Access denied with code 403 (phase 2). Pattern match "^[\\\\d.:]+$" at REQUEST_HEADERS:Host. [file "/etc/modsecurity/coreruleset-3.3.0/rules/REQUEST-920-PROTOCOL-ENFORCEMENT.conf"] [line "756"] [id "920350"] [msg "Host header is a numeric IP address"] [data "103.27.207.197"] [severity "WARNING"] [ver "OWASP_CRS/3.3.0"] [tag "application-multi"] [tag "language-multi"] [tag "platform-multi"] [tag "attack-protocol"] [tag "paranoia-level/1"] [tag "OWASP_CRS"] [tag "capec/1000/210/272"] [tag "PCI/6.5.10"] [hostname "103.27.207.197"] [uri "/"] [unique_id "X2z41HZgw1gzcFSlmDjlNgAAAIg"]
...
2020-09-25 09:54:14
218.92.0.173 attackspam
Sep 25 01:47:20 ip-172-31-61-156 sshd[18057]: Failed password for root from 218.92.0.173 port 30691 ssh2
Sep 25 01:47:24 ip-172-31-61-156 sshd[18057]: Failed password for root from 218.92.0.173 port 30691 ssh2
Sep 25 01:47:27 ip-172-31-61-156 sshd[18057]: Failed password for root from 218.92.0.173 port 30691 ssh2
Sep 25 01:47:27 ip-172-31-61-156 sshd[18057]: error: maximum authentication attempts exceeded for root from 218.92.0.173 port 30691 ssh2 [preauth]
Sep 25 01:47:27 ip-172-31-61-156 sshd[18057]: Disconnecting: Too many authentication failures [preauth]
...
2020-09-25 09:51:44
106.12.183.209 attackspambots
Sep 25 02:57:41 vps333114 sshd[20973]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.183.209
Sep 25 02:57:43 vps333114 sshd[20973]: Failed password for invalid user ari from 106.12.183.209 port 40210 ssh2
...
2020-09-25 10:04:08
49.36.143.89 attackspambots
Icarus honeypot on github
2020-09-25 10:14:34
114.67.72.164 attackspam
Sep 24 21:51:37 haigwepa sshd[2430]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=114.67.72.164 
Sep 24 21:51:39 haigwepa sshd[2430]: Failed password for invalid user jira from 114.67.72.164 port 50778 ssh2
...
2020-09-25 09:59:11

最近上报的IP列表

14.129.113.219 14.129.114.116 14.128.34.77 14.129.114.233
14.129.114.101 14.129.117.196 14.129.117.224 14.129.120.225
14.136.2.96 14.136.219.168 14.129.200.21 14.136.38.248
14.137.137.102 14.137.137.121 14.137.137.108 14.139.116.29
14.139.116.12 14.139.122.101 14.139.120.134 14.139.122.18