必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): Sweden

运营商(isp): Tele2

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 194.14.86.138
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 5791
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;194.14.86.138.			IN	A

;; AUTHORITY SECTION:
.			447	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2020051401 1800 900 604800 86400

;; Query time: 100 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri May 15 07:47:53 CST 2020
;; MSG SIZE  rcvd: 117
HOST信息:
Host 138.86.14.194.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 138.86.14.194.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
45.113.77.26 attack
Feb 20 17:18:43 legacy sshd[31148]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.113.77.26
Feb 20 17:18:45 legacy sshd[31148]: Failed password for invalid user amandabackup from 45.113.77.26 port 42248 ssh2
Feb 20 17:22:14 legacy sshd[31209]: Failed password for daemon from 45.113.77.26 port 43708 ssh2
...
2020-02-21 01:28:18
60.53.221.31 attackspam
60.53.221.31 - - [20/Feb/2020:13:26:07 +0000] "POST /wp-login.php HTTP/1.1" 200 6409 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
60.53.221.31 - - [20/Feb/2020:13:26:10 +0000] "POST /wp-login.php HTTP/1.1" 200 6271 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
...
2020-02-21 01:26:43
58.250.89.46 attack
Feb 20 17:37:19 MK-Soft-VM3 sshd[5743]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=58.250.89.46 
Feb 20 17:37:22 MK-Soft-VM3 sshd[5743]: Failed password for invalid user HTTP from 58.250.89.46 port 32803 ssh2
...
2020-02-21 00:45:12
178.238.24.70 attackbots
Unauthorized connection attempt detected from IP address 178.238.24.70 to port 445
2020-02-21 00:46:32
222.186.175.220 attackbotsspam
Feb 20 17:46:55 ns381471 sshd[27461]: Failed password for root from 222.186.175.220 port 54770 ssh2
Feb 20 17:47:07 ns381471 sshd[27461]: error: maximum authentication attempts exceeded for root from 222.186.175.220 port 54770 ssh2 [preauth]
2020-02-21 00:49:57
35.220.245.231 attackspam
Feb 20 16:43:40 mout sshd[15304]: Invalid user cpaneleximfilter from 35.220.245.231 port 55292
2020-02-21 00:52:39
13.66.158.240 attackbotsspam
tcp 3389  rdp
2020-02-21 01:17:19
132.232.42.33 attack
Feb 20 17:43:46 mout sshd[20423]: Invalid user amandabackup from 132.232.42.33 port 54316
2020-02-21 01:10:54
183.159.112.171 attackbotsspam
TCP Port: 25      invalid blocked  dnsbl-sorbs also abuseat-org and barracuda           (229)
2020-02-21 01:09:30
112.117.158.209 attackspam
2020-02-20T14:26:38.324644 X postfix/smtpd[44822]: lost connection after AUTH from unknown[112.117.158.209]
2020-02-20T14:26:40.108212 X postfix/smtpd[44822]: lost connection after AUTH from unknown[112.117.158.209]
2020-02-20T14:26:41.885764 X postfix/smtpd[44822]: lost connection after AUTH from unknown[112.117.158.209]
2020-02-21 01:02:28
118.98.234.126 attackbotsspam
2020-02-19 14:03:17 server sshd[14487]: Failed password for invalid user nagios from 118.98.234.126 port 38584 ssh2
2020-02-21 01:09:55
41.236.201.68 attackspambots
Lines containing failures of 41.236.201.68
Feb 20 14:07:11 dns01 sshd[1028]: Invalid user admin from 41.236.201.68 port 54757
Feb 20 14:07:11 dns01 sshd[1028]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=41.236.201.68
Feb 20 14:07:14 dns01 sshd[1028]: Failed password for invalid user admin from 41.236.201.68 port 54757 ssh2
Feb 20 14:07:14 dns01 sshd[1028]: Connection closed by invalid user admin 41.236.201.68 port 54757 [preauth]


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=41.236.201.68
2020-02-21 01:28:52
172.104.52.110 attackbots
Lines containing failures of 172.104.52.110
Feb 20 14:07:04 dns01 sshd[973]: Invalid user admin from 172.104.52.110 port 58800
Feb 20 14:07:04 dns01 sshd[973]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=172.104.52.110
Feb 20 14:07:06 dns01 sshd[973]: Failed password for invalid user admin from 172.104.52.110 port 58800 ssh2
Feb 20 14:07:06 dns01 sshd[973]: Connection closed by invalid user admin 172.104.52.110 port 58800 [preauth]


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=172.104.52.110
2020-02-21 01:22:48
222.186.175.212 attackbotsspam
Feb 20 17:39:40 mail sshd\[16273\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.175.212  user=root
Feb 20 17:39:42 mail sshd\[16273\]: Failed password for root from 222.186.175.212 port 18146 ssh2
Feb 20 17:39:45 mail sshd\[16273\]: Failed password for root from 222.186.175.212 port 18146 ssh2
Feb 20 17:39:48 mail sshd\[16273\]: Failed password for root from 222.186.175.212 port 18146 ssh2
...
2020-02-21 00:48:08
69.90.184.206 attackspam
suspicious action Thu, 20 Feb 2020 10:26:14 -0300
2020-02-21 01:23:14

最近上报的IP列表

107.86.249.12 47.206.8.79 111.71.161.118 159.2.103.11
183.225.168.235 109.14.198.207 27.158.214.57 179.123.3.93
68.82.19.30 76.73.36.201 79.173.102.111 45.74.69.48
5.206.235.80 159.204.190.182 44.148.232.230 34.192.8.69
179.13.36.49 190.61.140.124 109.235.154.254 61.120.188.229