必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): Japan

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 14.133.1.189
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 55554
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;14.133.1.189.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025013100 1800 900 604800 86400

;; Query time: 14 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Jan 31 16:06:13 CST 2025
;; MSG SIZE  rcvd: 105
HOST信息:
189.1.133.14.in-addr.arpa domain name pointer 14-133-1-189.area5b.commufa.jp.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
189.1.133.14.in-addr.arpa	name = 14-133-1-189.area5b.commufa.jp.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
121.136.119.7 attackbotsspam
Oct  6 18:09:42 tdfoods sshd\[30430\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.136.119.7  user=root
Oct  6 18:09:45 tdfoods sshd\[30430\]: Failed password for root from 121.136.119.7 port 57408 ssh2
Oct  6 18:14:30 tdfoods sshd\[30784\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.136.119.7  user=root
Oct  6 18:14:33 tdfoods sshd\[30784\]: Failed password for root from 121.136.119.7 port 41152 ssh2
Oct  6 18:19:23 tdfoods sshd\[31195\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.136.119.7  user=root
2019-10-07 12:21:36
80.211.159.118 attackbots
*Port Scan* detected from 80.211.159.118 (IT/Italy/host118-159-211-80.serverdedicati.aruba.it). 4 hits in the last 80 seconds
2019-10-07 12:02:46
187.178.78.123 attackspambots
Automatic report - Port Scan Attack
2019-10-07 12:25:19
185.234.217.164 attackbotsspam
Oct  7 03:52:07 imap dovecot[33773]: auth: ldap(support@scream.dnet.hu,185.234.217.164): unknown user
Oct  7 04:22:45 imap dovecot[33773]: auth: ldap(gans@scream.dnet.hu,185.234.217.164): unknown user
Oct  7 04:53:21 imap dovecot[33773]: auth: ldap(guest@scream.dnet.hu,185.234.217.164): unknown user
Oct  7 05:24:02 imap dovecot[33773]: auth: ldap(marketing@scream.dnet.hu,185.234.217.164): unknown user
Oct  7 05:54:52 imap dovecot[33773]: auth: ldap(administrator@scream.dnet.hu,185.234.217.164): unknown user
...
2019-10-07 12:07:49
197.54.127.87 attack
Chat Spam
2019-10-07 12:16:37
94.83.227.81 attackbots
DATE:2019-10-07 05:54:22, IP:94.83.227.81, PORT:telnet Telnet brute force auth on honeypot server (honey-neo-dc)
2019-10-07 12:25:57
45.55.88.94 attackbotsspam
Oct  7 04:05:20 venus sshd\[13501\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.55.88.94  user=root
Oct  7 04:05:21 venus sshd\[13501\]: Failed password for root from 45.55.88.94 port 35147 ssh2
Oct  7 04:10:50 venus sshd\[13587\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.55.88.94  user=root
...
2019-10-07 12:28:57
123.207.28.200 attackspambots
Oct  6 23:54:57 TORMINT sshd\[23145\]: Invalid user postgres from 123.207.28.200
Oct  6 23:54:57 TORMINT sshd\[23145\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=123.207.28.200
Oct  6 23:54:59 TORMINT sshd\[23145\]: Failed password for invalid user postgres from 123.207.28.200 port 49232 ssh2
...
2019-10-07 12:04:12
180.168.55.110 attackspambots
Oct  7 06:50:34 www sshd\[49036\]: Invalid user P@55w0rd@2020 from 180.168.55.110Oct  7 06:50:36 www sshd\[49036\]: Failed password for invalid user P@55w0rd@2020 from 180.168.55.110 port 53758 ssh2Oct  7 06:54:09 www sshd\[49085\]: Invalid user Space123 from 180.168.55.110
...
2019-10-07 12:33:39
167.114.226.137 attack
$f2bV_matches
2019-10-07 07:57:06
77.247.109.72 attackbotsspam
\[2019-10-07 00:16:05\] NOTICE\[1887\] chan_sip.c: Registration from '"601" \' failed for '77.247.109.72:5692' - Wrong password
\[2019-10-07 00:16:05\] SECURITY\[1898\] res_security_log.c: SecurityEvent="InvalidPassword",EventTV="2019-10-07T00:16:05.491-0400",Severity="Error",Service="SIP",EventVersion="2",AccountID="601",SessionID="0x7fc3ac00c388",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/77.247.109.72/5692",Challenge="07a11234",ReceivedChallenge="07a11234",ReceivedHash="3ef0a022db9e4a63605f700c1ca6ff71"
\[2019-10-07 00:16:05\] NOTICE\[1887\] chan_sip.c: Registration from '"601" \' failed for '77.247.109.72:5692' - Wrong password
\[2019-10-07 00:16:05\] SECURITY\[1898\] res_security_log.c: SecurityEvent="InvalidPassword",EventTV="2019-10-07T00:16:05.614-0400",Severity="Error",Service="SIP",EventVersion="2",AccountID="601",SessionID="0x7fc3ac866728",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/77.2
2019-10-07 12:29:37
103.249.52.5 attack
Oct  7 03:49:51 game-panel sshd[20216]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.249.52.5
Oct  7 03:49:54 game-panel sshd[20216]: Failed password for invalid user Coco@2017 from 103.249.52.5 port 59740 ssh2
Oct  7 03:54:46 game-panel sshd[20359]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.249.52.5
2019-10-07 12:12:14
66.116.104.210 attackspam
Oct  7 05:44:10 kattjaserver kernel: [UFW BLOCK] IN=enp3s0 OUT= MAC=2c:56:dc:3c:f3:45:00:13:3b:2f:4e:7f:08:00 SRC=66.116.104.210 DST=192.168.5.106 LEN=40 TOS=0x00 PREC=0x00 TTL=67 ID=63743 DF PROTO=TCP SPT=52330 DPT=81 WINDOW=29200 RES=0x00 SYN URGP=0
2019-10-07 12:01:16
89.232.48.43 attack
Oct  7 06:25:59 legacy sshd[8053]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=89.232.48.43
Oct  7 06:26:00 legacy sshd[8053]: Failed password for invalid user Admin@003 from 89.232.48.43 port 39838 ssh2
Oct  7 06:30:32 legacy sshd[8154]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=89.232.48.43
...
2019-10-07 12:30:58
218.107.154.74 attack
*Port Scan* detected from 218.107.154.74 (CN/China/-). 4 hits in the last 255 seconds
2019-10-07 07:55:47

最近上报的IP列表

137.16.38.64 151.180.104.82 220.125.246.202 79.169.101.216
228.217.170.149 117.30.54.163 93.161.179.148 206.164.194.100
61.133.192.145 117.58.188.54 84.156.187.62 41.27.26.247
57.228.110.68 178.244.139.45 80.127.50.84 252.15.100.38
50.169.41.3 120.215.159.2 56.185.35.146 200.250.77.92