必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): China

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 222.139.52.14
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 17595
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;222.139.52.14.			IN	A

;; AUTHORITY SECTION:
.			466	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022021202 1800 900 604800 86400

;; Query time: 106 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Feb 13 11:03:42 CST 2022
;; MSG SIZE  rcvd: 106
HOST信息:
14.52.139.222.in-addr.arpa domain name pointer hn.kd.ny.adsl.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
14.52.139.222.in-addr.arpa	name = hn.kd.ny.adsl.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
149.56.23.154 attackbots
(sshd) Failed SSH login from 149.56.23.154 (ns529890.ip-149-56-23.net): 5 in the last 3600 secs
2019-09-21 22:42:01
109.236.70.207 attack
[portscan] Port scan
2019-09-21 22:29:44
77.40.3.223 attack
2019-09-21 dovecot_login authenticator failed for \(localhost.localdomain\) \[77.40.3.223\]: 535 Incorrect authentication data \(set_id=help@**REMOVED**.de\)
2019-09-21 dovecot_login authenticator failed for \(localhost.localdomain\) \[77.40.3.223\]: 535 Incorrect authentication data \(set_id=hello@**REMOVED**.de\)
2019-09-21 dovecot_login authenticator failed for \(localhost.localdomain\) \[77.40.3.223\]: 535 Incorrect authentication data \(set_id=help@**REMOVED**.de\)
2019-09-21 22:48:33
200.144.245.49 attack
Sep 21 16:47:37 core sshd[7721]: Invalid user jq from 200.144.245.49 port 52436
Sep 21 16:47:39 core sshd[7721]: Failed password for invalid user jq from 200.144.245.49 port 52436 ssh2
...
2019-09-21 23:12:36
118.97.77.114 attack
Sep 21 04:21:52 tdfoods sshd\[12392\]: Invalid user robbie from 118.97.77.114
Sep 21 04:21:52 tdfoods sshd\[12392\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.97.77.114
Sep 21 04:21:54 tdfoods sshd\[12392\]: Failed password for invalid user robbie from 118.97.77.114 port 41036 ssh2
Sep 21 04:27:49 tdfoods sshd\[12922\]: Invalid user webmaster from 118.97.77.114
Sep 21 04:27:49 tdfoods sshd\[12922\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.97.77.114
2019-09-21 22:28:09
222.220.167.202 attackspam
Unauthorised access (Sep 21) SRC=222.220.167.202 LEN=40 TOS=0x10 PREC=0x40 TTL=49 ID=61799 TCP DPT=8080 WINDOW=12757 SYN 
Unauthorised access (Sep 21) SRC=222.220.167.202 LEN=40 TOS=0x10 PREC=0x40 TTL=49 ID=20900 TCP DPT=8080 WINDOW=41282 SYN 
Unauthorised access (Sep 19) SRC=222.220.167.202 LEN=40 TOS=0x10 PREC=0x40 TTL=49 ID=4699 TCP DPT=8080 WINDOW=24825 SYN
2019-09-21 23:04:40
192.99.68.159 attack
Sep 21 04:14:17 hcbb sshd\[28678\]: Invalid user sshvpn from 192.99.68.159
Sep 21 04:14:17 hcbb sshd\[28678\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=mail1.led-kampanj.se
Sep 21 04:14:19 hcbb sshd\[28678\]: Failed password for invalid user sshvpn from 192.99.68.159 port 39662 ssh2
Sep 21 04:18:26 hcbb sshd\[29043\]: Invalid user gate from 192.99.68.159
Sep 21 04:18:26 hcbb sshd\[29043\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=mail1.led-kampanj.se
2019-09-21 22:27:27
176.193.119.237 attackspam
Sep 21 16:40:07 www sshd\[15379\]: Invalid user pi from 176.193.119.237
Sep 21 16:40:07 www sshd\[15379\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=176.193.119.237
