必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): Korea Republic of

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 14.46.190.13
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 36485
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;14.46.190.13.			IN	A

;; AUTHORITY SECTION:
.			60	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022020701 1800 900 604800 86400

;; Query time: 16 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Feb 08 02:44:01 CST 2022
;; MSG SIZE  rcvd: 105
HOST信息:
Host 13.190.46.14.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 13.190.46.14.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
77.123.154.234 attackbotsspam
Oct 25 12:55:25 localhost sshd\[23990\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=77.123.154.234  user=root
Oct 25 12:55:27 localhost sshd\[23990\]: Failed password for root from 77.123.154.234 port 51760 ssh2
Oct 25 13:09:47 localhost sshd\[24200\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=77.123.154.234  user=root
...
2019-10-25 22:11:31
95.90.142.55 attackbotsspam
2019-10-25T14:08:51.716279abusebot-5.cloudsearch.cf sshd\[3829\]: Invalid user support from 95.90.142.55 port 39338
2019-10-25 22:15:13
37.59.114.113 attack
2019-10-25T14:10:41.822212abusebot-5.cloudsearch.cf sshd\[3838\]: Invalid user yjlo from 37.59.114.113 port 40464
2019-10-25 22:20:56
5.140.163.118 attack
Oct 25 14:08:41 icinga sshd[20910]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=5.140.163.118
Oct 25 14:08:43 icinga sshd[20910]: Failed password for invalid user admin from 5.140.163.118 port 51379 ssh2
...
2019-10-25 22:18:18
104.36.71.146 attackbots
Oct 25 14:00:53 heissa sshd\[11106\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.36.71.146  user=root
Oct 25 14:00:54 heissa sshd\[11106\]: Failed password for root from 104.36.71.146 port 58750 ssh2
Oct 25 14:04:30 heissa sshd\[11620\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.36.71.146  user=root
Oct 25 14:04:32 heissa sshd\[11620\]: Failed password for root from 104.36.71.146 port 41936 ssh2
Oct 25 14:08:18 heissa sshd\[12136\]: Invalid user catchall from 104.36.71.146 port 53358
Oct 25 14:08:18 heissa sshd\[12136\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.36.71.146
2019-10-25 22:34:17
113.87.47.115 attack
Oct 24 02:21:29 fv15 sshd[31539]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=113.87.47.115  user=r.r
Oct 24 02:21:32 fv15 sshd[31539]: Failed password for r.r from 113.87.47.115 port 15725 ssh2
Oct 24 02:21:32 fv15 sshd[31539]: Received disconnect from 113.87.47.115: 11: Bye Bye [preauth]
Oct 24 02:40:16 fv15 sshd[15925]: Failed password for invalid user pul from 113.87.47.115 port 15074 ssh2
Oct 24 02:40:16 fv15 sshd[15925]: Received disconnect from 113.87.47.115: 11: Bye Bye [preauth]
Oct 24 02:45:00 fv15 sshd[9056]: Failed password for invalid user Adminixxxr from 113.87.47.115 port 14707 ssh2
Oct 24 02:45:01 fv15 sshd[9056]: Received disconnect from 113.87.47.115: 11: Bye Bye [preauth]
Oct 24 02:49:29 fv15 sshd[13006]: Failed password for invalid user lll from 113.87.47.115 port 13828 ssh2
Oct 24 02:49:30 fv15 sshd[13006]: Received disconnect from 113.87.47.115: 11: Bye Bye [preauth]


