必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): India

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 14.142.220.26
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 14422
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;14.142.220.26.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025012100 1800 900 604800 86400

;; Query time: 104 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Jan 21 23:31:15 CST 2025
;; MSG SIZE  rcvd: 106
HOST信息:
26.220.142.14.in-addr.arpa domain name pointer 14.142.220.26.static-mumbai.vsnl.net.in.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
26.220.142.14.in-addr.arpa	name = 14.142.220.26.static-mumbai.vsnl.net.in.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
110.232.64.216 attackbotsspam
Unauthorized connection attempt from IP address 110.232.64.216 on Port 445(SMB)
2019-10-14 03:17:31
51.83.46.18 attackbotsspam
Oct 13 09:22:47 xtremcommunity sshd\[479077\]: Invalid user 1Qaz2Wsx from 51.83.46.18 port 33510
Oct 13 09:22:47 xtremcommunity sshd\[479077\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.83.46.18
Oct 13 09:22:49 xtremcommunity sshd\[479077\]: Failed password for invalid user 1Qaz2Wsx from 51.83.46.18 port 33510 ssh2
Oct 13 09:27:14 xtremcommunity sshd\[479176\]: Invalid user Salve123 from 51.83.46.18 port 45500
Oct 13 09:27:14 xtremcommunity sshd\[479176\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.83.46.18
...
2019-10-14 03:39:48
133.130.113.128 attackbots
Oct 13 19:08:24 vmanager6029 sshd\[19909\]: Invalid user Rodrigo2017 from 133.130.113.128 port 54059
Oct 13 19:08:24 vmanager6029 sshd\[19909\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=133.130.113.128
Oct 13 19:08:26 vmanager6029 sshd\[19909\]: Failed password for invalid user Rodrigo2017 from 133.130.113.128 port 54059 ssh2
2019-10-14 03:24:42
122.16.236.188 attackspambots
Exploid host for vulnerabilities on 13-10-2019 12:45:19.
2019-10-14 03:16:33
179.191.49.4 attackspam
Exploid host for vulnerabilities on 13-10-2019 12:45:23.
2019-10-14 03:09:29
151.80.144.39 attack
Oct 13 14:46:17 SilenceServices sshd[23850]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=151.80.144.39
Oct 13 14:46:19 SilenceServices sshd[23850]: Failed password for invalid user Server#2018 from 151.80.144.39 port 35746 ssh2
Oct 13 14:50:14 SilenceServices sshd[24875]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=151.80.144.39
2019-10-14 03:32:31
175.211.112.254 attackbotsspam
2019-10-13T17:44:00.172726abusebot-5.cloudsearch.cf sshd\[9598\]: Invalid user hp from 175.211.112.254 port 49382
2019-10-13T17:44:00.176929abusebot-5.cloudsearch.cf sshd\[9598\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=175.211.112.254
2019-10-14 03:29:38
159.65.112.93 attackspambots
Oct 13 17:37:51 host sshd\[36786\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.65.112.93  user=root
Oct 13 17:37:53 host sshd\[36786\]: Failed password for root from 159.65.112.93 port 47002 ssh2
...
2019-10-14 03:38:07
95.174.116.164 attackbotsspam
Attempt to attack host OS, exploiting network vulnerabilities, on 13-10-2019 12:45:29.
2019-10-14 02:59:41
186.31.100.26 attackspam
Exploid host for vulnerabilities on 13-10-2019 12:45:25.
2019-10-14 03:06:21
151.80.37.18 attackspam
Apr 15 21:43:50 vtv3 sshd\[6311\]: Invalid user tomcat from 151.80.37.18 port 49348
Apr 15 21:43:50 vtv3 sshd\[6311\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=151.80.37.18
Apr 15 21:43:52 vtv3 sshd\[6311\]: Failed password for invalid user tomcat from 151.80.37.18 port 49348 ssh2
Apr 15 21:49:11 vtv3 sshd\[8819\]: Invalid user tanya from 151.80.37.18 port 43622
Apr 15 21:49:11 vtv3 sshd\[8819\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=151.80.37.18
Sep  3 11:11:40 vtv3 sshd\[4740\]: Invalid user duplicity from 151.80.37.18 port 57080
Sep  3 11:11:40 vtv3 sshd\[4740\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=151.80.37.18
Sep  3 11:11:42 vtv3 sshd\[4740\]: Failed password for invalid user duplicity from 151.80.37.18 port 57080 ssh2
Sep  3 11:16:36 vtv3 sshd\[7075\]: Invalid user admin from 151.80.37.18 port 44942
Sep  3 11:16:36 vtv3 sshd\[7075\]: pam_unix\(sshd
2019-10-14 03:20:08
187.170.37.94 attackbots
Exploid host for vulnerabilities on 13-10-2019 12:45:25.
2019-10-14 03:05:43
45.80.64.246 attackspam
Oct 13 21:15:24 meumeu sshd[11301]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.80.64.246 
Oct 13 21:15:26 meumeu sshd[11301]: Failed password for invalid user USA@2016 from 45.80.64.246 port 55468 ssh2
Oct 13 21:19:14 meumeu sshd[11921]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.80.64.246 
...
2019-10-14 03:35:54
52.34.99.157 attackspam
As always with amazon web services
2019-10-14 03:38:49
129.213.129.115 attackbotsspam
Oct 13 05:37:00 linuxrulz sshd[25235]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.213.129.115  user=r.r
Oct 13 05:37:02 linuxrulz sshd[25235]: Failed password for r.r from 129.213.129.115 port 50542 ssh2
Oct 13 05:37:03 linuxrulz sshd[25235]: Received disconnect from 129.213.129.115 port 50542:11: Bye Bye [preauth]
Oct 13 05:37:03 linuxrulz sshd[25235]: Disconnected from 129.213.129.115 port 50542 [preauth]
Oct 13 05:51:28 linuxrulz sshd[27380]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.213.129.115  user=r.r
Oct 13 05:51:30 linuxrulz sshd[27380]: Failed password for r.r from 129.213.129.115 port 41708 ssh2
Oct 13 05:51:30 linuxrulz sshd[27380]: Received disconnect from 129.213.129.115 port 41708:11: Bye Bye [preauth]
Oct 13 05:51:30 linuxrulz sshd[27380]: Disconnected from 129.213.129.115 port 41708 [preauth]
Oct 13 05:55:19 linuxrulz sshd[28036]: pam_unix(sshd:auth): auth........
-------------------------------
2019-10-14 03:39:15

最近上报的IP列表

205.183.105.218 108.239.178.250 255.14.196.22 89.241.83.126
253.64.205.232 146.245.61.119 186.252.149.21 27.33.40.224
185.239.46.193 41.227.244.173 13.8.51.187 97.183.190.218
99.2.147.173 138.191.236.190 44.155.240.28 75.98.174.175
224.73.232.215 189.97.231.185 236.175.98.28 167.44.180.222