必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): Washington

省份(region): District of Columbia

国家(country): United States

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 208.34.50.114
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 51252
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;208.34.50.114.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2024120100 1800 900 604800 86400

;; Query time: 15 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Dec 01 21:36:35 CST 2024
;; MSG SIZE  rcvd: 106
HOST信息:
Host 114.50.34.208.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 114.50.34.208.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
181.115.156.59 attackspambots
2020-05-31T23:12:32.853298homeassistant sshd[12723]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=181.115.156.59  user=root
2020-05-31T23:12:34.558677homeassistant sshd[12723]: Failed password for root from 181.115.156.59 port 41050 ssh2
...
2020-06-01 08:18:25
222.186.42.136 attackspam
Jun  1 06:27:05 v22018053744266470 sshd[5530]: Failed password for root from 222.186.42.136 port 47093 ssh2
Jun  1 06:27:21 v22018053744266470 sshd[5548]: Failed password for root from 222.186.42.136 port 28344 ssh2
...
2020-06-01 12:28:25
222.186.175.216 attackbotsspam
Jun  1 05:58:51 legacy sshd[24840]: Failed password for root from 222.186.175.216 port 56528 ssh2
Jun  1 05:59:05 legacy sshd[24840]: Failed password for root from 222.186.175.216 port 56528 ssh2
Jun  1 05:59:05 legacy sshd[24840]: error: maximum authentication attempts exceeded for root from 222.186.175.216 port 56528 ssh2 [preauth]
...
2020-06-01 12:09:55
118.174.201.73 attackbots
Lines containing failures of 118.174.201.73
May 31 20:43:45 shared01 sshd[26857]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.174.201.73  user=r.r
May 31 20:43:47 shared01 sshd[26857]: Failed password for r.r from 118.174.201.73 port 47304 ssh2
May 31 20:43:47 shared01 sshd[26857]: Received disconnect from 118.174.201.73 port 47304:11: Bye Bye [preauth]
May 31 20:43:47 shared01 sshd[26857]: Disconnected from authenticating user r.r 118.174.201.73 port 47304 [preauth]
May 31 21:01:59 shared01 sshd[32707]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.174.201.73  user=r.r
May 31 21:02:00 shared01 sshd[32707]: Failed password for r.r from 118.174.201.73 port 50702 ssh2
May 31 21:02:01 shared01 sshd[32707]: Received disconnect from 118.174.201.73 port 50702:11: Bye Bye [preauth]
May 31 21:02:01 shared01 sshd[32707]: Disconnected from authenticating user r.r 118.174.201.73 port 50702........
------------------------------
2020-06-01 08:24:51
116.236.168.141 attack
Jun  1 05:55:55 amit sshd\[2222\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=116.236.168.141  user=root
Jun  1 05:55:57 amit sshd\[2222\]: Failed password for root from 116.236.168.141 port 60929 ssh2
Jun  1 05:59:20 amit sshd\[2256\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=116.236.168.141  user=root
...
2020-06-01 12:20:48
185.143.74.231 attackspambots
Jun  1 06:14:46 relay postfix/smtpd\[23756\]: warning: unknown\[185.143.74.231\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Jun  1 06:15:55 relay postfix/smtpd\[8418\]: warning: unknown\[185.143.74.231\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Jun  1 06:16:18 relay postfix/smtpd\[11692\]: warning: unknown\[185.143.74.231\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Jun  1 06:17:24 relay postfix/smtpd\[18454\]: warning: unknown\[185.143.74.231\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Jun  1 06:17:51 relay postfix/smtpd\[11013\]: warning: unknown\[185.143.74.231\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
...
2020-06-01 12:18:14
138.68.253.149 attackbots
SASL PLAIN auth failed: ruser=...
2020-06-01 08:19:54
201.219.242.22 attackbots
Jun  1 05:55:12  sshd\[26515\]: User root from 201.219.242.22 not allowed because not listed in AllowUsersJun  1 05:55:14  sshd\[26515\]: Failed password for invalid user root from 201.219.242.22 port 40912 ssh2
...
2020-06-01 12:11:12
34.107.29.42 attack
37 attempts against mh-misbehave-ban on snow
2020-06-01 12:33:21
1.9.46.177 attackbots
Jun  1 05:55:08 vpn01 sshd[774]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=1.9.46.177
Jun  1 05:55:10 vpn01 sshd[774]: Failed password for invalid user wsxedc\r from 1.9.46.177 port 59401 ssh2
...
2020-06-01 12:13:20
37.49.226.181 attack
Jun  1 05:54:43 server sshd[26253]: Failed password for root from 37.49.226.181 port 46334 ssh2
Jun  1 05:55:02 server sshd[26569]: Failed password for root from 37.49.226.181 port 50340 ssh2
Jun  1 05:55:21 server sshd[26879]: Failed password for root from 37.49.226.181 port 54558 ssh2
2020-06-01 12:01:30
14.143.107.226 attackbots
May 31 18:01:21 web9 sshd\[17141\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=14.143.107.226  user=root
May 31 18:01:23 web9 sshd\[17141\]: Failed password for root from 14.143.107.226 port 2565 ssh2
May 31 18:05:22 web9 sshd\[17619\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=14.143.107.226  user=root
May 31 18:05:24 web9 sshd\[17619\]: Failed password for root from 14.143.107.226 port 19097 ssh2
May 31 18:09:14 web9 sshd\[18106\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=14.143.107.226  user=root
2020-06-01 12:26:01
106.247.255.163 attackspambots
$f2bV_matches
2020-06-01 12:14:15
118.27.21.194 attack
Jun  1 03:49:54 game-panel sshd[6551]: Failed password for root from 118.27.21.194 port 36534 ssh2
Jun  1 03:52:36 game-panel sshd[6713]: Failed password for root from 118.27.21.194 port 52700 ssh2
2020-06-01 12:08:00
49.88.112.55 attack
Jun  1 05:25:47 combo sshd[3743]: Failed password for root from 49.88.112.55 port 38850 ssh2
Jun  1 05:25:52 combo sshd[3743]: Failed password for root from 49.88.112.55 port 38850 ssh2
Jun  1 05:25:55 combo sshd[3743]: Failed password for root from 49.88.112.55 port 38850 ssh2
...
2020-06-01 12:27:59

最近上报的IP列表

73.55.252.116 38.98.216.251 203.164.38.132 174.146.164.226
237.166.242.197 43.236.247.139 139.157.246.126 136.104.35.69
172.217.18.109 205.233.131.0 232.225.154.93 180.173.153.214
236.95.162.99 125.185.77.3 170.145.226.103 252.10.100.234
38.199.224.215 104.29.59.239 160.39.42.14 43.183.39.0