必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): United States

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 20.102.14.161
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 16054
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;20.102.14.161.			IN	A

;; AUTHORITY SECTION:
.			152	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022011101 1800 900 604800 86400

;; Query time: 19 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Jan 12 04:20:53 CST 2022
;; MSG SIZE  rcvd: 106
HOST信息:
Host 161.14.102.20.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 161.14.102.20.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
159.89.188.167 attackspam
Aug 28 17:25:26 jumpserver sshd[70227]: Invalid user brendan from 159.89.188.167 port 47144
Aug 28 17:25:28 jumpserver sshd[70227]: Failed password for invalid user brendan from 159.89.188.167 port 47144 ssh2
Aug 28 17:29:34 jumpserver sshd[70271]: Invalid user kernel from 159.89.188.167 port 53738
...
2020-08-29 02:29:51
14.1.125.140 attackspambots
Postfix attempt blocked due to public blacklist entry
2020-08-29 02:32:30
203.195.211.173 attackbotsspam
(sshd) Failed SSH login from 203.195.211.173 (CN/China/-): 5 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: Aug 28 18:33:48 amsweb01 sshd[22005]: Invalid user administracion from 203.195.211.173 port 36626
Aug 28 18:33:50 amsweb01 sshd[22005]: Failed password for invalid user administracion from 203.195.211.173 port 36626 ssh2
Aug 28 18:43:00 amsweb01 sshd[23547]: Invalid user gk from 203.195.211.173 port 58632
Aug 28 18:43:02 amsweb01 sshd[23547]: Failed password for invalid user gk from 203.195.211.173 port 58632 ssh2
Aug 28 18:46:48 amsweb01 sshd[24100]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=203.195.211.173  user=root
2020-08-29 02:44:34
222.92.139.158 attack
Aug 28 20:04:53 [host] sshd[5340]: Invalid user tz
Aug 28 20:04:53 [host] sshd[5340]: pam_unix(sshd:a
Aug 28 20:04:59 [host] sshd[5340]: Failed password
2020-08-29 02:37:05
209.97.134.82 attack
Aug 28 18:56:11 rocket sshd[25132]: Failed password for root from 209.97.134.82 port 44174 ssh2
Aug 28 18:59:59 rocket sshd[25550]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=209.97.134.82
...
2020-08-29 02:27:06
84.42.226.22 attack
2020-08-28 06:57:12.090030-0500  localhost smtpd[33939]: NOQUEUE: reject: RCPT from static-84-42-226-22.net.upcbroadband.cz[84.42.226.22]: 554 5.7.1 Service unavailable; Client host [84.42.226.22] blocked using zen.spamhaus.org; https://www.spamhaus.org/query/ip/84.42.226.22; from= to= proto=ESMTP helo=
2020-08-29 02:49:18
173.94.201.78 attack
ssh 22
2020-08-29 02:37:57
185.101.139.90 attackspam
G-Core Labs SCAM !  FRAUD FAKE mails ! 

