必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): United States of America (the)

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 20.114.207.146
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 35626
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;20.114.207.146.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025021500 1800 900 604800 86400

;; Query time: 34 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Feb 15 14:25:18 CST 2025
;; MSG SIZE  rcvd: 107
HOST信息:
Host 146.207.114.20.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 146.207.114.20.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
212.112.108.100 attackspam
Jul 29 06:11:06 srv-4 sshd\[17695\]: Invalid user jitendra from 212.112.108.100
Jul 29 06:11:06 srv-4 sshd\[17695\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=212.112.108.100
Jul 29 06:11:08 srv-4 sshd\[17695\]: Failed password for invalid user jitendra from 212.112.108.100 port 50544 ssh2
...
2019-07-29 12:45:04
189.208.166.25 attack
firewall-block, port(s): 23/tcp
2019-07-29 12:43:51
223.81.68.46 attackbotsspam
Unauthorised access (Jul 29) SRC=223.81.68.46 LEN=40 TTL=50 ID=51237 TCP DPT=23 WINDOW=16950 SYN
2019-07-29 13:48:56
124.205.9.241 attack
SSH authentication failure x 6 reported by Fail2Ban
...
2019-07-29 13:50:02
206.189.134.83 attackbots
Triggered by Fail2Ban
2019-07-29 13:05:39
103.221.222.72 attackspam
2019/07/28 23:18:40 [error] 1240#1240: *826 FastCGI sent in stderr: "PHP message: [103.221.222.72] user 9had: authentication failure for "https://nihad.dk/wp-admin/": Password Mismatch" while reading response header from upstream, client: 103.221.222.72, server: nihad.dk, request: "POST /wp-login.php HTTP/1.1", upstream: "fastcgi://unix:/var/run/php-fpm-nihad.dk.sock:", host: "nihad.dk"
2019/07/28 23:18:41 [error] 1240#1240: *828 FastCGI sent in stderr: "PHP message: [103.221.222.72] user [login]: authentication failure for "https://nihad.dk/wp-admin/": Password Mismatch" while reading response header from upstream, client: 103.221.222.72, server: nihad.dk, request: "POST /xmlrpc.php HTTP/1.1", upstream: "fastcgi://unix:/var/run/php-fpm-nihad.dk.sock:", host: "nihad.dk"
...
2019-07-29 13:20:56
128.199.221.18 attackspambots
Invalid user usuario from 128.199.221.18 port 50413
2019-07-29 13:45:51
174.138.40.132 attackspam
Jul 28 23:31:50 v22019058497090703 sshd[7982]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=174.138.40.132
Jul 28 23:31:52 v22019058497090703 sshd[7982]: Failed password for invalid user zj!@ from 174.138.40.132 port 57732 ssh2
Jul 28 23:35:57 v22019058497090703 sshd[8218]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=174.138.40.132
...
2019-07-29 13:03:20
200.37.95.43 attackspam
Jul 26 15:05:48 penfold sshd[32361]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=200.37.95.43  user=r.r
Jul 26 15:05:51 penfold sshd[32361]: Failed password for r.r from 200.37.95.43 port 38109 ssh2
Jul 26 15:05:51 penfold sshd[32361]: Received disconnect from 200.37.95.43 port 38109:11: Bye Bye [preauth]
Jul 26 15:05:51 penfold sshd[32361]: Disconnected from 200.37.95.43 port 38109 [preauth]
Jul 26 15:19:58 penfold sshd[762]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=200.37.95.43  user=r.r
Jul 26 15:20:00 penfold sshd[762]: Failed password for r.r from 200.37.95.43 port 46145 ssh2
Jul 26 15:20:00 penfold sshd[762]: Received disconnect from 200.37.95.43 port 46145:11: Bye Bye [preauth]
Jul 26 15:20:00 penfold sshd[762]: Disconnected from 200.37.95.43 port 46145 [preauth]
Jul 26 15:25:02 penfold sshd[1004]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh r........
-------------------------------
2019-07-29 13:17:43
194.61.24.253 attackspambots
Jul 29 06:50:51 rpi sshd[10706]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=194.61.24.253 
Jul 29 06:50:53 rpi sshd[10706]: Failed password for invalid user qwerty from 194.61.24.253 port 51090 ssh2
2019-07-29 13:13:58
45.160.149.47 attack
Jul 29 02:28:48 server sshd\[28498\]: User root from 45.160.149.47 not allowed because listed in DenyUsers
Jul 29 02:28:48 server sshd\[28498\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.160.149.47  user=root
Jul 29 02:28:50 server sshd\[28498\]: Failed password for invalid user root from 45.160.149.47 port 49650 ssh2
Jul 29 02:34:26 server sshd\[5864\]: Invalid user com from 45.160.149.47 port 44972
Jul 29 02:34:26 server sshd\[5864\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.160.149.47
2019-07-29 13:18:42
108.36.94.38 attack
Jul 29 04:37:45 srv-4 sshd\[13262\]: Invalid user server\^2012 from 108.36.94.38
Jul 29 04:37:45 srv-4 sshd\[13262\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=108.36.94.38
Jul 29 04:37:46 srv-4 sshd\[13262\]: Failed password for invalid user server\^2012 from 108.36.94.38 port 50311 ssh2
...
2019-07-29 13:44:57
141.105.88.219 attackspambots
Automatic report - Port Scan Attack
2019-07-29 13:09:59
222.189.228.155 attackspam
10 attempts against mh-pma-try-ban on oak.magehost.pro
2019-07-29 13:29:55
223.99.192.25 attackbotsspam
Jul 29 03:42:52 localhost sshd\[1969\]: Invalid user honda from 223.99.192.25 port 16026
Jul 29 03:42:52 localhost sshd\[1969\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=223.99.192.25
Jul 29 03:42:54 localhost sshd\[1969\]: Failed password for invalid user honda from 223.99.192.25 port 16026 ssh2
2019-07-29 13:22:10

最近上报的IP列表

96.127.97.189 190.227.237.22 251.178.222.157 176.29.121.63
222.59.199.4 34.193.74.29 202.243.3.192 239.147.8.172
226.175.35.155 57.58.83.224 207.213.16.74 54.151.37.10
185.20.171.172 108.48.73.45 176.173.230.51 194.106.176.109
159.98.40.236 58.81.224.132 89.42.43.177 22.39.125.161