必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): None

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 147.27.94.14
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 1882
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;147.27.94.14.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025021900 1800 900 604800 86400

;; Query time: 14 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Feb 20 01:07:58 CST 2025
;; MSG SIZE  rcvd: 105
HOST信息:
Host 14.94.27.147.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 14.94.27.147.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
162.243.142.193 attackspambots
Jul 31 04:40:34 lnxweb62 sshd[3384]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=162.243.142.193
Jul 31 04:40:34 lnxweb62 sshd[3384]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=162.243.142.193
2019-07-31 10:46:08
63.143.55.26 attackspambots
port scan/probe/communication attempt
2019-07-31 10:33:56
144.217.91.86 attackspambots
Jul 31 01:23:30 s64-1 sshd[30448]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=144.217.91.86
Jul 31 01:23:32 s64-1 sshd[30448]: Failed password for invalid user 123456 from 144.217.91.86 port 58076 ssh2
Jul 31 01:27:50 s64-1 sshd[30526]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=144.217.91.86
...
2019-07-31 10:33:31
159.65.97.238 attackbots
Automatic report - Banned IP Access
2019-07-31 10:52:31
27.76.59.169 attackbotsspam
port scan/probe/communication attempt
2019-07-31 10:49:14
66.175.222.12 attack
email spoofing containing vulgar language
2019-07-31 10:48:46
170.239.42.164 attackspambots
failed_logins
2019-07-31 10:56:16
188.165.206.185 attackbots
Jul 31 04:40:12 minden010 sshd[4545]: Failed password for root from 188.165.206.185 port 41394 ssh2
Jul 31 04:45:34 minden010 sshd[6417]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.165.206.185
Jul 31 04:45:36 minden010 sshd[6417]: Failed password for invalid user wayne from 188.165.206.185 port 37212 ssh2
...
2019-07-31 10:47:11
14.139.244.248 attackspam
port scan/probe/communication attempt
2019-07-31 10:49:58
190.193.110.10 attack
Jul 30 21:48:28 debian sshd\[7469\]: Invalid user cmsftp from 190.193.110.10 port 51826
Jul 30 21:48:28 debian sshd\[7469\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=190.193.110.10
Jul 30 21:48:29 debian sshd\[7469\]: Failed password for invalid user cmsftp from 190.193.110.10 port 51826 ssh2
...
2019-07-31 11:07:44
138.68.247.1 attack
Automatic report - Banned IP Access
2019-07-31 10:34:41
114.236.122.135 attack
20 attempts against mh-ssh on grain.magehost.pro
2019-07-31 11:03:25
35.224.59.213 attackbots
20 attempts against mh-ssh on comet.magehost.pro
2019-07-31 10:55:45
46.21.146.110 attackbots
port scan/probe/communication attempt
2019-07-31 10:35:17
195.201.96.159 attackspam
xmlrpc attack
2019-07-31 10:28:56

最近上报的IP列表

163.25.75.7 37.133.249.80 180.73.46.171 100.84.228.114
108.144.162.54 51.26.120.222 133.129.180.111 92.58.36.79
19.245.215.22 248.33.204.24 193.98.189.176 199.212.57.42
227.178.122.46 144.169.205.174 128.148.86.162 82.137.243.122
66.20.138.70 229.63.208.246 43.160.161.222 231.42.226.84