必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): Japan

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 222.14.98.138
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 42558
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;222.14.98.138.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025020601 1800 900 604800 86400

;; Query time: 68 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 07 04:23:32 CST 2025
;; MSG SIZE  rcvd: 106
HOST信息:
138.98.14.222.in-addr.arpa domain name pointer ZR098138.ppp.dion.ne.jp.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
138.98.14.222.in-addr.arpa	name = ZR098138.ppp.dion.ne.jp.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
110.17.3.228 attack
FTP/21 MH Probe, BF, Hack -
2019-10-07 21:59:46
45.136.109.95 attackspam
10/07/2019-09:05:55.881011 45.136.109.95 Protocol: 6 ET CINS Active Threat Intelligence Poor Reputation IP group 40
2019-10-07 21:36:55
49.232.41.123 attackspambots
Automatic report - SSH Brute-Force Attack
2019-10-07 21:31:29
14.186.29.249 attack
Fail2Ban Ban Triggered
2019-10-07 21:57:16
88.249.81.54 attackspambots
Automatic report - Port Scan Attack
2019-10-07 21:23:59
121.126.161.117 attackbotsspam
Oct  7 15:19:18 vps691689 sshd[4478]: Failed password for root from 121.126.161.117 port 36614 ssh2
Oct  7 15:24:32 vps691689 sshd[4577]: Failed password for root from 121.126.161.117 port 47432 ssh2
...
2019-10-07 21:37:11
159.203.73.181 attackbots
Automatic report - SSH Brute-Force Attack
2019-10-07 21:42:11
42.159.10.104 attackspambots
Oct  7 15:41:51 eventyay sshd[8716]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=42.159.10.104
Oct  7 15:41:52 eventyay sshd[8716]: Failed password for invalid user Avignon2016 from 42.159.10.104 port 36482 ssh2
Oct  7 15:47:15 eventyay sshd[8807]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=42.159.10.104
...
2019-10-07 21:58:35
94.231.120.189 attackbotsspam
Oct  7 03:27:43 php1 sshd\[2453\]: Invalid user Pa\$\$w0rd@111 from 94.231.120.189
Oct  7 03:27:43 php1 sshd\[2453\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=94.231.120.189
Oct  7 03:27:46 php1 sshd\[2453\]: Failed password for invalid user Pa\$\$w0rd@111 from 94.231.120.189 port 38279 ssh2
Oct  7 03:31:28 php1 sshd\[2970\]: Invalid user Joker2017 from 94.231.120.189
Oct  7 03:31:28 php1 sshd\[2970\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=94.231.120.189
2019-10-07 21:58:08
222.186.42.15 attackspambots
Oct  7 15:46:33 debian64 sshd\[25976\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.42.15  user=root
Oct  7 15:46:35 debian64 sshd\[25976\]: Failed password for root from 222.186.42.15 port 16494 ssh2
Oct  7 15:46:38 debian64 sshd\[25976\]: Failed password for root from 222.186.42.15 port 16494 ssh2
...
2019-10-07 21:49:28
39.135.1.194 attackspam
Port scan: Attack repeated for 24 hours
2019-10-07 22:00:55
193.112.6.241 attackbotsspam
Oct  7 14:47:04 MK-Soft-Root1 sshd[2108]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=193.112.6.241 
Oct  7 14:47:06 MK-Soft-Root1 sshd[2108]: Failed password for invalid user P@SSWORD2018 from 193.112.6.241 port 48906 ssh2
...
2019-10-07 21:50:49
109.202.117.133 attackspam
Port scan
2019-10-07 21:32:34
202.106.93.46 attackbots
2019-10-07T16:25:09.004331tmaserv sshd\[30357\]: Invalid user Centos2017 from 202.106.93.46 port 44488
2019-10-07T16:25:09.010084tmaserv sshd\[30357\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=202.106.93.46
2019-10-07T16:25:11.129970tmaserv sshd\[30357\]: Failed password for invalid user Centos2017 from 202.106.93.46 port 44488 ssh2
2019-10-07T16:30:18.853601tmaserv sshd\[30611\]: Invalid user 12345@Admin from 202.106.93.46 port 33470
2019-10-07T16:30:18.858279tmaserv sshd\[30611\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=202.106.93.46
2019-10-07T16:30:21.063751tmaserv sshd\[30611\]: Failed password for invalid user 12345@Admin from 202.106.93.46 port 33470 ssh2
...
2019-10-07 21:45:47
148.70.210.77 attack
Oct  7 14:51:50 jane sshd[2303]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=148.70.210.77 
Oct  7 14:51:52 jane sshd[2303]: Failed password for invalid user P@rola_!@# from 148.70.210.77 port 59425 ssh2
...
2019-10-07 21:47:07

最近上报的IP列表

255.171.229.30 176.79.229.160 255.89.95.241 254.61.172.133
55.146.86.47 144.234.232.107 159.188.206.200 219.152.184.33
243.192.35.82 150.169.211.179 40.174.176.167 170.82.28.156
160.236.79.81 89.78.138.224 39.128.80.168 137.194.201.223
213.187.139.214 46.173.151.65 160.170.60.80 155.72.92.83