必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): China

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 14.31.106.45
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 26629
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;14.31.106.45.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025022200 1800 900 604800 86400

;; Query time: 10 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Feb 22 21:48:38 CST 2025
;; MSG SIZE  rcvd: 105
HOST信息:
Host 45.106.31.14.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 45.106.31.14.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
46.196.250.74 attack
2019-08-03T17:02:04.322273abusebot-6.cloudsearch.cf sshd\[2252\]: Invalid user contabil from 46.196.250.74 port 60890
2019-08-04 04:33:25
177.131.121.50 attackspambots
Aug  3 17:04:20 apollo sshd\[32591\]: Invalid user admin from 177.131.121.50Aug  3 17:04:21 apollo sshd\[32591\]: Failed password for invalid user admin from 177.131.121.50 port 43584 ssh2Aug  3 17:09:56 apollo sshd\[32603\]: Invalid user johntlog from 177.131.121.50
...
2019-08-04 04:37:34
162.144.109.122 attack
Aug  3 22:34:41 srv-4 sshd\[29618\]: Invalid user lionel from 162.144.109.122
Aug  3 22:34:41 srv-4 sshd\[29618\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=162.144.109.122
Aug  3 22:34:43 srv-4 sshd\[29618\]: Failed password for invalid user lionel from 162.144.109.122 port 49664 ssh2
...
2019-08-04 04:24:48
5.88.27.36 attack
Automatic report - Port Scan Attack
2019-08-04 04:19:04
79.0.181.149 attackbots
$f2bV_matches
2019-08-04 04:12:00
208.81.163.110 attackbotsspam
SSH Bruteforce @ SigaVPN honeypot
2019-08-04 03:54:08
221.124.17.191 attack
Aug  3 19:35:22 MK-Soft-VM3 sshd\[27359\]: Invalid user administrador from 221.124.17.191 port 40188
Aug  3 19:35:22 MK-Soft-VM3 sshd\[27359\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=221.124.17.191
Aug  3 19:35:25 MK-Soft-VM3 sshd\[27359\]: Failed password for invalid user administrador from 221.124.17.191 port 40188 ssh2
...
2019-08-04 04:38:24
70.75.69.162 attack
Aug  3 20:03:16 lnxded63 sshd[19155]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=70.75.69.162
2019-08-04 04:08:10
185.143.223.135 attack
SSH bruteforce (Triggered fail2ban)
2019-08-04 04:34:33
59.127.221.185 attackbots
firewall-block, port(s): 81/tcp
2019-08-04 04:25:15
185.176.27.118 attackbotsspam
08/03/2019-16:01:37.265229 185.176.27.118 Protocol: 6 ET SCAN NMAP -sS window 1024
2019-08-04 04:16:20
185.176.27.46 attack
08/03/2019-16:21:01.893766 185.176.27.46 Protocol: 6 ET DROP Dshield Block Listed Source group 1
2019-08-04 04:24:23
79.137.72.121 attackbotsspam
Aug  3 21:33:44 mail sshd\[16573\]: Invalid user postgres from 79.137.72.121 port 39936
Aug  3 21:33:44 mail sshd\[16573\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=79.137.72.121
...
2019-08-04 04:37:55
178.153.21.220 attack
Lines containing failures of 178.153.21.220 (max 1000)
Aug  3 21:01:56 Server sshd[6081]: Invalid user admin from 178.153.21.220 port 57012
Aug  3 21:01:56 Server sshd[6081]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.153.21.220
Aug  3 21:01:58 Server sshd[6081]: Failed password for invalid user admin from 178.153.21.220 port 57012 ssh2


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=178.153.21.220
2019-08-04 04:03:53
49.207.33.2 attackspambots
Aug  3 17:58:20 localhost sshd\[12599\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.207.33.2  user=root
Aug  3 17:58:23 localhost sshd\[12599\]: Failed password for root from 49.207.33.2 port 41266 ssh2
Aug  3 18:05:29 localhost sshd\[12806\]: Invalid user nagios from 49.207.33.2 port 36150
Aug  3 18:05:29 localhost sshd\[12806\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.207.33.2
Aug  3 18:05:31 localhost sshd\[12806\]: Failed password for invalid user nagios from 49.207.33.2 port 36150 ssh2
...
2019-08-04 04:06:30

最近上报的IP列表

193.124.175.146 226.27.59.40 153.217.144.142 83.51.100.120
75.252.194.235 210.226.211.240 129.41.51.19 127.202.217.203
214.169.136.139 29.193.74.128 136.64.54.118 218.48.72.59
195.147.126.128 163.234.107.173 170.159.32.62 9.156.248.152
226.142.120.33 88.146.20.145 174.44.170.200 169.158.74.42