Aug 28 13:32:49 server postfix/smtpd[22307]: warning: hostname contact1.example.com does not resolve to address 185.101.139.90: Name or service not known
Aug 28 13:32:49 server postfix/smtpd[22307]: connect from unknown[185.101.139.90]
Aug 28 13:32:49 server postfix/smtpd[22307]: warning: 90.139.101.185.zen.spamhaus.org: RBL lookup error: Host or domain name not found. Name service error for name=90.139.101.185.zen.spamhaus.org type=A: Host not found, try again
Aug 28 13:32:49 server postfix/smtpd[22307]: NOQUEUE: milter-reject: RCPT from unknown[185.101.139.90]: 550 5.7.0 You have been blacklisted.    from= to= proto=ESMTP helo=
Aug 28 13:32:49 server postfix/smtpd[22307]: disconnect from unknown[185.101.139.90] ehlo=1 mail=1 rcpt=0/1 quit=1 commands=3/4
2020-08-29 02:45:47
112.33.16.34 attackbots
Aug 28 15:22:23 h2779839 sshd[18245]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.33.16.34  user=root
Aug 28 15:22:25 h2779839 sshd[18245]: Failed password for root from 112.33.16.34 port 52406 ssh2
Aug 28 15:26:00 h2779839 sshd[18276]: Invalid user hue from 112.33.16.34 port 46506
Aug 28 15:26:00 h2779839 sshd[18276]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.33.16.34
Aug 28 15:26:00 h2779839 sshd[18276]: Invalid user hue from 112.33.16.34 port 46506
Aug 28 15:26:03 h2779839 sshd[18276]: Failed password for invalid user hue from 112.33.16.34 port 46506 ssh2
Aug 28 15:29:33 h2779839 sshd[18316]: Invalid user gjf from 112.33.16.34 port 40584
Aug 28 15:29:33 h2779839 sshd[18316]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.33.16.34
Aug 28 15:29:33 h2779839 sshd[18316]: Invalid user gjf from 112.33.16.34 port 40584
Aug 28 15:29:35 h2779839 sshd[
...
2020-08-29 03:02:35
133.242.52.96 attack
Aug 28 14:14:21 scw-6657dc sshd[10335]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=133.242.52.96
Aug 28 14:14:21 scw-6657dc sshd[10335]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=133.242.52.96
Aug 28 14:14:23 scw-6657dc sshd[10335]: Failed password for invalid user tester from 133.242.52.96 port 55237 ssh2
...
2020-08-29 02:56:39
154.117.186.237 attack
Unauthorized connection attempt from IP address 154.117.186.237 on port 3389
2020-08-29 02:43:27
140.143.200.251 attack
2020-08-28T15:58:33.840339paragon sshd[596784]: Failed password for root from 140.143.200.251 port 44012 ssh2
2020-08-28T16:02:20.903855paragon sshd[597147]: Invalid user abi from 140.143.200.251 port 57000
2020-08-28T16:02:20.906416paragon sshd[597147]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=140.143.200.251
2020-08-28T16:02:20.903855paragon sshd[597147]: Invalid user abi from 140.143.200.251 port 57000
2020-08-28T16:02:22.692063paragon sshd[597147]: Failed password for invalid user abi from 140.143.200.251 port 57000 ssh2
...
2020-08-29 03:01:15
220.130.10.13 attack
Aug 28 20:17:56 meumeu sshd[527652]: Invalid user nominatim from 220.130.10.13 port 33172
Aug 28 20:17:56 meumeu sshd[527652]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=220.130.10.13 
Aug 28 20:17:56 meumeu sshd[527652]: Invalid user nominatim from 220.130.10.13 port 33172
Aug 28 20:17:58 meumeu sshd[527652]: Failed password for invalid user nominatim from 220.130.10.13 port 33172 ssh2
Aug 28 20:21:26 meumeu sshd[527845]: Invalid user daf from 220.130.10.13 port 34912
Aug 28 20:21:26 meumeu sshd[527845]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=220.130.10.13 
Aug 28 20:21:26 meumeu sshd[527845]: Invalid user daf from 220.130.10.13 port 34912
Aug 28 20:21:27 meumeu sshd[527845]: Failed password for invalid user daf from 220.130.10.13 port 34912 ssh2
Aug 28 20:24:48 meumeu sshd[528014]: Invalid user aneta from 220.130.10.13 port 36652
...
2020-08-29 02:39:08
45.254.33.234 attackbots
2020-08-28 06:56:12.324054-0500  localhost smtpd[33967]: NOQUEUE: reject: RCPT from unknown[45.254.33.234]: 450 4.7.25 Client host rejected: cannot find your hostname, [45.254.33.234]; from= to= proto=ESMTP helo=<012b202e.womenback.buzz>
2020-08-29 02:49:53
112.133.251.203 attack
2020-08-28 06:59:53.744136-0500  localhost smtpd[33939]: NOQUEUE: reject: RCPT from unknown[112.133.251.203]: 554 5.7.1 Service unavailable; Client host [112.133.251.203] blocked using zen.spamhaus.org; https://www.spamhaus.org/sbl/query/SBLCSS / https://www.spamhaus.org/query/ip/112.133.251.203; from= to= proto=ESMTP helo=<[112.133.251.203]>
2020-08-29 02:48:44

最近上报的IP列表

66.20.150.62 223.164.98.237 117.32.155.156 16.49.233.11
15.69.233.13 51.25.4.26 229.93.83.169 90.204.208.104
216.19.100.58 147.251.112.199 39.179.10.87 92.79.51.226
135.147.23.185 3ffe:8370:0:0:0:0:0:0 18.89.87.219 231.158.137.238
9.117.154.95 19.121.147.33 27.241.114.111 83.213.152.195