必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): South Africa

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 146.141.190.14
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 8730
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;146.141.190.14.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025020400 1800 900 604800 86400

;; Query time: 57 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Feb 04 19:03:30 CST 2025
;; MSG SIZE  rcvd: 107
HOST信息:
14.190.141.146.in-addr.arpa domain name pointer pc14.witsjunclp07.wits.ac.za.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
14.190.141.146.in-addr.arpa	name = pc14.witsjunclp07.wits.ac.za.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
185.74.228.140 attack
Unauthorized connection attempt detected from IP address 185.74.228.140 to port 445
2019-12-28 19:16:16
211.144.12.75 attackspambots
Dec 28 07:13:49 mail sshd[28402]: Invalid user ziraksaz from 211.144.12.75
Dec 28 07:13:49 mail sshd[28402]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=211.144.12.75
Dec 28 07:13:49 mail sshd[28402]: Invalid user ziraksaz from 211.144.12.75
Dec 28 07:13:52 mail sshd[28402]: Failed password for invalid user ziraksaz from 211.144.12.75 port 64163 ssh2
Dec 28 07:22:51 mail sshd[29508]: Invalid user butter from 211.144.12.75
...
2019-12-28 19:43:06
71.195.92.123 attackspam
Honeypot attack, port: 23, PTR: c-71-195-92-123.hsd1.pa.comcast.net.
2019-12-28 19:28:22
175.176.135.53 attackspam
Scanning
2019-12-28 19:39:54
45.136.109.83 attack
[portscan] tcp/22 [SSH]
in BlMailspike:'listed'
*(RWIN=1024)(12281307)
2019-12-28 19:27:22
45.55.80.186 attackspambots
Invalid user host from 45.55.80.186 port 41410
2019-12-28 19:26:39
139.59.42.69 attackspambots
Dec 28 11:29:15 dev0-dcde-rnet sshd[13126]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.42.69
Dec 28 11:29:17 dev0-dcde-rnet sshd[13126]: Failed password for invalid user trenduser from 139.59.42.69 port 51024 ssh2
Dec 28 11:32:39 dev0-dcde-rnet sshd[13191]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.42.69
2019-12-28 19:44:53
220.133.249.198 attackbots
Honeypot attack, port: 445, PTR: 220-133-249-198.HINET-IP.hinet.net.
2019-12-28 19:52:52
18.216.95.66 attackspam
18.216.95.66 - - \[28/Dec/2019:11:57:02 +0100\] "POST /wp-login.php HTTP/1.0" 200 7556 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0"
18.216.95.66 - - \[28/Dec/2019:11:57:05 +0100\] "POST /wp-login.php HTTP/1.0" 200 7381 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0"
18.216.95.66 - - \[28/Dec/2019:11:57:07 +0100\] "POST /wp-login.php HTTP/1.0" 200 7376 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0"
2019-12-28 19:49:42
103.109.218.125 attackspambots
" "
2019-12-28 19:18:30
88.26.210.83 attackbots
19/12/28@01:23:21: FAIL: Alarm-Network address from=88.26.210.83
19/12/28@01:23:21: FAIL: Alarm-Network address from=88.26.210.83
...
2019-12-28 19:22:37
51.83.98.52 attackbots
SSH Brute Force, server-1 sshd[13590]: Failed password for invalid user admin from 51.83.98.52 port 45486 ssh2
2019-12-28 19:41:28
51.75.67.69 attackspam
Dec 28 08:55:53 ks10 sshd[8865]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.75.67.69 
Dec 28 08:55:55 ks10 sshd[8865]: Failed password for invalid user pos from 51.75.67.69 port 58966 ssh2
...
2019-12-28 19:29:53
125.212.129.26 attack
Unauthorized connection attempt detected from IP address 125.212.129.26 to port 445
2019-12-28 19:40:39
188.64.183.245 attack
Honeypot attack, port: 23, PTR: PTR record not found
2019-12-28 19:22:01

最近上报的IP列表

236.74.172.70 107.178.194.157 178.58.159.140 176.97.205.115
52.48.199.201 255.217.187.235 239.32.205.92 132.197.145.255
75.14.226.235 139.215.106.231 249.213.245.20 30.57.28.231
239.105.147.25 61.77.235.65 185.248.210.160 40.22.190.126
176.208.247.147 160.223.57.231 6.134.16.15 88.233.137.37