必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): United States of America (the)

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 192.146.55.14
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 29494
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;192.146.55.14.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025021301 1800 900 604800 86400

;; Query time: 67 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 14 07:25:25 CST 2025
;; MSG SIZE  rcvd: 106
HOST信息:
Host 14.55.146.192.in-addr.arpa not found: 2(SERVFAIL)
NSLOOKUP信息:
server can't find 192.146.55.14.in-addr.arpa: SERVFAIL
相关IP信息:
最新评论:
IP 类型 评论内容 时间
157.230.31.236 attackspambots
May  1 16:12:49 markkoudstaal sshd[12047]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.230.31.236
May  1 16:12:52 markkoudstaal sshd[12047]: Failed password for invalid user kim from 157.230.31.236 port 41150 ssh2
May  1 16:16:39 markkoudstaal sshd[12740]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.230.31.236
2020-05-02 00:38:13
106.13.134.19 attackspambots
May  1 13:38:17 ns392434 sshd[13174]: Invalid user pai from 106.13.134.19 port 34706
May  1 13:38:17 ns392434 sshd[13174]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.134.19
May  1 13:38:17 ns392434 sshd[13174]: Invalid user pai from 106.13.134.19 port 34706
May  1 13:38:19 ns392434 sshd[13174]: Failed password for invalid user pai from 106.13.134.19 port 34706 ssh2
May  1 13:45:20 ns392434 sshd[13444]: Invalid user kalista from 106.13.134.19 port 45798
May  1 13:45:20 ns392434 sshd[13444]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.134.19
May  1 13:45:20 ns392434 sshd[13444]: Invalid user kalista from 106.13.134.19 port 45798
May  1 13:45:22 ns392434 sshd[13444]: Failed password for invalid user kalista from 106.13.134.19 port 45798 ssh2
May  1 13:47:52 ns392434 sshd[13496]: Invalid user test_user from 106.13.134.19 port 43416
2020-05-02 00:47:01
177.94.225.8 attackspambots
Automatic report - Port Scan Attack
2020-05-02 00:29:45
59.127.1.12 attackbots
May  1 14:50:41 vpn01 sshd[4618]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=59.127.1.12
May  1 14:50:43 vpn01 sshd[4618]: Failed password for invalid user steam from 59.127.1.12 port 51892 ssh2
...
2020-05-02 00:31:28
73.206.168.105 attack
May 01 07:40:17 tcp        0      0 r.ca:22            73.206.168.105:9560         SYN_RECV
2020-05-02 00:37:49
188.243.25.167 attackbots
May  1 13:47:39 mout sshd[24699]: Failed password for pi from 188.243.25.167 port 41320 ssh2
May  1 13:47:41 mout sshd[24699]: Failed password for pi from 188.243.25.167 port 41320 ssh2
May  1 13:47:43 mout sshd[24699]: Failed password for pi from 188.243.25.167 port 41320 ssh2
2020-05-02 00:58:14
109.42.1.170 attackbotsspam
May  1 13:47:41 [host] kernel: [4962588.839865] [U
May  1 13:47:42 [host] kernel: [4962589.635216] [U
May  1 13:47:43 [host] kernel: [4962590.635104] [U
May  1 13:47:46 [host] kernel: [4962593.226625] [U
May  1 13:47:47 [host] kernel: [4962594.226666] [U
May  1 13:47:53 [host] kernel: [4962600.417413] [U
2020-05-02 00:46:46
83.228.38.250 attack
May 01 07:35:17 tcp        0      0 r.ca:22            83.228.38.250:29665         SYN_RECV
2020-05-02 00:36:21
203.147.64.147 attackspambots
$f2bV_matches
2020-05-02 00:49:49
162.243.141.55 attackspambots
trying to access non-authorized port
2020-05-02 01:08:24
222.186.42.137 attackspam
May  1 23:55:51 webhost01 sshd[1260]: Failed password for root from 222.186.42.137 port 52423 ssh2
...
2020-05-02 00:57:47
51.178.78.154 attackbots
Excessive Port-Scanning
2020-05-02 00:33:51
148.70.24.20 attackbotsspam
Invalid user shuo from 148.70.24.20 port 55766
2020-05-02 00:52:01
58.68.234.182 attackspam
May  1 14:57:13 ws26vmsma01 sshd[206139]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=58.68.234.182
May  1 14:57:15 ws26vmsma01 sshd[206139]: Failed password for invalid user maira from 58.68.234.182 port 10312 ssh2
...
2020-05-02 01:06:54
79.152.165.196 attackspam
Automatic report - Port Scan Attack
2020-05-02 00:52:44

最近上报的IP列表

15.1.85.121 57.57.125.245 237.199.168.117 153.11.188.34
209.54.48.244 74.85.133.108 132.128.83.241 99.80.232.51
103.181.125.157 30.181.103.30 171.231.106.51 198.253.163.225
239.43.183.231 254.77.6.147 5.253.82.19 137.159.212.74
230.176.165.140 218.99.151.42 243.127.147.115 61.23.207.117