必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): Shenzhen

省份(region): Guangdong

国家(country): China

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 14.155.204.34
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 52159
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;14.155.204.34.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025062601 1800 900 604800 86400

;; Query time: 11 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Jun 26 23:05:53 CST 2025
;; MSG SIZE  rcvd: 106
HOST信息:
Host 34.204.155.14.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 34.204.155.14.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
103.225.139.46 attackspambots
Port probing on unauthorized port 445
2020-02-25 16:30:11
14.207.145.191 attackbotsspam
Icarus honeypot on github
2020-02-25 16:32:16
110.139.18.179 attackbotsspam
Unauthorized connection attempt detected from IP address 110.139.18.179 to port 445
2020-02-25 16:22:08
164.132.102.168 attack
Feb 25 08:53:11 silence02 sshd[27858]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=164.132.102.168
Feb 25 08:53:14 silence02 sshd[27858]: Failed password for invalid user spark2 from 164.132.102.168 port 45880 ssh2
Feb 25 09:02:27 silence02 sshd[28496]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=164.132.102.168
2020-02-25 16:04:47
165.227.47.215 attackspambots
2020-02-25T09:04:04.820401scmdmz1 sshd[17816]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.227.47.215  user=root
2020-02-25T09:04:06.533736scmdmz1 sshd[17816]: Failed password for root from 165.227.47.215 port 51620 ssh2
2020-02-25T09:04:07.536283scmdmz1 sshd[17818]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.227.47.215  user=admin
2020-02-25T09:04:09.661196scmdmz1 sshd[17818]: Failed password for admin from 165.227.47.215 port 37306 ssh2
2020-02-25T09:04:10.681271scmdmz1 sshd[17820]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.227.47.215  user=admin
2020-02-25T09:04:12.886256scmdmz1 sshd[17820]: Failed password for admin from 165.227.47.215 port 52274 ssh2
...
2020-02-25 16:07:22
180.76.157.150 attackbotsspam
Feb 24 21:40:26 tdfoods sshd\[22432\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.76.157.150  user=root
Feb 24 21:40:27 tdfoods sshd\[22432\]: Failed password for root from 180.76.157.150 port 57752 ssh2
Feb 24 21:46:57 tdfoods sshd\[23052\]: Invalid user zju from 180.76.157.150
Feb 24 21:46:57 tdfoods sshd\[23052\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.76.157.150
Feb 24 21:46:59 tdfoods sshd\[23052\]: Failed password for invalid user zju from 180.76.157.150 port 44890 ssh2
2020-02-25 15:54:15
46.101.103.191 attackbots
Feb 25 09:00:01 h2646465 sshd[29894]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=46.101.103.191  user=root
Feb 25 09:00:03 h2646465 sshd[29894]: Failed password for root from 46.101.103.191 port 57030 ssh2
Feb 25 09:00:41 h2646465 sshd[30779]: Invalid user oracle from 46.101.103.191
Feb 25 09:00:41 h2646465 sshd[30779]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=46.101.103.191
Feb 25 09:00:41 h2646465 sshd[30779]: Invalid user oracle from 46.101.103.191
Feb 25 09:00:42 h2646465 sshd[30779]: Failed password for invalid user oracle from 46.101.103.191 port 35136 ssh2
Feb 25 09:01:18 h2646465 sshd[30810]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=46.101.103.191  user=root
Feb 25 09:01:20 h2646465 sshd[30810]: Failed password for root from 46.101.103.191 port 41182 ssh2
Feb 25 09:01:55 h2646465 sshd[30816]: Invalid user postgres from 46.101.103.191
...
2020-02-25 16:11:08
89.248.168.202 attackspam
Feb 25 08:27:15 debian-2gb-nbg1-2 kernel: \[4874834.753259\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=89.248.168.202 DST=195.201.40.59 LEN=40 TOS=0x00 PREC=0x00 TTL=247 ID=48872 PROTO=TCP SPT=55865 DPT=6684 WINDOW=1024 RES=0x00 SYN URGP=0
2020-02-25 15:53:25
5.196.74.190 attack
Feb 25 09:28:12 vps647732 sshd[7268]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=5.196.74.190
Feb 25 09:28:14 vps647732 sshd[7268]: Failed password for invalid user sinusbot from 5.196.74.190 port 55672 ssh2
...
2020-02-25 16:31:19
51.75.195.25 attackbots
Feb 25 01:59:17 server sshd\[7855\]: Invalid user rstudio from 51.75.195.25
Feb 25 01:59:17 server sshd\[7855\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=25.ip-51-75-195.eu 
Feb 25 01:59:19 server sshd\[7855\]: Failed password for invalid user rstudio from 51.75.195.25 port 60098 ssh2
Feb 25 10:41:21 server sshd\[24523\]: Invalid user mattermos from 51.75.195.25
Feb 25 10:41:21 server sshd\[24523\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=25.ip-51-75-195.eu 
...
2020-02-25 16:22:21
221.167.65.16 attackbots
Automatic report - Port Scan Attack
2020-02-25 15:55:00
198.71.238.15 attackbotsspam
Automatic report - XMLRPC Attack
2020-02-25 16:15:38
103.45.106.172 attackspambots
Feb 25 09:28:50 MK-Soft-VM7 sshd[13495]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.45.106.172 
Feb 25 09:28:51 MK-Soft-VM7 sshd[13495]: Failed password for invalid user amsftp from 103.45.106.172 port 59522 ssh2
...
2020-02-25 16:30:34
159.203.41.58 attackspam
Feb 25 08:26:20 lnxmysql61 sshd[16187]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.203.41.58
2020-02-25 16:34:11
59.18.176.137 attack
Port Scan
2020-02-25 16:20:07

最近上报的IP列表

106.125.237.52 202.86.156.114 36.148.183.175 69.55.52.57
196.251.81.115 157.230.93.45 14.213.49.22 47.237.26.253
42.236.17.15 63.255.118.10 41.129.211.172 203.164.101.116
64.226.89.17 119.99.3.61 113.215.189.171 20.118.32.47
113.215.188.84 65.8.161.102 112.66.75.209 35.203.210.79