必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): Canada

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 142.229.227.14
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 10243
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;142.229.227.14.			IN	A

;; AUTHORITY SECTION:
.			489	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022022700 1800 900 604800 86400

;; Query time: 24 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Feb 27 14:02:05 CST 2022
;; MSG SIZE  rcvd: 107
HOST信息:
14.227.229.142.in-addr.arpa domain name pointer albertacaresconnector.ca.
14.227.229.142.in-addr.arpa domain name pointer pic.alberta.ca.
14.227.229.142.in-addr.arpa domain name pointer emergency.alberta.ca.
14.227.229.142.in-addr.arpa domain name pointer saferoads.com.
14.227.229.142.in-addr.arpa domain name pointer albertahealthadvocates.ca.
14.227.229.142.in-addr.arpa domain name pointer efficiencyalberta.ca.
14.227.229.142.in-addr.arpa domain name pointer albertafilmlibrary.ca.
14.227.229.142.in-addr.arpa domain name pointer albertacaresconnector.com.
14.227.229.142.in-addr.arpa domain name pointer adlc.ca.
14.227.229.142.in-addr.arpa domain name pointer mhreviewpanel.ca.
14.227.229.142.in-addr.arpa domain name pointer albertacanada.com.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
14.227.229.142.in-addr.arpa	name = pic.alberta.ca.
14.227.229.142.in-addr.arpa	name = emergency.alberta.ca.
14.227.229.142.in-addr.arpa	name = saferoads.com.
14.227.229.142.in-addr.arpa	name = albertahealthadvocates.ca.
14.227.229.142.in-addr.arpa	name = efficiencyalberta.ca.
14.227.229.142.in-addr.arpa	name = albertafilmlibrary.ca.
14.227.229.142.in-addr.arpa	name = albertacaresconnector.com.
14.227.229.142.in-addr.arpa	name = adlc.ca.
14.227.229.142.in-addr.arpa	name = mhreviewpanel.ca.
14.227.229.142.in-addr.arpa	name = albertacanada.com.
14.227.229.142.in-addr.arpa	name = albertacaresconnector.ca.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
162.14.12.152 attackspambots
ICMP MH Probe, Scan /Distributed -
2020-07-31 00:35:20
179.124.49.11 attackbotsspam
Jul 30 13:59:23 mail.srvfarm.net postfix/smtpd[3877011]: warning: unknown[179.124.49.11]: SASL PLAIN authentication failed: 
Jul 30 13:59:23 mail.srvfarm.net postfix/smtpd[3877011]: lost connection after AUTH from unknown[179.124.49.11]
Jul 30 14:02:01 mail.srvfarm.net postfix/smtps/smtpd[3877941]: warning: unknown[179.124.49.11]: SASL PLAIN authentication failed: 
Jul 30 14:02:03 mail.srvfarm.net postfix/smtps/smtpd[3877941]: lost connection after AUTH from unknown[179.124.49.11]
Jul 30 14:02:10 mail.srvfarm.net postfix/smtpd[3874686]: warning: unknown[179.124.49.11]: SASL PLAIN authentication failed:
2020-07-31 01:08:33
117.196.174.195 attackbotsspam
1596110747 - 07/30/2020 14:05:47 Host: 117.196.174.195/117.196.174.195 Port: 445 TCP Blocked
2020-07-31 01:04:47
165.227.225.195 attackbotsspam
Jul 30 18:43:42 rancher-0 sshd[668988]: Invalid user shen from 165.227.225.195 port 43878
...
2020-07-31 00:54:05
201.55.198.9 attack
Invalid user gentle from 201.55.198.9 port 60218
2020-07-31 00:34:52
196.52.43.108 attackbotsspam
MultiHost/MultiPort Probe, Scan, Hack -
2020-07-31 00:36:24
5.61.56.161 attackspambots
[Wed Jul 29 13:47:00 2020 GMT] xxxx.com  [], Subject: https://xxxx.com/how-to-choose-the-best-living-room-furniture/ : ___123___Contact - xxxx___123___
2020-07-31 00:53:05
47.52.239.42 attack
47.52.239.42 - - \[30/Jul/2020:17:15:14 +0200\] "POST /wp-login.php HTTP/1.0" 200 6718 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0"
