必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): Hong Kong

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 217.119.104.144
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 20623
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;217.119.104.144.		IN	A

;; AUTHORITY SECTION:
.			29	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025022201 1800 900 604800 86400

;; Query time: 62 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Feb 23 01:51:45 CST 2025
;; MSG SIZE  rcvd: 108
HOST信息:
Host 144.104.119.217.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 144.104.119.217.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
45.125.66.194 attackbotsspam
Dec 24 09:07:25 web1 postfix/smtpd[22425]: warning: unknown[45.125.66.194]: SASL LOGIN authentication failed: authentication failure
...
2019-12-24 22:18:34
121.164.224.52 attackspam
$f2bV_matches
2019-12-24 22:37:26
103.81.156.10 attack
SSH/22 MH Probe, BF, Hack -
2019-12-24 22:32:59
64.50.186.5 attackbots
64.50.186.5 - - [24/Dec/2019:07:41:43 +0000] "POST /wp-login.php HTTP/1.1" 200 6393 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
64.50.186.5 - - [24/Dec/2019:07:41:45 +0000] "POST /xmlrpc.php HTTP/1.1" 200 403 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
...
2019-12-24 22:24:02
46.105.29.160 attackspam
Dec 24 12:31:13 s1 sshd\[23441\]: Invalid user hershey from 46.105.29.160 port 35894
Dec 24 12:31:13 s1 sshd\[23441\]: Failed password for invalid user hershey from 46.105.29.160 port 35894 ssh2
Dec 24 12:33:06 s1 sshd\[23522\]: User sshd from 46.105.29.160 not allowed because not listed in AllowUsers
Dec 24 12:33:06 s1 sshd\[23522\]: Failed password for invalid user sshd from 46.105.29.160 port 54684 ssh2
Dec 24 12:35:01 s1 sshd\[23586\]: Invalid user operator from 46.105.29.160 port 45122
Dec 24 12:35:01 s1 sshd\[23586\]: Failed password for invalid user operator from 46.105.29.160 port 45122 ssh2
...
2019-12-24 22:31:21
45.63.11.126 attackbotsspam
Portscan or hack attempt detected by psad/fwsnort
2019-12-24 22:47:58
94.142.140.219 attack
SSH/22 MH Probe, BF, Hack -
2019-12-24 22:45:15
152.32.170.248 attackbotsspam
Invalid user troncone from 152.32.170.248 port 45618
2019-12-24 22:29:40
45.82.32.108 attack
Postfix DNSBL listed. Trying to send SPAM.
2019-12-24 22:36:06
106.12.102.160 attackspam
Invalid user danol from 106.12.102.160 port 55022
2019-12-24 23:00:48
185.253.250.173 attack
CloudCIX Reconnaissance Scan Detected, PTR: host-good.com.
2019-12-24 22:19:15
152.136.37.135 attackbots
Automatic report - SSH Brute-Force Attack
2019-12-24 22:39:31
156.220.87.175 attackspambots
DLink DSL Remote OS Command Injection Vulnerability, PTR: host-156.220.175.87-static.tedata.net.
2019-12-24 22:42:38
149.202.56.194 attackbotsspam
Dec 24 14:29:43 v22018086721571380 sshd[27614]: Failed password for invalid user severin from 149.202.56.194 port 47354 ssh2
2019-12-24 22:53:53
196.43.199.6 attack
Unauthorized connection attempt detected from IP address 196.43.199.6 to port 445
2019-12-24 22:36:44

最近上报的IP列表

154.64.236.113 195.32.241.174 68.190.202.36 134.130.201.117
238.135.86.162 84.11.70.205 231.146.9.119 26.10.255.22
62.128.250.58 26.11.136.112 197.17.52.143 149.229.238.165
187.214.95.239 41.178.183.243 205.120.176.31 134.126.132.47
182.114.20.85 239.41.203.143 212.247.71.142 154.112.209.189