必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): Ōtsukimachi

省份(region): Hukusima (Fukushima)

国家(country): Japan

运营商(isp): KDDI Corporation

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 222.12.114.109
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 5954
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;222.12.114.109.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025021301 1800 900 604800 86400

;; Query time: 37 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 14 11:41:45 CST 2025
;; MSG SIZE  rcvd: 107
HOST信息:
109.114.12.222.in-addr.arpa domain name pointer ZP114109.ppp.dion.ne.jp.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
109.114.12.222.in-addr.arpa	name = ZP114109.ppp.dion.ne.jp.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
45.4.145.3 attackbots
Unauthorized IMAP connection attempt
2020-05-26 14:53:33
222.186.173.226 attackbotsspam
May 26 09:17:05 server sshd[56510]: Failed none for root from 222.186.173.226 port 60544 ssh2
May 26 09:17:07 server sshd[56510]: Failed password for root from 222.186.173.226 port 60544 ssh2
May 26 09:17:12 server sshd[56510]: Failed password for root from 222.186.173.226 port 60544 ssh2
2020-05-26 15:28:23
193.112.44.102 attackbotsspam
ssh brute force
2020-05-26 15:09:55
194.26.29.53 attackbotsspam
May 26 08:32:28 [host] kernel: [7103273.157805] [U
May 26 08:36:15 [host] kernel: [7103500.388105] [U
May 26 08:45:57 [host] kernel: [7104082.379111] [U
May 26 08:54:34 [host] kernel: [7104599.359819] [U
May 26 08:58:59 [host] kernel: [7104863.631064] [U
May 26 09:08:53 [host] kernel: [7105458.105869] [U
2020-05-26 15:26:35
122.51.202.157 attackbots
May 26 08:52:30 ns381471 sshd[16570]: Failed password for root from 122.51.202.157 port 40838 ssh2
2020-05-26 15:03:28
129.204.226.105 attack
Invalid user 3 from 129.204.226.105 port 37660
2020-05-26 15:22:58
106.13.186.119 attackspam
May 26 05:28:14 ns3164893 sshd[20632]: Failed password for root from 106.13.186.119 port 34948 ssh2
May 26 05:32:20 ns3164893 sshd[20666]: Invalid user hadoop from 106.13.186.119 port 42614
...
2020-05-26 15:05:54
189.151.215.75 attackbots
SSH Scan
2020-05-26 15:25:28
106.12.106.34 attack
SSH invalid-user multiple login try
2020-05-26 15:04:13
115.85.213.217 attackbotsspam
Rude login attack (8 tries in 1d)
2020-05-26 15:10:45
190.145.224.18 attackbots
k+ssh-bruteforce
2020-05-26 15:01:23
148.71.44.11 attackbotsspam
Lines containing failures of 148.71.44.11
May 25 06:34:35 install sshd[1552]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=148.71.44.11  user=r.r
May 25 06:34:37 install sshd[1552]: Failed password for r.r from 148.71.44.11 port 35155 ssh2
May 25 06:34:37 install sshd[1552]: Received disconnect from 148.71.44.11 port 35155:11: Bye Bye [preauth]
May 25 06:34:37 install sshd[1552]: Disconnected from authenticating user r.r 148.71.44.11 port 35155 [preauth]
May 25 06:38:19 install sshd[2737]: Invalid user morag from 148.71.44.11 port 33044
May 25 06:38:19 install sshd[2737]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=148.71.44.11


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=148.71.44.11
2020-05-26 15:23:58
92.63.194.127 attackbots
IP 92.63.194.127 attacked honeypot on port: 1111 at 5/26/2020 1:01:25 AM
2020-05-26 15:10:59
94.102.49.190 attackspambots
Port scanning [2 denied]
2020-05-26 15:00:36
116.255.131.142 attackbotsspam
Invalid user ijm from 116.255.131.142 port 57842
2020-05-26 14:59:38

最近上报的IP列表

234.161.197.230 71.158.52.109 238.229.203.89 13.26.37.140
147.50.49.63 106.35.40.214 13.251.108.92 30.136.188.108
242.150.156.237 187.107.190.18 239.66.90.241 14.97.230.78
246.209.133.120 238.137.33.107 224.161.114.26 134.94.17.221
225.124.182.118 99.172.53.45 56.103.10.91 84.51.73.59