47.52.239.42 - - \[30/Jul/2020:17:15:17 +0200\] "POST /wp-login.php HTTP/1.0" 200 6548 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0"
47.52.239.42 - - \[30/Jul/2020:17:15:20 +0200\] "POST /wp-login.php HTTP/1.0" 200 6542 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0"
2020-07-31 00:28:50
212.64.14.185 attack
Jul 30 21:20:39 dhoomketu sshd[2033298]: Invalid user dong from 212.64.14.185 port 35758
Jul 30 21:20:39 dhoomketu sshd[2033298]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=212.64.14.185 
Jul 30 21:20:39 dhoomketu sshd[2033298]: Invalid user dong from 212.64.14.185 port 35758
Jul 30 21:20:41 dhoomketu sshd[2033298]: Failed password for invalid user dong from 212.64.14.185 port 35758 ssh2
Jul 30 21:24:53 dhoomketu sshd[2033500]: Invalid user chenggf from 212.64.14.185 port 56295
...
2020-07-31 00:26:04
157.245.37.160 attackbots
Jul 30 15:14:39 plex-server sshd[2613212]: Invalid user wdk from 157.245.37.160 port 45992
Jul 30 15:14:39 plex-server sshd[2613212]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.245.37.160 
Jul 30 15:14:39 plex-server sshd[2613212]: Invalid user wdk from 157.245.37.160 port 45992
Jul 30 15:14:41 plex-server sshd[2613212]: Failed password for invalid user wdk from 157.245.37.160 port 45992 ssh2
Jul 30 15:18:19 plex-server sshd[2615285]: Invalid user jhpark from 157.245.37.160 port 51632
...
2020-07-31 00:51:47
159.65.182.7 attackspam
2020-07-30T14:02:38.866661v22018076590370373 sshd[23296]: Invalid user ayudin from 159.65.182.7 port 34274
2020-07-30T14:02:38.871488v22018076590370373 sshd[23296]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.65.182.7
2020-07-30T14:02:38.866661v22018076590370373 sshd[23296]: Invalid user ayudin from 159.65.182.7 port 34274
2020-07-30T14:02:40.552764v22018076590370373 sshd[23296]: Failed password for invalid user ayudin from 159.65.182.7 port 34274 ssh2
2020-07-30T14:06:06.473646v22018076590370373 sshd[7257]: Invalid user louisx from 159.65.182.7 port 42178
...
2020-07-31 00:38:20
122.51.18.119 attackbotsspam
Jul 30 13:32:32 firewall sshd[16972]: Invalid user gaoguangyuan from 122.51.18.119
Jul 30 13:32:34 firewall sshd[16972]: Failed password for invalid user gaoguangyuan from 122.51.18.119 port 56536 ssh2
Jul 30 13:37:09 firewall sshd[17092]: Invalid user zhangyongqing from 122.51.18.119
...
2020-07-31 01:04:23
84.42.19.171 attack
eintrachtkultkellerfulda.de 84.42.19.171 [30/Jul/2020:14:05:55 +0200] "POST /xmlrpc.php HTTP/1.1" 200 408 "-" "Mozilla/5.0 (Windows NT 6.1; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/59.0.3071.109 Safari/537.36"
eintrachtkultkellerfulda.de 84.42.19.171 [30/Jul/2020:14:05:59 +0200] "POST /xmlrpc.php HTTP/1.1" 200 408 "-" "Mozilla/5.0 (Windows NT 6.1; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/59.0.3071.109 Safari/537.36"
2020-07-31 00:49:12
112.85.42.180 attackspam
Jul 30 18:36:33 vm1 sshd[23452]: Failed password for root from 112.85.42.180 port 10160 ssh2
Jul 30 18:36:48 vm1 sshd[23452]: error: maximum authentication attempts exceeded for root from 112.85.42.180 port 10160 ssh2 [preauth]
...
2020-07-31 00:48:14
183.87.157.202 attack
Jul 30 17:01:58 * sshd[13711]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=183.87.157.202
Jul 30 17:02:00 * sshd[13711]: Failed password for invalid user sysuser from 183.87.157.202 port 38332 ssh2
2020-07-31 00:43:33

最近上报的IP列表

142.22.88.28 142.229.246.49 142.227.203.89 142.234.109.155
142.207.145.31 142.234.139.47 142.234.17.199 47.220.181.184
142.251.40.170 142.251.40.112 142.251.40.234 142.251.40.202
142.251.40.208 142.251.40.176 142.251.40.147 142.251.40.101
142.251.40.165 142.251.4.129 142.251.40.240 142.251.40.144