必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): Egypt

运营商(isp): Vodafone

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 196.138.114.11
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 28994
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;196.138.114.11.			IN	A

;; AUTHORITY SECTION:
.			574	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2020030801 1800 900 604800 86400

;; Query time: 76 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Mar 09 04:36:02 CST 2020
;; MSG SIZE  rcvd: 118
HOST信息:
Host 11.114.138.196.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 11.114.138.196.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
45.14.148.95 attackbotsspam
Unauthorised connection attempt detected at AUO MAIN. System is sshd. Protected by AUO Stack Web Application Firewall (WAF)
2020-06-15 21:28:25
117.58.241.69 attackbots
$f2bV_matches
2020-06-15 22:02:00
96.125.164.246 attack
Jun 15 15:19:30 server2 sshd\[10386\]: Invalid user 95.211.131.41 from 96.125.164.246
Jun 15 15:19:50 server2 sshd\[10390\]: Invalid user 95.211.131.41 from 96.125.164.246
Jun 15 15:23:49 server2 sshd\[10717\]: Invalid user 95.211.131.41 from 96.125.164.246
Jun 15 15:24:47 server2 sshd\[10749\]: Invalid user 95.211.131.41 from 96.125.164.246
Jun 15 15:26:05 server2 sshd\[10961\]: Invalid user 95.111.252.248 from 96.125.164.246
Jun 15 15:27:56 server2 sshd\[11060\]: Invalid user 95.111.252.248 from 96.125.164.246
2020-06-15 21:59:24
188.128.39.113 attackspambots
Jun 15 17:58:37 gw1 sshd[8348]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.128.39.113
Jun 15 17:58:39 gw1 sshd[8348]: Failed password for invalid user admin from 188.128.39.113 port 35746 ssh2
...
2020-06-15 21:26:51
222.76.227.78 attackbots
Jun 15 15:12:25 vps639187 sshd\[22034\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.76.227.78  user=root
Jun 15 15:12:26 vps639187 sshd\[22034\]: Failed password for root from 222.76.227.78 port 9112 ssh2
Jun 15 15:16:30 vps639187 sshd\[22139\]: Invalid user ron from 222.76.227.78 port 32320
Jun 15 15:16:30 vps639187 sshd\[22139\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.76.227.78
...
2020-06-15 21:46:29
45.143.223.157 attackspambots
Unauthorized connection attempt from IP address 45.143.223.157
2020-06-15 22:09:14
148.70.68.36 attackbotsspam
Jun 15 09:49:26 ny01 sshd[4226]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=148.70.68.36
Jun 15 09:49:28 ny01 sshd[4226]: Failed password for invalid user uftp from 148.70.68.36 port 48202 ssh2
Jun 15 09:54:15 ny01 sshd[4815]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=148.70.68.36
2020-06-15 21:58:16
169.50.136.155 attack
Jun 15 22:41:01 localhost sshd[3270445]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=169.50.136.155  user=root
Jun 15 22:41:03 localhost sshd[3270445]: Failed password for root from 169.50.136.155 port 26597 ssh2
...
2020-06-15 21:48:29
162.14.22.99 attack
21 attempts against mh-ssh on cloud
2020-06-15 21:54:22
220.171.43.15 attackbots
Jun 15 14:12:21 vps sshd[30879]: Failed password for root from 220.171.43.15 port 21347 ssh2
Jun 15 14:21:04 vps sshd[31335]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=220.171.43.15 
Jun 15 14:21:06 vps sshd[31335]: Failed password for invalid user ircd from 220.171.43.15 port 12134 ssh2
...
2020-06-15 21:30:31
152.136.213.72 attackbotsspam
Jun 15 15:39:30 ns37 sshd[24258]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=152.136.213.72
2020-06-15 21:39:46
2.201.149.5 attackspambots
Jun 15 15:40:29 sticky sshd\[18590\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=2.201.149.5  user=root
Jun 15 15:40:31 sticky sshd\[18590\]: Failed password for root from 2.201.149.5 port 59148 ssh2
Jun 15 15:46:34 sticky sshd\[18694\]: Invalid user dita from 2.201.149.5 port 34532
Jun 15 15:46:34 sticky sshd\[18694\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=2.201.149.5
Jun 15 15:46:36 sticky sshd\[18694\]: Failed password for invalid user dita from 2.201.149.5 port 34532 ssh2
2020-06-15 21:57:40
222.186.30.76 attackspam
Jun 15 14:01:45 marvibiene sshd[10947]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.30.76  user=root
Jun 15 14:01:47 marvibiene sshd[10947]: Failed password for root from 222.186.30.76 port 28104 ssh2
Jun 15 14:01:49 marvibiene sshd[10947]: Failed password for root from 222.186.30.76 port 28104 ssh2
Jun 15 14:01:45 marvibiene sshd[10947]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.30.76  user=root
Jun 15 14:01:47 marvibiene sshd[10947]: Failed password for root from 222.186.30.76 port 28104 ssh2
Jun 15 14:01:49 marvibiene sshd[10947]: Failed password for root from 222.186.30.76 port 28104 ssh2
...
2020-06-15 22:04:59
179.53.207.222 attack
Jun 15 13:46:28 m1 sshd[14262]: Failed password for r.r from 179.53.207.222 port 45482 ssh2
Jun 15 14:15:35 m1 sshd[26723]: Invalid user admin from 179.53.207.222
Jun 15 14:15:37 m1 sshd[26723]: Failed password for invalid user admin from 179.53.207.222 port 57850 ssh2


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=179.53.207.222
2020-06-15 21:39:07
183.136.132.14 attackbots
Unauthorized connection attempt detected from IP address 183.136.132.14 to port 1433
2020-06-15 21:47:30

最近上报的IP列表

202.185.19.116 161.132.105.102 121.33.114.199 222.246.125.111
60.179.48.169 181.101.64.43 36.230.165.163 97.96.111.63
166.185.33.234 222.64.108.146 75.32.239.163 221.204.81.197
186.123.51.83 39.78.99.12 203.43.52.0 192.241.219.128
180.113.56.26 31.160.41.189 190.198.81.133 165.21.56.98