Sep 21 16:40:09 www sshd\[15379\]: Failed password for invalid user pi from 176.193.119.237 port 33490 ssh2
...
2019-09-21 23:08:31
14.29.251.33 attack
Sep 21 04:55:15 hpm sshd\[32265\]: Invalid user vyatta from 14.29.251.33
Sep 21 04:55:15 hpm sshd\[32265\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=14.29.251.33
Sep 21 04:55:16 hpm sshd\[32265\]: Failed password for invalid user vyatta from 14.29.251.33 port 57000 ssh2
Sep 21 05:00:11 hpm sshd\[339\]: Invalid user django from 14.29.251.33
Sep 21 05:00:11 hpm sshd\[339\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=14.29.251.33
2019-09-21 23:01:55
128.199.133.114 attackbotsspam
WordPress wp-login brute force :: 128.199.133.114 0.280 BYPASS [21/Sep/2019:22:57:12  1000] [censored_1] "POST /wp-login.php HTTP/1.1" 200 3972 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
2019-09-21 22:56:10
121.184.64.15 attackbotsspam
Sep 21 04:43:28 wbs sshd\[9266\]: Invalid user 1 from 121.184.64.15
Sep 21 04:43:28 wbs sshd\[9266\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.184.64.15
Sep 21 04:43:30 wbs sshd\[9266\]: Failed password for invalid user 1 from 121.184.64.15 port 1680 ssh2
Sep 21 04:48:52 wbs sshd\[9718\]: Invalid user 123456 from 121.184.64.15
Sep 21 04:48:52 wbs sshd\[9718\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.184.64.15
2019-09-21 23:09:40
68.183.124.53 attackspambots
Sep 21 15:31:42 vpn01 sshd\[780\]: Invalid user alexandre from 68.183.124.53
Sep 21 15:31:42 vpn01 sshd\[780\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=68.183.124.53
Sep 21 15:31:44 vpn01 sshd\[780\]: Failed password for invalid user alexandre from 68.183.124.53 port 33242 ssh2
2019-09-21 23:04:07
46.38.144.146 attackspambots
Sep 21 14:22:12 heicom postfix/smtpd\[12150\]: warning: unknown\[46.38.144.146\]: SASL LOGIN authentication failed: authentication failure
Sep 21 14:23:30 heicom postfix/smtpd\[10005\]: warning: unknown\[46.38.144.146\]: SASL LOGIN authentication failed: authentication failure
Sep 21 14:24:47 heicom postfix/smtpd\[12153\]: warning: unknown\[46.38.144.146\]: SASL LOGIN authentication failed: authentication failure
Sep 21 14:26:04 heicom postfix/smtpd\[11085\]: warning: unknown\[46.38.144.146\]: SASL LOGIN authentication failed: authentication failure
Sep 21 14:27:21 heicom postfix/smtpd\[12153\]: warning: unknown\[46.38.144.146\]: SASL LOGIN authentication failed: authentication failure
...
2019-09-21 22:31:10
206.189.165.34 attackspambots
Sep 21 16:58:59 plex sshd[11722]: Invalid user vinoth from 206.189.165.34 port 56648
2019-09-21 23:12:12
222.186.15.204 attackspam
2019-09-21T21:20:06.285529enmeeting.mahidol.ac.th sshd\[5734\]: User root from 222.186.15.204 not allowed because not listed in AllowUsers
2019-09-21T21:20:06.671961enmeeting.mahidol.ac.th sshd\[5734\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.15.204  user=root
2019-09-21T21:20:08.971370enmeeting.mahidol.ac.th sshd\[5734\]: Failed password for invalid user root from 222.186.15.204 port 18349 ssh2
...
2019-09-21 22:32:51

最近上报的IP列表

222.139.227.17 222.139.66.152 222.139.49.117 222.139.231.91
222.140.102.99 222.140.140.29 222.140.141.56 222.139.94.115
222.140.157.131 222.140.160.85 222.140.158.8 222.140.170.180
222.140.173.147 222.140.177.86 222.140.206.68 222.140.255.9
222.140.206.244 222.140.74.146 222.141.122.223 222.140.187.29