必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): Korea (the Republic of)

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 14.50.14.208
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 60145
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;14.50.14.208.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025022400 1800 900 604800 86400

;; Query time: 15 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Feb 24 15:25:28 CST 2025
;; MSG SIZE  rcvd: 105
HOST信息:
Host 208.14.50.14.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 208.14.50.14.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
5.40.253.6 attackspam
Automatic report - Port Scan Attack
2019-07-25 11:04:26
54.37.68.66 attackbotsspam
Jul 25 03:44:56 debian sshd\[811\]: Invalid user helpdesk from 54.37.68.66 port 51884
Jul 25 03:44:56 debian sshd\[811\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=54.37.68.66
...
2019-07-25 10:54:23
202.71.0.78 attack
2019-07-25T10:14:56.558526enmeeting.mahidol.ac.th sshd\[11762\]: Invalid user hpcadmin from 202.71.0.78 port 37342
2019-07-25T10:14:56.573319enmeeting.mahidol.ac.th sshd\[11762\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=202.71.0.78
2019-07-25T10:14:58.107245enmeeting.mahidol.ac.th sshd\[11762\]: Failed password for invalid user hpcadmin from 202.71.0.78 port 37342 ssh2
...
2019-07-25 11:24:21
45.55.190.106 attack
2019-07-25T02:44:07.615669abusebot-5.cloudsearch.cf sshd\[7067\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.55.190.106  user=root
2019-07-25 10:57:17
190.242.47.26 attack
port scan and connect, tcp 3306 (mysql)
2019-07-25 11:22:35
59.145.221.103 attackspam
Jul 25 04:48:15 eventyay sshd[18544]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=59.145.221.103
Jul 25 04:48:17 eventyay sshd[18544]: Failed password for invalid user test from 59.145.221.103 port 57677 ssh2
Jul 25 04:55:37 eventyay sshd[20229]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=59.145.221.103
...
2019-07-25 11:11:46
123.193.48.182 attackspambots
Jul 25 04:55:14 mail sshd\[28723\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=123.193.48.182  user=root
Jul 25 04:55:16 mail sshd\[28723\]: Failed password for root from 123.193.48.182 port 36432 ssh2
Jul 25 05:01:53 mail sshd\[29974\]: Invalid user frank from 123.193.48.182 port 59374
Jul 25 05:01:53 mail sshd\[29974\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=123.193.48.182
Jul 25 05:01:55 mail sshd\[29974\]: Failed password for invalid user frank from 123.193.48.182 port 59374 ssh2
2019-07-25 11:09:47
185.143.221.58 attackspam
Jul 25 04:36:44 lumpi kernel: INPUT:DROP:SPAMHAUS_EDROP:IN=eth0 OUT= MAC=52:54:a2:01:a5:04:d2:74:7f:6e:37:e3:08:00 SRC=185.143.221.58 DST=172.31.1.100 LEN=40 TOS=0x00 PREC=0x00 TTL=244 ID=29345 PROTO=TCP SPT=50581 DPT=5686 WINDOW=1024 RES=0x00 SYN URGP=0 
...
2019-07-25 10:48:56
43.230.144.18 attack
Unauthorised access (Jul 25) SRC=43.230.144.18 LEN=40 TTL=244 ID=25571 TCP DPT=445 WINDOW=1024 SYN
2019-07-25 10:47:03
51.254.58.226 attackspambots
Jul 25 03:08:10 mail postfix/smtpd\[3719\]: warning: unknown\[51.254.58.226\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6\
Jul 25 03:26:32 mail postfix/smtpd\[3929\]: warning: unknown\[51.254.58.226\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6\
Jul 25 03:44:52 mail postfix/smtpd\[3222\]: warning: unknown\[51.254.58.226\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6\
Jul 25 04:21:30 mail postfix/smtpd\[7116\]: warning: unknown\[51.254.58.226\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6\
2019-07-25 11:07:04
209.17.96.122 attackspam
Port scan attempt detected by AWS-CCS, CTS, India
2019-07-25 11:05:37
115.135.9.168 attackspam
Autoban   115.135.9.168 AUTH/CONNECT
2019-07-25 11:04:56
95.110.167.67 attack
Automatic report - Banned IP Access
2019-07-25 11:15:09
54.38.55.227 attackbotsspam
Jul 25 04:00:27 mail sshd\[8481\]: Invalid user admin from 54.38.55.227\
Jul 25 04:00:30 mail sshd\[8481\]: Failed password for invalid user admin from 54.38.55.227 port 46970 ssh2\
Jul 25 04:05:06 mail sshd\[8519\]: Invalid user 8 from 54.38.55.227\
Jul 25 04:05:07 mail sshd\[8519\]: Failed password for invalid user 8 from 54.38.55.227 port 43704 ssh2\
Jul 25 04:09:40 mail sshd\[8575\]: Invalid user cbs from 54.38.55.227\
Jul 25 04:09:42 mail sshd\[8575\]: Failed password for invalid user cbs from 54.38.55.227 port 40436 ssh2\
2019-07-25 11:40:55
139.59.41.168 attackbots
Jul 25 08:38:27 vibhu-HP-Z238-Microtower-Workstation sshd\[11328\]: Invalid user extension from 139.59.41.168
Jul 25 08:38:27 vibhu-HP-Z238-Microtower-Workstation sshd\[11328\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.41.168
Jul 25 08:38:29 vibhu-HP-Z238-Microtower-Workstation sshd\[11328\]: Failed password for invalid user extension from 139.59.41.168 port 59906 ssh2
Jul 25 08:43:46 vibhu-HP-Z238-Microtower-Workstation sshd\[11556\]: Invalid user suman from 139.59.41.168
Jul 25 08:43:46 vibhu-HP-Z238-Microtower-Workstation sshd\[11556\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.41.168
...
2019-07-25 11:27:51

最近上报的IP列表

74.113.141.180 203.225.74.36 241.136.216.151 229.118.155.45
16.240.187.16 231.178.86.214 87.22.87.24 227.246.59.192
71.103.71.234 66.79.125.24 191.212.20.101 8.157.191.131
218.90.106.228 31.10.123.245 159.69.185.209 57.16.241.46
28.233.15.113 126.69.6.125 48.225.183.36 82.109.121.25