必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): United States

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 214.117.186.20
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 19300
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;214.117.186.20.			IN	A

;; AUTHORITY SECTION:
.			362	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019103001 1800 900 604800 86400

;; Query time: 95 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Oct 31 11:04:59 CST 2019
;; MSG SIZE  rcvd: 118
HOST信息:
Host 20.186.117.214.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 20.186.117.214.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
170.84.103.7 attack
Automatic report - Port Scan Attack
2019-07-23 22:58:15
125.63.116.106 attack
Jul 23 10:48:12 vps200512 sshd\[1818\]: Invalid user fe from 125.63.116.106
Jul 23 10:48:12 vps200512 sshd\[1818\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=125.63.116.106
Jul 23 10:48:14 vps200512 sshd\[1818\]: Failed password for invalid user fe from 125.63.116.106 port 50990 ssh2
Jul 23 10:53:46 vps200512 sshd\[1880\]: Invalid user paul from 125.63.116.106
Jul 23 10:53:46 vps200512 sshd\[1880\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=125.63.116.106
2019-07-23 23:01:57
125.64.94.212 attackbots
23.07.2019 14:50:59 Connection to port 8899 blocked by firewall
2019-07-23 23:15:48
177.21.15.122 attackbotsspam
php WP PHPmyadamin ABUSE blocked for 12h
2019-07-23 22:45:39
187.11.17.143 attackbots
Automatic report - Port Scan Attack
2019-07-23 23:22:44
185.255.46.38 attack
Brute force attempt
2019-07-23 23:23:17
37.139.21.75 attack
Jul 23 17:26:56 nextcloud sshd\[28981\]: Invalid user castis from 37.139.21.75
Jul 23 17:26:56 nextcloud sshd\[28981\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=37.139.21.75
Jul 23 17:26:57 nextcloud sshd\[28981\]: Failed password for invalid user castis from 37.139.21.75 port 55554 ssh2
...
2019-07-23 23:46:25
88.214.26.171 attackspam
Jul 23 20:55:44 lcl-usvr-02 sshd[3921]: Invalid user admin from 88.214.26.171 port 55299
...
2019-07-23 22:49:37
185.254.122.32 attack
firewall-block, port(s): 3389/tcp
2019-07-23 23:18:05
158.69.197.113 attackspambots
Jul 23 17:18:37 ArkNodeAT sshd\[28961\]: Invalid user teng from 158.69.197.113
Jul 23 17:18:37 ArkNodeAT sshd\[28961\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=158.69.197.113
Jul 23 17:18:38 ArkNodeAT sshd\[28961\]: Failed password for invalid user teng from 158.69.197.113 port 40498 ssh2
2019-07-23 23:43:17
200.80.43.52 attackspambots
www.handydirektreparatur.de 200.80.43.52 \[23/Jul/2019:11:14:20 +0200\] "POST /wp-login.php HTTP/1.1" 200 5668 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0"
www.handydirektreparatur.de 200.80.43.52 \[23/Jul/2019:11:14:22 +0200\] "POST /xmlrpc.php HTTP/1.1" 200 4117 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0"
2019-07-23 23:15:11
213.32.92.57 attackbots
Jul 23 16:33:30 SilenceServices sshd[15930]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=213.32.92.57
Jul 23 16:33:32 SilenceServices sshd[15930]: Failed password for invalid user lzhang from 213.32.92.57 port 60054 ssh2
Jul 23 16:37:54 SilenceServices sshd[19100]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=213.32.92.57
2019-07-23 22:40:39
103.78.17.11 attack
WordPress XMLRPC scan :: 103.78.17.11 0.112 BYPASS [23/Jul/2019:19:13:56  1000] [censored_1] "GET /xmlrpc.php HTTP/1.1" 405 53 "-" "Mozilla/5.0 (X11; Linux i686; rv:2.0.1) Gecko/20100101 Firefox/4.0.1"
2019-07-23 23:39:21
200.116.129.73 attackspam
Jul 23 10:30:07 debian sshd\[21641\]: Invalid user admin from 200.116.129.73 port 54948
Jul 23 10:30:07 debian sshd\[21641\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=200.116.129.73
Jul 23 10:30:08 debian sshd\[21641\]: Failed password for invalid user admin from 200.116.129.73 port 54948 ssh2
...
2019-07-23 22:42:38
45.55.167.217 attack
Jul 23 11:09:34 vps200512 sshd\[2200\]: Invalid user valda from 45.55.167.217
Jul 23 11:09:34 vps200512 sshd\[2200\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.55.167.217
Jul 23 11:09:37 vps200512 sshd\[2200\]: Failed password for invalid user valda from 45.55.167.217 port 33147 ssh2
Jul 23 11:14:10 vps200512 sshd\[2259\]: Invalid user homekit from 45.55.167.217
Jul 23 11:14:10 vps200512 sshd\[2259\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.55.167.217
2019-07-23 23:24:37

最近上报的IP列表

158.64.113.15 103.197.200.189 174.138.237.196 84.204.216.22
205.67.234.62 170.27.145.225 168.12.12.247 101.158.144.193
216.205.3.191 164.34.12.25 214.154.177.117 26.51.201.16
219.243.69.26 78.252.169.251 95.25.166.236 250.251.68.98
72.86.18.38 134.85.180.201 78.233.45.212 104.117.6.30