必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): Hombrechtikon

省份(region): Zurich

国家(country): Switzerland

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): Bluewin

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:

; <<>> DiG 9.10.3-P4-Ubuntu <<>> 144.2.114.136
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 17661
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;144.2.114.136.			IN	A

;; AUTHORITY SECTION:
.			3600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019061101 1800 900 604800 86400

;; Query time: 4 msec
;; SERVER: 67.207.67.2#53(67.207.67.2)
;; WHEN: Wed Jun 12 09:00:06 CST 2019
;; MSG SIZE  rcvd: 117

HOST信息:
136.114.2.144.in-addr.arpa domain name pointer bbcs-114-136.pub.wingo.ch.
NSLOOKUP信息:
Server:		67.207.67.2
Address:	67.207.67.2#53

Non-authoritative answer:
136.114.2.144.in-addr.arpa	name = bbcs-114-136.pub.wingo.ch.

Authoritative answers can be found from:

相关IP信息:
最新评论:
IP 类型 评论内容 时间
42.178.89.71 attackspam
Port probing on unauthorized port 23
2020-10-03 22:43:48
111.229.254.17 attack
Invalid user scaner from 111.229.254.17 port 43890
2020-10-03 22:53:35
114.35.44.253 attack
Oct  3 19:39:00 itv-usvr-01 sshd[23651]: Invalid user ftp from 114.35.44.253
Oct  3 19:39:00 itv-usvr-01 sshd[23651]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=114.35.44.253
Oct  3 19:39:00 itv-usvr-01 sshd[23651]: Invalid user ftp from 114.35.44.253
Oct  3 19:39:02 itv-usvr-01 sshd[23651]: Failed password for invalid user ftp from 114.35.44.253 port 56314 ssh2
Oct  3 19:47:51 itv-usvr-01 sshd[24150]: Invalid user elasticsearch from 114.35.44.253
2020-10-03 22:26:04
192.35.169.24 attackspam
Unauthorized connection attempt from IP address 192.35.169.24 on Port 3389(RDP)
2020-10-03 22:29:38
219.74.87.163 attackbotsspam
37215/tcp 37215/tcp
[2020-08-08/10-02]2pkt
2020-10-03 23:11:31
88.206.115.235 attackspam
Icarus honeypot on github
2020-10-03 22:34:53
94.102.49.93 attackbotsspam
Port-scan: detected 200 distinct ports within a 24-hour window.
2020-10-03 22:30:11
167.71.47.142 attackbots
Automatic Fail2ban report - Trying login SSH
2020-10-03 22:40:38
71.6.146.186 attack
 TCP (SYN) 71.6.146.186:23320 -> port 8181, len 44
2020-10-03 22:46:53
219.89.196.131 attack
Icarus honeypot on github
2020-10-03 22:47:46
51.75.52.127 attackbots
scans once in preceeding hours on the ports (in chronological order) 2070 resulting in total of 1 scans from 51.75.52.0/22 block.
2020-10-03 22:59:17
104.143.83.242 attackbots
 TCP (SYN) 104.143.83.242:39822 -> port 21, len 44
2020-10-03 22:45:17
112.85.42.187 attackbots
Oct  3 16:27:30 ns381471 sshd[25371]: Failed password for root from 112.85.42.187 port 12538 ssh2
Oct  3 16:27:33 ns381471 sshd[25371]: Failed password for root from 112.85.42.187 port 12538 ssh2
2020-10-03 22:44:51
5.188.216.29 attackspambots
(mod_security) mod_security (id:210730) triggered by 5.188.216.29 (RU/Russia/-): 5 in the last 300 secs
2020-10-03 22:38:42
71.6.146.185 attack
[N10.H2.VM2] Port Scanner Detected Blocked by UFW
2020-10-03 22:48:54

最近上报的IP列表

155.153.160.245 95.201.192.24 117.92.202.217 125.49.167.55
44.97.76.213 179.160.142.238 158.9.126.110 150.27.195.82
189.78.172.117 216.158.245.125 59.5.120.222 109.188.127.103
203.115.73.240 57.183.104.107 198.71.236.68 142.164.209.142
105.235.135.113 134.163.224.4 12.206.181.214 114.61.252.0