必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): Switzerland

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 158.220.131.14
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 43852
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;158.220.131.14.			IN	A

;; AUTHORITY SECTION:
.			111	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022011001 1800 900 604800 86400

;; Query time: 18 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Jan 11 03:30:20 CST 2022
;; MSG SIZE  rcvd: 107
HOST信息:
Host 14.131.220.158.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 14.131.220.158.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
220.181.108.84 attack
Bad bot/spoofed identity
2020-04-17 00:21:37
106.13.20.229 attackbotsspam
Apr 16 14:12:34  sshd\[30156\]: User root from 106.13.20.229 not allowed because not listed in AllowUsersApr 16 14:12:36  sshd\[30156\]: Failed password for invalid user root from 106.13.20.229 port 52350 ssh2
...
2020-04-16 23:58:49
190.181.60.2 attack
Apr 16 10:49:37 ny01 sshd[17416]: Failed password for root from 190.181.60.2 port 39674 ssh2
Apr 16 10:56:36 ny01 sshd[18646]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=190.181.60.2
Apr 16 10:56:39 ny01 sshd[18646]: Failed password for invalid user sl from 190.181.60.2 port 48160 ssh2
2020-04-17 00:06:11
150.158.116.138 attack
Apr 16 14:41:27 master sshd[26381]: Failed password for invalid user bbuser from 150.158.116.138 port 56506 ssh2
Apr 16 14:54:41 master sshd[26460]: Failed password for invalid user user from 150.158.116.138 port 34570 ssh2
Apr 16 15:01:01 master sshd[26508]: Failed password for root from 150.158.116.138 port 41836 ssh2
Apr 16 15:06:49 master sshd[26531]: Failed password for invalid user jt from 150.158.116.138 port 49078 ssh2
Apr 16 15:12:46 master sshd[27053]: Failed password for invalid user postgres from 150.158.116.138 port 56326 ssh2
2020-04-16 23:45:08
156.202.204.52 attack
Apr 16 13:51:09 master sshd[26225]: Failed password for invalid user admin from 156.202.204.52 port 48511 ssh2
2020-04-17 00:24:39
92.222.156.151 attackspam
(sshd) Failed SSH login from 92.222.156.151 (DE/Germany/ip151.ip-92-222-156.eu): 5 in the last 3600 secs
2020-04-17 00:20:08
203.210.84.51 attackbotsspam
Apr 16 16:13:58 lukav-desktop sshd\[19959\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=203.210.84.51  user=root
Apr 16 16:14:00 lukav-desktop sshd\[19959\]: Failed password for root from 203.210.84.51 port 61976 ssh2
Apr 16 16:19:12 lukav-desktop sshd\[20155\]: Invalid user admin from 203.210.84.51
Apr 16 16:19:12 lukav-desktop sshd\[20155\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=203.210.84.51
Apr 16 16:19:14 lukav-desktop sshd\[20155\]: Failed password for invalid user admin from 203.210.84.51 port 61447 ssh2
2020-04-16 23:47:46
106.13.148.104 attack
$f2bV_matches
2020-04-16 23:58:19
114.67.84.151 attackspam
Brute-force attempt banned
2020-04-16 23:57:58
51.75.201.137 attackspam
2020-04-16T16:57:00.830114sd-86998 sshd[463]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=137.ip-51-75-201.eu  user=root
2020-04-16T16:57:03.164939sd-86998 sshd[463]: Failed password for root from 51.75.201.137 port 45630 ssh2
2020-04-16T17:00:25.461424sd-86998 sshd[1018]: Invalid user proxy from 51.75.201.137 port 52342
2020-04-16T17:00:25.466446sd-86998 sshd[1018]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=137.ip-51-75-201.eu
2020-04-16T17:00:25.461424sd-86998 sshd[1018]: Invalid user proxy from 51.75.201.137 port 52342
2020-04-16T17:00:27.279390sd-86998 sshd[1018]: Failed password for invalid user proxy from 51.75.201.137 port 52342 ssh2
...
2020-04-17 00:11:13
128.199.212.82 attackbots
Apr 16 15:02:25 plex sshd[25187]: Invalid user test from 128.199.212.82 port 55423
Apr 16 15:02:25 plex sshd[25187]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.199.212.82
Apr 16 15:02:25 plex sshd[25187]: Invalid user test from 128.199.212.82 port 55423
Apr 16 15:02:26 plex sshd[25187]: Failed password for invalid user test from 128.199.212.82 port 55423 ssh2
Apr 16 15:06:29 plex sshd[25340]: Invalid user admin from 128.199.212.82 port 41982
2020-04-17 00:16:33
78.128.113.75 attackbotsspam
Apr 16 17:57:20 mail.srvfarm.net postfix/smtpd[2934125]: warning: unknown[78.128.113.75]: SASL PLAIN authentication failed: 
Apr 16 17:57:20 mail.srvfarm.net postfix/smtpd[2934125]: lost connection after AUTH from unknown[78.128.113.75]
Apr 16 17:57:26 mail.srvfarm.net postfix/smtpd[2934800]: lost connection after AUTH from unknown[78.128.113.75]
Apr 16 17:57:29 mail.srvfarm.net postfix/smtps/smtpd[2935096]: lost connection after AUTH from unknown[78.128.113.75]
Apr 16 17:57:31 mail.srvfarm.net postfix/smtpd[2934806]: lost connection after AUTH from unknown[78.128.113.75]
2020-04-17 00:10:53
14.225.7.45 attack
2020-04-16T17:10:36.507488sd-86998 sshd[2482]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=14.225.7.45  user=root
2020-04-16T17:10:38.866843sd-86998 sshd[2482]: Failed password for root from 14.225.7.45 port 31367 ssh2
2020-04-16T17:14:18.454053sd-86998 sshd[3226]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=14.225.7.45  user=root
2020-04-16T17:14:20.291326sd-86998 sshd[3226]: Failed password for root from 14.225.7.45 port 54603 ssh2
2020-04-16T17:17:59.705195sd-86998 sshd[3850]: Invalid user test from 14.225.7.45 port 49429
...
2020-04-17 00:30:38
78.96.209.42 attackspambots
$f2bV_matches
2020-04-16 23:50:45
150.223.27.110 attackspam
odoo8
...
2020-04-17 00:32:22

最近上报的IP列表

250.180.62.141 55.76.89.164 27.203.20.5 227.42.165.97
103.149.91.62 71.8.250.31 74.120.141.132 11.229.28.171
32.6.105.212 186.208.222.197 86.164.201.197 53.33.77.25
15.77.61.82 205.122.60.128 148.208.98.82 197.77.190.244
175.16.96.239 133.176.57.251 131.210.230.204 17.9.138.241