必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): India

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): TTSL-ISP DIVISION

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 14.194.149.124
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 44466
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;14.194.149.124.			IN	A

;; AUTHORITY SECTION:
.			3600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019082200 1800 900 604800 86400

;; Query time: 2 msec
;; SERVER: 67.207.67.2#53(67.207.67.2)
;; WHEN: Fri Aug 23 00:32:34 CST 2019
;; MSG SIZE  rcvd: 118
HOST信息:
124.149.194.14.in-addr.arpa domain name pointer static-124.149.194.14-tataidc.co.in.
NSLOOKUP信息:
Server:		67.207.67.2
Address:	67.207.67.2#53

Non-authoritative answer:
124.149.194.14.in-addr.arpa	name = static-124.149.194.14-tataidc.co.in.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
106.12.105.193 attack
Muieblackcat Scanner Remote Code Injection Vulnerability, PTR: PTR record not found
2019-07-30 06:20:08
59.50.85.74 attackspambots
IP: 59.50.85.74
ASN: AS4134 No.31 Jin-rong Street
Port: IMAP over TLS protocol 993
Found in one or more Blacklists
Date: 29/07/2019 5:37:22 PM UTC
2019-07-30 06:25:12
5.190.133.225 attack
IP: 5.190.133.225
ASN: AS58224 Iran Telecommunication Company PJS
Port: Simple Mail Transfer 25
Found in one or more Blacklists
Date: 29/07/2019 5:37:18 PM UTC
2019-07-30 06:29:03
160.16.207.37 attack
Jul 29 20:41:59 mail sshd\[11039\]: Failed password for invalid user carolina from 160.16.207.37 port 36156 ssh2
Jul 29 20:57:05 mail sshd\[11247\]: Invalid user sunsun from 160.16.207.37 port 54582
...
2019-07-30 06:26:33
2602:ff3c:0:1:216:3eff:fee3:f8db attackbotsspam
[munged]::80 2602:ff3c:0:1:216:3eff:fee3:f8db - - [29/Jul/2019:19:36:04 +0200] "POST /[munged]: HTTP/1.1" 503 3020 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
[munged]::80 2602:ff3c:0:1:216:3eff:fee3:f8db - - [29/Jul/2019:19:36:06 +0200] "POST /[munged]: HTTP/1.1" 503 2881 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
[munged]::80 2602:ff3c:0:1:216:3eff:fee3:f8db - - [29/Jul/2019:19:36:08 +0200] "POST /[munged]: HTTP/1.1" 503 2881 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
[munged]::80 2602:ff3c:0:1:216:3eff:fee3:f8db - - [29/Jul/2019:19:36:09 +0200] "POST /[munged]: HTTP/1.1" 503 2881 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
[munged]::80 2602:ff3c:0:1:216:3eff:fee3:f8db - - [29/Jul/2019:19:36:10 +0200] "POST /[munged]: HTTP/1.1" 503 2881 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
[munged]::80 2602:ff3c:0:1:216:3ef
2019-07-30 06:54:46
120.92.101.176 attackspambots
port scan and connect, tcp 80 (http)
2019-07-30 06:57:11
78.128.113.70 attackspambots
Jul 29 23:58:24 mail postfix/smtpd\[8988\]: warning: unknown\[78.128.113.70\]: SASL PLAIN authentication failed: \
Jul 29 23:58:31 mail postfix/smtpd\[8988\]: warning: unknown\[78.128.113.70\]: SASL PLAIN authentication failed: \
Jul 30 00:07:43 mail postfix/smtpd\[10619\]: warning: unknown\[78.128.113.70\]: SASL PLAIN authentication failed: \
Jul 30 00:38:45 mail postfix/smtpd\[10203\]: warning: unknown\[78.128.113.70\]: SASL PLAIN authentication failed: \
2019-07-30 06:48:56
42.117.55.97 attack
IP: 42.117.55.97
ASN: AS18403 The Corporation for Financing
2019-07-30 06:34:09
158.69.120.84 attack
Muieblackcat Scanner Remote Code Injection Vulnerability, PTR: ns520627.ip-158-69-120.net.
2019-07-30 06:24:05
106.13.138.162 attack
Jul 29 12:57:11 keyhelp sshd[1529]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.138.162  user=r.r
Jul 29 12:57:13 keyhelp sshd[1529]: Failed password for r.r from 106.13.138.162 port 54340 ssh2
Jul 29 12:57:13 keyhelp sshd[1529]: Received disconnect from 106.13.138.162 port 54340:11: Bye Bye [preauth]
Jul 29 12:57:13 keyhelp sshd[1529]: Disconnected from 106.13.138.162 port 54340 [preauth]
Jul 29 13:14:16 keyhelp sshd[4557]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.138.162  user=r.r
Jul 29 13:14:18 keyhelp sshd[4557]: Failed password for r.r from 106.13.138.162 port 45038 ssh2
Jul 29 13:14:18 keyhelp sshd[4557]: Received disconnect from 106.13.138.162 port 45038:11: Bye Bye [preauth]
Jul 29 13:14:18 keyhelp sshd[4557]: Disconnected from 106.13.138.162 port 45038 [preauth]
Jul 29 13:19:19 keyhelp sshd[5502]: pam_unix(sshd:auth): authentication failure; logname= uid=0 ........
-------------------------------
2019-07-30 06:48:11
92.51.31.232 attackbotsspam
[portscan] Port scan
2019-07-30 06:42:39
183.250.110.222 attack
Automatic report - Banned IP Access
2019-07-30 07:02:41
185.95.187.93 attack
DATE:2019-07-29 19:35:59, IP:185.95.187.93, PORT:telnet - Telnet brute force auth on a honeypot server (epe-dc)
2019-07-30 07:04:09
94.21.32.219 attackbots
Jul 30 00:00:29 minden010 sshd[28812]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=94.21.32.219
Jul 30 00:00:31 minden010 sshd[28812]: Failed password for invalid user admin from 94.21.32.219 port 35044 ssh2
Jul 30 00:01:25 minden010 sshd[29432]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=94.21.32.219
...
2019-07-30 06:16:17
212.64.72.20 attack
2019-07-29T20:22:17.704838abusebot-5.cloudsearch.cf sshd\[630\]: Invalid user zhende123 from 212.64.72.20 port 35078
2019-07-30 06:24:38

最近上报的IP列表

83.245.137.128 129.211.133.29 135.23.26.196 167.86.72.241
187.91.30.59 62.200.37.88 197.95.36.40 202.137.155.29
117.66.140.125 49.31.66.235 40.153.183.145 117.61.145.169
78.132.134.155 125.172.80.31 53.156.53.36 45.155.205.117
185.173.105.40 212.140.130.112 123.21.196.238 80.101.246.241