必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): Johannesburg

省份(region): Gauteng

国家(country): South Africa

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 196.14.129.248
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 40
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;196.14.129.248.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025030702 1800 900 604800 86400

;; Query time: 9 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Mar 08 10:09:25 CST 2025
;; MSG SIZE  rcvd: 107
HOST信息:
Host 248.129.14.196.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 248.129.14.196.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
119.28.70.244 attackspam
Unauthorized connection attempt from IP address 119.28.70.244 on Port 445(SMB)
2020-02-15 03:43:43
179.24.17.54 attackbots
MultiHost/MultiPort Probe, Scan, Hack -
2020-02-15 03:15:09
210.245.29.226 attack
Unauthorized connection attempt from IP address 210.245.29.226 on Port 445(SMB)
2020-02-15 03:40:02
8.2.141.100 attackbots
Autoban   8.2.141.100 VIRUS
2020-02-15 03:11:28
77.40.119.92 attackspam
2020-02-14T14:56:35.126027 X postfix/smtpd[47548]: warning: unknown[77.40.119.92]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
2020-02-14T14:59:36.213483 X postfix/smtpd[1933]: warning: unknown[77.40.119.92]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
2020-02-14T14:59:56.414043 X postfix/smtpd[1933]: warning: unknown[77.40.119.92]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
2020-02-15 03:08:09
219.141.152.242 attack
Port probing on unauthorized port 445
2020-02-15 03:16:36
179.235.107.67 attack
MultiHost/MultiPort Probe, Scan, Hack -
2020-02-15 03:40:32
8.40.153.162 attackspambots
Unauthorized connection attempt from IP address 8.40.153.162 on Port 445(SMB)
2020-02-15 03:36:22
148.70.159.5 attack
Feb 14 16:09:23 lnxded64 sshd[24290]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=148.70.159.5
2020-02-15 03:29:38
83.20.160.225 attack
Invalid user sshuser from 83.20.160.225 port 55296
2020-02-15 03:28:36
200.109.237.11 attackspam
Honeypot attack, port: 445, PTR: PTR record not found
2020-02-15 03:44:49
49.88.112.112 attackspam
February 14 2020, 19:37:14 [sshd] - Banned from the Cipher Host hosting platform by Fail2ban.
2020-02-15 03:41:55
97.78.172.98 attackbots
Unauthorized connection attempt from IP address 97.78.172.98 on Port 445(SMB)
2020-02-15 03:39:21
197.159.2.94 attack
IP Ban Report :  
 https://help-dysk.pl/wordpress-firewall-plugins/ip/197.159.2.94/ 
 
 CM - 1H : (1)  
 Protection Against DDoS WordPress plugin :  
 "odzyskiwanie danych help-dysk" 
 IP Address Ranges by Country : CM 
 NAME ASN : ASN15964 
 
 IP : 197.159.2.94 
 
 CIDR : 197.159.2.0/24 
 
 PREFIX COUNT : 123 
 
 UNIQUE IP COUNT : 198912 
 
 
 ATTACKS DETECTED ASN15964 :  
  1H - 1 
  3H - 1 
  6H - 1 
 12H - 1 
 24H - 1 
 
 DateTime : 2020-02-14 14:47:00 
 
 INFO :  HACK ! - Looking for resource vulnerabilities Scan Detected and Blocked by ADMIN  - data recovery
2020-02-15 03:14:35
124.239.216.233 attackbotsspam
$f2bV_matches
2020-02-15 03:07:42

最近上报的IP列表

47.90.103.8 242.64.190.62 173.39.126.127 156.24.177.8
118.220.12.168 244.23.149.94 222.249.89.21 107.121.133.54
51.49.129.34 247.232.46.209 114.133.133.213 165.100.156.127
141.240.216.193 56.2.17.250 169.195.127.117 62.111.221.15
76.184.83.167 196.215.54.250 12.174.94.106 44.119.142.239