必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): South Korea

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): Korea Telecom

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 14.80.116.18
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 36529
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;14.80.116.18.			IN	A

;; AUTHORITY SECTION:
.			3600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019080502 1800 900 604800 86400

;; Query time: 2 msec
;; SERVER: 67.207.67.2#53(67.207.67.2)
;; WHEN: Tue Aug 06 02:22:12 CST 2019
;; MSG SIZE  rcvd: 116
HOST信息:
Host 18.116.80.14.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		67.207.67.2
Address:	67.207.67.2#53

** server can't find 18.116.80.14.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
92.252.241.11 attackspambots
suspicious action Tue, 25 Feb 2020 13:31:42 -0300
2020-02-26 08:06:11
183.87.63.204 attack
Automatic report - Banned IP Access
2020-02-26 08:06:35
46.101.103.191 attackbotsspam
Scanned 166 times in the last 24 hours on port 22
2020-02-26 08:18:28
181.189.136.10 attackspambots
Honeypot attack, port: 445, PTR: 181.189.136.10.tigo.net.gt.
2020-02-26 08:05:16
49.88.112.67 attack
Feb 26 00:44:31 v22018053744266470 sshd[15836]: Failed password for root from 49.88.112.67 port 54817 ssh2
Feb 26 00:49:05 v22018053744266470 sshd[16127]: Failed password for root from 49.88.112.67 port 11430 ssh2
...
2020-02-26 07:58:56
46.177.249.131 attackbotsspam
Automatic report - Port Scan Attack
2020-02-26 07:50:46
49.231.222.13 attackspambots
Trying to (more than 3 packets) bruteforce (not open) Samba/Microsoft-DS port 445
2020-02-26 08:21:59
111.229.78.120 attack
Feb 25 21:02:33 h2646465 sshd[28050]: Invalid user chenchengxin from 111.229.78.120
Feb 25 21:02:33 h2646465 sshd[28050]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.229.78.120
Feb 25 21:02:33 h2646465 sshd[28050]: Invalid user chenchengxin from 111.229.78.120
Feb 25 21:02:35 h2646465 sshd[28050]: Failed password for invalid user chenchengxin from 111.229.78.120 port 44024 ssh2
Feb 25 22:31:49 h2646465 sshd[6971]: Invalid user taeyoung from 111.229.78.120
Feb 25 22:31:49 h2646465 sshd[6971]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.229.78.120
Feb 25 22:31:49 h2646465 sshd[6971]: Invalid user taeyoung from 111.229.78.120
Feb 25 22:31:50 h2646465 sshd[6971]: Failed password for invalid user taeyoung from 111.229.78.120 port 47806 ssh2
Feb 25 22:44:35 h2646465 sshd[8287]: Invalid user nexus from 111.229.78.120
...
2020-02-26 08:03:20
185.243.180.35 attackspambots
Feb 26 03:22:50 our-server-hostname postfix/smtpd[2408]: connect from unknown[185.243.180.35]
Feb x@x
Feb x@x
Feb 26 03:22:52 our-server-hostname postfix/smtpd[2408]: D3275A4000B: client=unknown[185.243.180.35]
Feb x@x
Feb x@x
Feb 26 03:22:53 our-server-hostname postfix/smtpd[2408]: E4394A400C4: client=unknown[185.243.180.35]
Feb 26 03:22:54 our-server-hostname postfix/smtpd[2599]: 2B704A40132: client=unknown[127.0.0.1], orig_client=unknown[185.243.180.35]
Feb x@x
Feb 26 03:22:54 our-server-hostname postfix/smtpd[2599]: 67969A4000B: client=unknown[127.0.0.1], orig_client=unknown[185.243.180.35]
Feb x@x
Feb x@x
Feb x@x
Feb 26 03:22:54 our-server-hostname postfix/smtpd[2408]: A642CA4000B: client=unknown[185.243.180.35]
Feb 26 03:22:55 our-server-hostname postfix/smtpd[2599]: 27003A400C4: client=unknown[127.0.0.1], orig_client=unknown[185.243.180.35]
Feb x@x
Feb x@x
Feb x@x
Feb 26 03:22:55 our-server-hostname postfix/smtpd[2408]: 641CDA4000B: client=unknown[185.243.180.35]........
-------------------------------
2020-02-26 08:18:50
212.34.48.130 attackbotsspam
Unauthorized connection attempt from IP address 212.34.48.130 on Port 445(SMB)
2020-02-26 08:26:12
117.50.10.54 attackspambots
Feb 26 01:14:17 vps647732 sshd[32286]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=117.50.10.54
Feb 26 01:14:19 vps647732 sshd[32286]: Failed password for invalid user mqm from 117.50.10.54 port 58618 ssh2
...
2020-02-26 08:19:45
117.0.21.50 attackbotsspam
Scanning random ports - tries to find possible vulnerable services
2020-02-26 08:08:53
219.128.144.210 attack
Honeypot attack, port: 445, PTR: 210.144.128.219.broad.st.gd.dynamic.163data.com.cn.
2020-02-26 07:52:24
198.2.75.154 attackspambots
Honeypot attack, port: 5555, PTR: dhcp-198-2-75-154.cable.user.start.ca.
2020-02-26 08:22:17
171.233.176.178 attackbotsspam
Honeypot attack, port: 445, PTR: dynamic-ip-adsl.viettel.vn.
2020-02-26 08:01:57

最近上报的IP列表

118.100.179.224 57.253.21.148 38.88.48.23 151.97.33.156
209.107.24.113 55.161.226.152 191.177.52.73 39.44.222.87
65.101.210.1 39.184.183.5 194.249.61.3 119.42.118.157
41.40.233.230 15.183.22.230 78.89.38.167 114.167.22.19
71.121.163.82 119.29.191.40 96.186.48.178 128.28.84.94