必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): Korea (the Republic of)

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 14.83.191.134
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 12858
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;14.83.191.134.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025021500 1800 900 604800 86400

;; Query time: 12 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Feb 15 15:26:30 CST 2025
;; MSG SIZE  rcvd: 106
HOST信息:
Host 134.191.83.14.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 134.191.83.14.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
189.130.55.149 attackspam
Automatic report - Port Scan Attack
2019-11-02 12:38:20
185.36.219.24 attackspambots
slow and persistent scanner
2019-11-02 13:09:59
169.47.142.211 attack
3389BruteforceFW21
2019-11-02 12:55:39
185.52.2.165 attackspam
C1,WP GET /suche/wp-login.php
2019-11-02 13:06:17
62.210.149.30 attackspambots
\[2019-11-02 00:37:27\] SECURITY\[2634\] res_security_log.c: SecurityEvent="FailedACL",EventTV="2019-11-02T00:37:27.220-0400",Severity="Error",Service="SIP",EventVersion="1",AccountID="653901112342174734",SessionID="0x7fdf2c003608",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/62.210.149.30/58869",ACLName="no_extension_match"
\[2019-11-02 00:37:46\] SECURITY\[2634\] res_security_log.c: SecurityEvent="FailedACL",EventTV="2019-11-02T00:37:46.792-0400",Severity="Error",Service="SIP",EventVersion="1",AccountID="465701112342174734",SessionID="0x7fdf2c3f5928",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/62.210.149.30/55297",ACLName="no_extension_match"
\[2019-11-02 00:38:06\] SECURITY\[2634\] res_security_log.c: SecurityEvent="FailedACL",EventTV="2019-11-02T00:38:06.673-0400",Severity="Error",Service="SIP",EventVersion="1",AccountID="689501112342174734",SessionID="0x7fdf2c003608",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/62.210.149.30/63202",ACLNam
2019-11-02 12:46:29
52.187.17.107 attackspambots
Nov  1 17:49:06 auw2 sshd\[22432\]: Invalid user cqcq from 52.187.17.107
Nov  1 17:49:06 auw2 sshd\[22432\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=52.187.17.107
Nov  1 17:49:08 auw2 sshd\[22432\]: Failed password for invalid user cqcq from 52.187.17.107 port 11319 ssh2
Nov  1 17:53:56 auw2 sshd\[22848\]: Invalid user com from 52.187.17.107
Nov  1 17:53:56 auw2 sshd\[22848\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=52.187.17.107
2019-11-02 13:16:05
114.242.236.140 attackspam
Nov  1 14:13:04 ahost sshd[29550]: Invalid user chmod from 114.242.236.140
Nov  1 14:13:04 ahost sshd[29550]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=114.242.236.140 
Nov  1 14:13:06 ahost sshd[29550]: Failed password for invalid user chmod from 114.242.236.140 port 45102 ssh2
Nov  1 14:13:06 ahost sshd[29550]: Received disconnect from 114.242.236.140: 11: Bye Bye [preauth]
Nov  1 14:27:00 ahost sshd[6053]: Invalid user lookingout from 114.242.236.140
Nov  1 14:27:00 ahost sshd[6053]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=114.242.236.140 
Nov  1 14:27:02 ahost sshd[6053]: Failed password for invalid user lookingout from 114.242.236.140 port 54928 ssh2
Nov  1 14:27:02 ahost sshd[6053]: Received disconnect from 114.242.236.140: 11: Bye Bye [preauth]
Nov  1 14:31:34 ahost sshd[6134]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=114.242........
------------------------------
2019-11-02 12:52:07
180.76.160.147 attackspambots
Nov  2 04:52:25 venus sshd\[8249\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.76.160.147  user=root
Nov  2 04:52:27 venus sshd\[8249\]: Failed password for root from 180.76.160.147 port 60574 ssh2
Nov  2 04:57:59 venus sshd\[8296\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.76.160.147  user=root
...
2019-11-02 12:59:11
202.78.197.197 attackbotsspam
Nov  2 04:50:23 h2177944 sshd\[452\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=202.78.197.197  user=root
Nov  2 04:50:25 h2177944 sshd\[452\]: Failed password for root from 202.78.197.197 port 54744 ssh2
Nov  2 04:54:44 h2177944 sshd\[615\]: Invalid user ue from 202.78.197.197 port 37074
Nov  2 04:54:44 h2177944 sshd\[615\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=202.78.197.197
...
2019-11-02 12:45:01
112.85.42.227 attackspam
Nov  2 00:56:39 TORMINT sshd\[18715\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.85.42.227  user=root
Nov  2 00:56:41 TORMINT sshd\[18715\]: Failed password for root from 112.85.42.227 port 29514 ssh2
Nov  2 00:59:09 TORMINT sshd\[18821\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.85.42.227  user=root
...
2019-11-02 13:04:15
206.189.52.160 attackspambots
WordPress wp-login brute force :: 206.189.52.160 0.212 - [02/Nov/2019:03:54:15  0000] [censored_1] "POST /wp-login.php HTTP/1.1" 200 1472 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0" "HTTP/1.1"
2019-11-02 13:05:01
208.100.26.241 attack
3389BruteforceFW21
2019-11-02 12:50:50
120.70.100.54 attackspambots
2019-11-02T03:49:00.090035hub.schaetter.us sshd\[20921\]: Invalid user robert from 120.70.100.54 port 44887
2019-11-02T03:49:00.097350hub.schaetter.us sshd\[20921\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=120.70.100.54
2019-11-02T03:49:02.423340hub.schaetter.us sshd\[20921\]: Failed password for invalid user robert from 120.70.100.54 port 44887 ssh2
2019-11-02T03:54:35.256882hub.schaetter.us sshd\[20979\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=120.70.100.54  user=root
2019-11-02T03:54:37.241376hub.schaetter.us sshd\[20979\]: Failed password for root from 120.70.100.54 port 35074 ssh2
...
2019-11-02 12:49:22
106.56.90.32 attack
IP Ban Report :  
 https://help-dysk.pl/wordpress-firewall-plugins/ip/106.56.90.32/ 
 
 CN - 1H : (669)  
 Protection Against DDoS WordPress plugin :  
 "odzyskiwanie danych help-dysk" 
 IP Address Ranges by Country : CN 
 NAME ASN : ASN4134 
 
 IP : 106.56.90.32 
 
 CIDR : 106.56.0.0/15 
 
 PREFIX COUNT : 5430 
 
 UNIQUE IP COUNT : 106919680 
 
 
 ATTACKS DETECTED ASN4134 :  
  1H - 17 
  3H - 36 
  6H - 63 
 12H - 133 
 24H - 273 
 
 DateTime : 2019-11-02 04:54:40 
 
 INFO :  HACK ! - Looking for resource vulnerabilities Scan Detected and Blocked by ADMIN  - data recovery
2019-11-02 12:46:06
177.66.208.235 attackbotsspam
Automatic report - Port Scan Attack
2019-11-02 13:02:57

最近上报的IP列表

62.144.56.255 35.132.114.231 63.252.240.134 181.193.114.78
115.11.247.95 166.211.91.112 139.0.45.99 236.232.100.36
151.52.117.148 236.219.226.69 141.86.139.34 147.90.129.214
247.158.118.210 58.155.77.22 192.32.91.156 160.133.26.117
198.97.1.65 25.255.196.26 234.151.203.164 69.17.111.71