必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): Brazil

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 200.154.241.14
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 46176
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;200.154.241.14.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025030800 1800 900 604800 86400

;; Query time: 13 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Mar 08 22:08:58 CST 2025
;; MSG SIZE  rcvd: 107
HOST信息:
Host 14.241.154.200.in-addr.arpa not found: 2(SERVFAIL)
NSLOOKUP信息:
;; Got SERVFAIL reply from 183.60.83.19, trying next server
Server:		183.60.82.98
Address:	183.60.82.98#53

** server can't find 14.241.154.200.in-addr.arpa: SERVFAIL

相关IP信息:
最新评论:
IP 类型 评论内容 时间
94.182.222.66 attackspam
1433/tcp
[2020-10-04]1pkt
2020-10-05 21:49:28
223.31.191.50 attack
Banned for a week because repeated abuses, for example SSH, but not only
2020-10-05 21:39:05
107.204.217.126 attackbots
Lines containing failures of 107.204.217.126 (max 1000)
Oct  4 22:38:48 server sshd[24860]: Connection from 107.204.217.126 port 57354 on 62.116.165.82 port 22
Oct  4 22:38:48 server sshd[24860]: Did not receive identification string from 107.204.217.126 port 57354
Oct  4 22:38:51 server sshd[24863]: Connection from 107.204.217.126 port 57811 on 62.116.165.82 port 22
Oct  4 22:38:54 server sshd[24863]: Invalid user service from 107.204.217.126 port 57811
Oct  4 22:38:54 server sshd[24863]: Connection closed by 107.204.217.126 port 57811 [preauth]


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=107.204.217.126
2020-10-05 21:26:11
218.92.0.138 attack
Banned for a week because repeated abuses, for example SSH, but not only
2020-10-05 21:47:15
41.106.3.45 attackbotsspam
port
2020-10-05 21:23:15
116.59.25.201 attackbotsspam
repeated SSH login attempts
2020-10-05 21:25:12
192.241.214.172 attack
TCP port : 5984
2020-10-05 21:39:21
218.92.0.212 attackbotsspam
2020-10-05T15:42:10.740787vps773228.ovh.net sshd[2645]: Failed password for root from 218.92.0.212 port 53264 ssh2
2020-10-05T15:42:14.071036vps773228.ovh.net sshd[2645]: Failed password for root from 218.92.0.212 port 53264 ssh2
2020-10-05T15:42:17.616394vps773228.ovh.net sshd[2645]: Failed password for root from 218.92.0.212 port 53264 ssh2
2020-10-05T15:42:20.907011vps773228.ovh.net sshd[2645]: Failed password for root from 218.92.0.212 port 53264 ssh2
2020-10-05T15:42:23.745597vps773228.ovh.net sshd[2645]: Failed password for root from 218.92.0.212 port 53264 ssh2
...
2020-10-05 21:46:44
139.155.225.13 attack
SSH auth scanning - multiple failed logins
2020-10-05 21:48:50
128.199.226.179 attack
sshd: Failed password for .... from 128.199.226.179 port 35912 ssh2 (11 attempts)
2020-10-05 21:21:02
103.133.104.215 attackspam
Automatic report - Banned IP Access
2020-10-05 21:22:55
151.236.59.142 attackspam
" "
2020-10-05 21:31:32
100.12.77.82 attackspambots
Listed on    zen-spamhaus also dnsbl-sorbs   / proto=17  .  srcport=24683  .  dstport=34806  .     (3555)
2020-10-05 21:24:18
167.114.98.229 attackbotsspam
Brute%20Force%20SSH
2020-10-05 21:27:00
213.6.8.38 attackspambots
Brute-force attempt banned
2020-10-05 21:41:11

最近上报的IP列表

45.153.158.207 114.99.230.32 99.153.131.10 46.136.187.224
28.74.177.77 46.87.115.65 57.68.57.73 31.58.166.97
50.65.48.70 229.224.184.222 155.208.134.114 253.71.17.77
89.199.201.132 47.85.219.207 114.31.253.95 22.3.226.62
163.9.197.217 40.110.237.89 201.170.173.23 141.101.68.11