必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): Germany

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 143.99.14.7
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 9781
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;143.99.14.7.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025121700 1800 900 604800 86400

;; Query time: 11 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Dec 17 14:14:04 CST 2025
;; MSG SIZE  rcvd: 104
HOST信息:
Host 7.14.99.143.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 7.14.99.143.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
106.13.119.163 attackbots
Automatic report
2019-07-29 08:16:07
124.29.217.168 attackbots
Jul 29 00:44:53 OPSO sshd\[32577\]: Invalid user openit from 124.29.217.168 port 59366
Jul 29 00:44:53 OPSO sshd\[32577\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=124.29.217.168
Jul 29 00:44:55 OPSO sshd\[32577\]: Failed password for invalid user openit from 124.29.217.168 port 59366 ssh2
Jul 29 00:50:21 OPSO sshd\[1138\]: Invalid user ding from 124.29.217.168 port 54146
Jul 29 00:50:21 OPSO sshd\[1138\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=124.29.217.168
2019-07-29 08:38:33
212.200.130.80 attackbotsspam
port scan and connect, tcp 23 (telnet)
2019-07-29 08:24:50
182.254.150.47 attackbots
SMB Server BruteForce Attack
2019-07-29 08:13:20
107.173.176.124 attackbots
$f2bV_matches
2019-07-29 08:17:28
45.82.153.7 attackspam
29.07.2019 00:36:20 Connection to port 5590 blocked by firewall
2019-07-29 08:44:01
51.68.225.229 attackspam
2019/07/28 23:29:21 [error] 1240#1240: *1002 FastCGI sent in stderr: "PHP message: [51.68.225.229] user 9had: authentication failure for "https://nihad.dk/wp-admin/": Password Mismatch" while reading response header from upstream, client: 51.68.225.229, server: nihad.dk, request: "POST /wp-login.php HTTP/1.1", upstream: "fastcgi://unix:/var/run/php-fpm-nihad.dk.sock:", host: "nihad.dk"
2019/07/28 23:29:21 [error] 1240#1240: *1004 FastCGI sent in stderr: "PHP message: [51.68.225.229] user [login]: authentication failure for "https://nihad.dk/wp-admin/": Password Mismatch" while reading response header from upstream, client: 51.68.225.229, server: nihad.dk, request: "POST /xmlrpc.php HTTP/1.1", upstream: "fastcgi://unix:/var/run/php-fpm-nihad.dk.sock:", host: "nihad.dk"
...
2019-07-29 08:37:04
88.33.36.159 attack
scan z
2019-07-29 08:46:46
118.24.148.154 attackspambots
Jul 27 02:35:01 nxxxxxxx0 sshd[8881]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.24.148.154  user=r.r
Jul 27 02:35:03 nxxxxxxx0 sshd[8881]: Failed password for r.r from 118.24.148.154 port 35322 ssh2
Jul 27 02:35:03 nxxxxxxx0 sshd[8881]: Received disconnect from 118.24.148.154: 11: Bye Bye [preauth]
Jul 27 03:00:11 nxxxxxxx0 sshd[10720]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.24.148.154  user=r.r
Jul 27 03:00:13 nxxxxxxx0 sshd[10720]: Failed password for r.r from 118.24.148.154 port 39872 ssh2
Jul 27 03:00:13 nxxxxxxx0 sshd[10720]: Received disconnect from 118.24.148.154: 11: Bye Bye [preauth]
Jul 27 03:03:20 nxxxxxxx0 sshd[11075]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.24.148.154  user=r.r
Jul 27 03:03:21 nxxxxxxx0 sshd[11075]: Failed password for r.r from 118.24.148.154 port 39590 ssh2
Jul 27 03:03:22 nxxxxxxx0 sshd........
-------------------------------
2019-07-29 08:52:41
118.21.111.124 attackbots
2019-07-29T00:24:10.617838abusebot-5.cloudsearch.cf sshd\[29534\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=i118-21-111-124.s30.a048.ap.plala.or.jp  user=root
2019-07-29 08:27:26
58.64.178.169 attack
Honeypot attack, port: 445, PTR: PTR record not found
2019-07-29 08:09:57
117.3.81.239 attackspambots
Unauthorized connection attempt from IP address 117.3.81.239 on Port 445(SMB)
2019-07-29 08:17:11
118.171.43.198 attack
Hits on port 445
2019-07-29 08:50:29
5.249.160.8 attack
2019-07-2902:02:10dovecot_loginauthenticatorfailedfor\(USER\)[5.249.160.8]:59012:535Incorrectauthenticationdata\(set_id=helpdesk@royalhosting.ch\)2019-07-2902:02:32dovecot_loginauthenticatorfailedfor\(USER\)[5.249.160.8]:39428:535Incorrectauthenticationdata\(set_id=helpdesk@rssolution.ch\)2019-07-2902:12:10dovecot_loginauthenticatorfailedfor\(USER\)[5.249.160.8]:58290:535Incorrectauthenticationdata\(set_id=helpdesk@sgengineering.ch\)2019-07-2902:12:21dovecot_loginauthenticatorfailedfor\(USER\)[5.249.160.8]:60876:535Incorrectauthenticationdata\(set_id=helpdesk@shadowdrummer.ch\)2019-07-2902:12:43dovecot_loginauthenticatorfailedfor\(USER\)[5.249.160.8]:42070:535Incorrectauthenticationdata\(set_id=helpdesk@sherman.ch\)2019-07-2902:23:31dovecot_loginauthenticatorfailedfor\(USER\)[5.249.160.8]:35524:535Incorrectauthenticationdata\(set_id=helpdesk@startpromotion.ch\)2019-07-2902:26:08dovecot_loginauthenticatorfailedfor\(USER\)[5.249.160.8]:40922:535Incorrectauthenticationdata\(set_id=helpdesk@studioaurabiasca.ch\)2
2019-07-29 08:39:56
110.4.45.185 attack
xmlrpc attack
2019-07-29 08:35:31

最近上报的IP列表

165.193.127.153 232.85.224.21 163.230.108.107 242.163.165.132
31.225.29.162 185.227.49.208 222.19.222.41 213.0.183.181
104.67.137.170 189.120.11.11 205.93.129.146 196.4.104.2
13.186.42.83 78.91.120.22 37.41.215.65 56.208.227.20
184.171.239.177 49.25.107.157 213.25.43.166 87.22.202.241