必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): Japan

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 14.132.135.189
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 40949
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;14.132.135.189.			IN	A

;; AUTHORITY SECTION:
.			334	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022011000 1800 900 604800 86400

;; Query time: 57 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Jan 10 22:13:38 CST 2022
;; MSG SIZE  rcvd: 107
HOST信息:
189.135.132.14.in-addr.arpa domain name pointer 14-132-135-189.area7b.commufa.jp.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
189.135.132.14.in-addr.arpa	name = 14-132-135-189.area7b.commufa.jp.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
196.202.62.98 attackspam
" "
2019-11-28 13:58:39
42.59.193.223 attackspam
Unauthorised access (Nov 28) SRC=42.59.193.223 LEN=40 TTL=49 ID=42300 TCP DPT=23 WINDOW=31111 SYN
2019-11-28 14:01:44
13.69.31.111 attack
28.11.2019 05:57:18 - RDP Login Fail Detected by 
https://www.elinox.de/RDP-Wächter
2019-11-28 14:01:11
81.133.189.239 attackspam
ssh failed login
2019-11-28 13:52:10
222.186.175.183 attack
$f2bV_matches
2019-11-28 14:21:11
138.197.131.127 attackspam
Port 22 Scan, PTR: None
2019-11-28 13:49:54
218.92.0.145 attackspambots
Nov 28 06:56:24 sd-53420 sshd\[2928\]: User root from 218.92.0.145 not allowed because none of user's groups are listed in AllowGroups
Nov 28 06:56:25 sd-53420 sshd\[2928\]: Failed none for invalid user root from 218.92.0.145 port 63518 ssh2
Nov 28 06:56:25 sd-53420 sshd\[2928\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.145  user=root
Nov 28 06:56:27 sd-53420 sshd\[2928\]: Failed password for invalid user root from 218.92.0.145 port 63518 ssh2
Nov 28 06:56:30 sd-53420 sshd\[2928\]: Failed password for invalid user root from 218.92.0.145 port 63518 ssh2
...
2019-11-28 14:02:17
211.220.27.191 attackspam
Invalid user jakov from 211.220.27.191 port 41008
2019-11-28 14:15:34
145.239.196.248 attackbots
Nov 28 05:48:25 SilenceServices sshd[19006]: Failed password for root from 145.239.196.248 port 58782 ssh2
Nov 28 05:56:56 SilenceServices sshd[21319]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=145.239.196.248
Nov 28 05:56:59 SilenceServices sshd[21319]: Failed password for invalid user Composers from 145.239.196.248 port 48535 ssh2
2019-11-28 14:06:12
212.13.111.182 attack
[portscan] Port scan
2019-11-28 14:11:27
165.22.78.222 attackspam
Automatic report - Banned IP Access
2019-11-28 14:08:59
93.186.170.7 attackbotsspam
$f2bV_matches
2019-11-28 13:50:08
148.70.3.199 attackbotsspam
Nov 28 11:07:20 vibhu-HP-Z238-Microtower-Workstation sshd\[31936\]: Invalid user ftpuser from 148.70.3.199
Nov 28 11:07:20 vibhu-HP-Z238-Microtower-Workstation sshd\[31936\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=148.70.3.199
Nov 28 11:07:23 vibhu-HP-Z238-Microtower-Workstation sshd\[31936\]: Failed password for invalid user ftpuser from 148.70.3.199 port 35018 ssh2
Nov 28 11:15:53 vibhu-HP-Z238-Microtower-Workstation sshd\[32368\]: Invalid user apache from 148.70.3.199
Nov 28 11:15:53 vibhu-HP-Z238-Microtower-Workstation sshd\[32368\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=148.70.3.199
...
2019-11-28 14:02:46
71.226.38.243 attackspambots
Nov 28 05:57:15 vps sshd[25342]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=71.226.38.243 
Nov 28 05:57:15 vps sshd[25343]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=71.226.38.243 
Nov 28 05:57:17 vps sshd[25342]: Failed password for invalid user pi from 71.226.38.243 port 55614 ssh2
...
2019-11-28 13:53:58
129.94.164.100 attack
RDP Bruteforce
2019-11-28 14:24:27

最近上报的IP列表

146.69.132.166 130.65.4.117 140.220.153.125 111.150.90.85
170.139.246.39 109.58.40.20 224.81.113.3 120.208.198.171
186.109.201.186 104.186.209.77 105.12.95.156 197.173.50.224
143.149.123.124 253.212.240.46 21.108.36.35 144.155.118.163
6.124.117.209 76.72.156.190 153.38.158.42 246.59.76.231