必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): Tokushima

省份(region): Tokushima

国家(country): Japan

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 14.13.97.20
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 56340
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;14.13.97.20.			IN	A

;; AUTHORITY SECTION:
.			365	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2020090801 1800 900 604800 86400

;; Query time: 18 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Sep 09 08:30:34 CST 2020
;; MSG SIZE  rcvd: 115
HOST信息:
20.97.13.14.in-addr.arpa domain name pointer M014013097020.v4.enabler.ne.jp.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
20.97.13.14.in-addr.arpa	name = M014013097020.v4.enabler.ne.jp.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
122.55.90.45 attackspam
Jul 15 00:07:27 mail sshd\[23593\]: Failed password for invalid user app from 122.55.90.45 port 44466 ssh2
Jul 15 00:30:08 mail sshd\[23990\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.55.90.45  user=postfix
...
2019-07-15 08:04:50
122.188.209.238 attack
2019-07-14T23:28:53.232262abusebot-6.cloudsearch.cf sshd\[27247\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.188.209.238  user=root
2019-07-15 07:38:19
103.231.139.130 attackspambots
2019-07-15T05:15:22.385705ns1.unifynetsol.net postfix/smtpd\[15838\]: warning: unknown\[103.231.139.130\]: SASL LOGIN authentication failed: authentication failure
2019-07-15T05:15:56.848767ns1.unifynetsol.net postfix/smtpd\[15091\]: warning: unknown\[103.231.139.130\]: SASL LOGIN authentication failed: authentication failure
2019-07-15T05:16:31.135748ns1.unifynetsol.net postfix/smtpd\[15838\]: warning: unknown\[103.231.139.130\]: SASL LOGIN authentication failed: authentication failure
2019-07-15T05:17:05.863502ns1.unifynetsol.net postfix/smtpd\[15838\]: warning: unknown\[103.231.139.130\]: SASL LOGIN authentication failed: authentication failure
2019-07-15T05:17:40.216382ns1.unifynetsol.net postfix/smtpd\[19678\]: warning: unknown\[103.231.139.130\]: SASL LOGIN authentication failed: authentication failure
2019-07-15 07:52:57
39.82.20.110 attack
Automatic report - Port Scan Attack
2019-07-15 07:31:08
180.179.174.247 attackbotsspam
Jul 15 01:16:21 cp sshd[1095]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.179.174.247
2019-07-15 08:02:59
157.230.42.76 attackbots
Jul 14 20:06:46 TORMINT sshd\[12866\]: Invalid user deluge from 157.230.42.76
Jul 14 20:06:46 TORMINT sshd\[12866\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.230.42.76
Jul 14 20:06:48 TORMINT sshd\[12866\]: Failed password for invalid user deluge from 157.230.42.76 port 55929 ssh2
...
2019-07-15 08:09:12
157.230.175.122 attackbots
Jul 15 02:01:11 vps647732 sshd[27267]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.230.175.122
Jul 15 02:01:12 vps647732 sshd[27267]: Failed password for invalid user hue from 157.230.175.122 port 40096 ssh2
...
2019-07-15 08:05:41
122.28.51.215 attack
www.geburtshaus-fulda.de 122.28.51.215 \[14/Jul/2019:23:13:47 +0200\] "POST /wp-login.php HTTP/1.1" 200 5786 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0"
www.geburtshaus-fulda.de 122.28.51.215 \[14/Jul/2019:23:13:50 +0200\] "POST /wp-login.php HTTP/1.1" 200 5790 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0"
www.geburtshaus-fulda.de 122.28.51.215 \[14/Jul/2019:23:13:53 +0200\] "POST /wp-login.php HTTP/1.1" 200 5785 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0"
2019-07-15 08:06:38
40.113.104.81 attackbots
Jul 15 01:28:19 legacy sshd[14582]: Failed password for root from 40.113.104.81 port 1088 ssh2
Jul 15 01:34:00 legacy sshd[14731]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=40.113.104.81
Jul 15 01:34:02 legacy sshd[14731]: Failed password for invalid user cn from 40.113.104.81 port 1088 ssh2
...
2019-07-15 07:41:35
217.182.253.230 attack
2019-07-14T23:21:02.295235abusebot-5.cloudsearch.cf sshd\[21504\]: Invalid user nagios from 217.182.253.230 port 56752
2019-07-15 07:24:51
103.60.126.65 attackspambots
Jul 14 19:41:31 plusreed sshd[32708]: Invalid user ftpuser from 103.60.126.65
...
2019-07-15 07:46:21
82.147.120.36 attackbotsspam
proto=tcp  .  spt=45848  .  dpt=25  .     (listed on Blocklist de  Jul 14)     (623)
2019-07-15 07:22:17
58.87.67.142 attack
2019-07-15T06:20:38.261697enmeeting.mahidol.ac.th sshd\[1836\]: Invalid user backup from 58.87.67.142 port 56600
2019-07-15T06:20:38.280397enmeeting.mahidol.ac.th sshd\[1836\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=58.87.67.142
2019-07-15T06:20:40.077301enmeeting.mahidol.ac.th sshd\[1836\]: Failed password for invalid user backup from 58.87.67.142 port 56600 ssh2
...
2019-07-15 07:56:50
185.210.36.134 attackspambots
Jul 15 01:19:25 ubuntu-2gb-nbg1-dc3-1 sshd[27549]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=185.210.36.134
Jul 15 01:19:27 ubuntu-2gb-nbg1-dc3-1 sshd[27549]: Failed password for invalid user speedtest from 185.210.36.134 port 60298 ssh2
...
2019-07-15 07:54:27
139.59.149.183 attackbots
Jul 15 01:14:58 legacy sshd[14235]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.149.183
Jul 15 01:15:00 legacy sshd[14235]: Failed password for invalid user recepcao from 139.59.149.183 port 38245 ssh2
Jul 15 01:19:36 legacy sshd[14382]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.149.183
...
2019-07-15 07:27:30

最近上报的IP列表

47.233.68.159 101.66.104.178 125.37.83.216 193.124.129.195
106.71.53.145 82.16.137.180 185.208.101.68 106.11.239.4
182.70.39.206 233.180.145.196 152.166.166.217 115.188.107.78
73.95.111.42 71.161.141.232 72.216.238.217 97.245.95.168
123.206.28.232 87.22.77.52 166.132.211.120 182.9.100.232