........
-----------------------------------------------
https://www.blockli
2019-10-25 22:52:56
139.59.245.3 attackbots
Oct 25 14:07:47 vpn01 sshd[2018]: Failed password for root from 139.59.245.3 port 12327 ssh2
...
2019-10-25 22:49:50
223.171.32.55 attackspam
Oct 25 14:00:06 game-panel sshd[18293]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=223.171.32.55
Oct 25 14:00:08 game-panel sshd[18293]: Failed password for invalid user 123 from 223.171.32.55 port 35176 ssh2
Oct 25 14:05:13 game-panel sshd[18453]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=223.171.32.55
2019-10-25 22:18:44
222.186.173.201 attackspambots
F2B jail: sshd. Time: 2019-10-25 16:04:51, Reported by: VKReport
2019-10-25 22:41:59
81.177.165.145 attackspambots
2019-10-25T13:40:22.048803abusebot-4.cloudsearch.cf sshd\[7145\]: Invalid user vps!@\#123g from 81.177.165.145 port 57592
2019-10-25 22:46:24
185.153.199.102 attack
RDP Bruteforce
2019-10-25 22:39:47
46.101.73.64 attackspam
Oct 25 09:23:56 ws19vmsma01 sshd[21994]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=46.101.73.64
Oct 25 09:23:58 ws19vmsma01 sshd[21994]: Failed password for invalid user th from 46.101.73.64 port 39434 ssh2
...
2019-10-25 22:38:35
129.213.100.212 attack
2019-10-24T19:48:15.3956281495-001 sshd\[29740\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.213.100.212  user=root
2019-10-24T19:48:16.9546351495-001 sshd\[29740\]: Failed password for root from 129.213.100.212 port 41052 ssh2
2019-10-24T19:58:23.2421841495-001 sshd\[30185\]: Invalid user teampspeak from 129.213.100.212 port 59506
2019-10-24T19:58:23.2454311495-001 sshd\[30185\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.213.100.212
2019-10-24T19:58:25.2713661495-001 sshd\[30185\]: Failed password for invalid user teampspeak from 129.213.100.212 port 59506 ssh2
2019-10-24T20:01:44.1518871495-001 sshd\[30384\]: Invalid user glife from 129.213.100.212 port 41354
2019-10-24T20:01:44.1606001495-001 sshd\[30384\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.213.100.212
2019-10-24T20:01:46.4475001495-001 sshd\[30384\]: Failed password fo
...
2019-10-25 22:34:37
177.92.66.226 attack
Oct 22 18:49:38 hostnameis sshd[50784]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=mvx-177-92-66-226.mundivox.com  user=r.r
Oct 22 18:49:41 hostnameis sshd[50784]: Failed password for r.r from 177.92.66.226 port 63954 ssh2
Oct 22 18:49:41 hostnameis sshd[50784]: Received disconnect from 177.92.66.226: 11: Bye Bye [preauth]
Oct 22 19:01:15 hostnameis sshd[50864]: Invalid user b from 177.92.66.226
Oct 22 19:01:15 hostnameis sshd[50864]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=mvx-177-92-66-226.mundivox.com 
Oct 22 19:01:17 hostnameis sshd[50864]: Failed password for invalid user b from 177.92.66.226 port 18890 ssh2
Oct 22 19:01:18 hostnameis sshd[50864]: Received disconnect from 177.92.66.226: 11: Bye Bye [preauth]
Oct 22 19:05:44 hostnameis sshd[50892]: Invalid user ready from 177.92.66.226
Oct 22 19:05:44 hostnameis sshd[50892]: pam_unix(sshd:auth): authentication failure; lognam........
------------------------------
2019-10-25 22:13:35
106.53.20.190 attack
Oct 23 22:14:16 xxxxxxx8434580 sshd[1880]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.53.20.190  user=r.r
Oct 23 22:14:18 xxxxxxx8434580 sshd[1880]: Failed password for r.r from 106.53.20.190 port 33638 ssh2
Oct 23 22:14:19 xxxxxxx8434580 sshd[1880]: Received disconnect from 106.53.20.190: 11: Bye Bye [preauth]
Oct 23 22:28:42 xxxxxxx8434580 sshd[1948]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.53.20.190  user=r.r
Oct 23 22:28:44 xxxxxxx8434580 sshd[1948]: Failed password for r.r from 106.53.20.190 port 47300 ssh2
Oct 23 22:28:45 xxxxxxx8434580 sshd[1948]: Received disconnect from 106.53.20.190: 11: Bye Bye [preauth]
Oct 23 22:33:10 xxxxxxx8434580 sshd[1977]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.53.20.190  user=r.r
Oct 23 22:33:12 xxxxxxx8434580 sshd[1977]: Failed password for r.r from 106.53.20.190 port 47370 ssh2
Oct........
-------------------------------
2019-10-25 22:47:18

最近上报的IP列表

144.126.215.79 189.180.85.201 47.93.2.125 159.65.150.139
45.190.158.171 103.113.158.193 117.183.107.224 111.119.183.19
77.109.172.46 77.82.175.134 45.251.228.111 112.94.101.186
207.172.166.186 86.56.212.5 99.227.228.170 188.253.14.57
103.117.103.223 183.247.176.59 77.93.46.207 103.72.73.134