必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): United States

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 34.14.6.130
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 26121
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;34.14.6.130.			IN	A

;; AUTHORITY SECTION:
.			90	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022112202 1800 900 604800 86400

;; Query time: 66 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Nov 23 09:37:09 CST 2022
;; MSG SIZE  rcvd: 104
HOST信息:
Host 130.6.14.34.in-addr.arpa not found: 2(SERVFAIL)
NSLOOKUP信息:
;; Got SERVFAIL reply from 183.60.83.19, trying next server
Server:		183.60.82.98
Address:	183.60.82.98#53

** server can't find 130.6.14.34.in-addr.arpa: SERVFAIL
相关IP信息:
最新评论:
IP 类型 评论内容 时间
106.51.2.250 attack
445/tcp
[2019-09-12]1pkt
2019-09-13 06:10:45
217.61.6.112 attackspam
Sep 12 11:39:26 php2 sshd\[6836\]: Invalid user tom from 217.61.6.112
Sep 12 11:39:26 php2 sshd\[6836\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=217.61.6.112
Sep 12 11:39:28 php2 sshd\[6836\]: Failed password for invalid user tom from 217.61.6.112 port 52740 ssh2
Sep 12 11:44:54 php2 sshd\[8003\]: Invalid user jenkins from 217.61.6.112
Sep 12 11:44:54 php2 sshd\[8003\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=217.61.6.112
2019-09-13 05:49:42
104.248.56.37 attack
Sep 12 23:39:11 eventyay sshd[15762]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.248.56.37
Sep 12 23:39:13 eventyay sshd[15762]: Failed password for invalid user tomcat from 104.248.56.37 port 52134 ssh2
Sep 12 23:44:29 eventyay sshd[15918]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.248.56.37
...
2019-09-13 05:59:36
111.194.42.49 attack
Sep 12 23:50:22 vps sshd[1318]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.194.42.49 
Sep 12 23:50:24 vps sshd[1315]: Failed password for root from 111.194.42.49 port 48110 ssh2
Sep 12 23:50:24 vps sshd[1318]: Failed password for invalid user admin from 111.194.42.49 port 48318 ssh2
...
2019-09-13 05:51:02
46.164.155.9 attackbots
2019-09-12T21:06:26.589144abusebot-7.cloudsearch.cf sshd\[24996\]: Invalid user 12345 from 46.164.155.9 port 44652
2019-09-13 06:09:16
185.40.4.85 attackspambots
Port scan on 5 port(s): 87 96 1080 9991 9996
2019-09-13 05:52:20
167.71.64.224 attackspambots
Sep 12 23:17:17 mout sshd[25784]: Invalid user admin from 167.71.64.224 port 56598
2019-09-13 05:55:21
49.88.112.116 attackbotsspam
Sep 12 10:54:35 php1 sshd\[19404\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.88.112.116  user=root
Sep 12 10:54:37 php1 sshd\[19404\]: Failed password for root from 49.88.112.116 port 28964 ssh2
Sep 12 10:55:33 php1 sshd\[19486\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.88.112.116  user=root
Sep 12 10:55:36 php1 sshd\[19486\]: Failed password for root from 49.88.112.116 port 29865 ssh2
Sep 12 10:56:33 php1 sshd\[19566\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.88.112.116  user=root
2019-09-13 05:50:11
61.162.102.238 attackspam
Sep 12 18:36:15 www4 sshd\[1817\]: Invalid user admin from 61.162.102.238
Sep 12 18:36:15 www4 sshd\[1817\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.162.102.238
Sep 12 18:36:17 www4 sshd\[1817\]: Failed password for invalid user admin from 61.162.102.238 port 55195 ssh2
...
2019-09-13 06:18:50
128.199.212.82 attackbots
Sep 12 23:21:14 h2177944 sshd\[19544\]: Invalid user jenkins from 128.199.212.82 port 54341
Sep 12 23:21:14 h2177944 sshd\[19544\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.199.212.82
Sep 12 23:21:17 h2177944 sshd\[19544\]: Failed password for invalid user jenkins from 128.199.212.82 port 54341 ssh2
Sep 12 23:27:51 h2177944 sshd\[19660\]: Invalid user admin1 from 128.199.212.82 port 56982
Sep 12 23:27:51 h2177944 sshd\[19660\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.199.212.82
...
2019-09-13 06:13:46
13.250.54.30 attackbots
Unauthorized connection attempt from IP address 13.250.54.30 on Port 445(SMB)
2019-09-13 06:15:56
67.207.95.247 attackspam
Sep 12 16:31:21 lvps5-35-247-183 sshd[13879]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=67.207.95.247  user=r.r
Sep 12 16:31:23 lvps5-35-247-183 sshd[13879]: Failed password for r.r from 67.207.95.247 port 47356 ssh2
Sep 12 16:31:23 lvps5-35-247-183 sshd[13879]: Received disconnect from 67.207.95.247: 11: Bye Bye [preauth]
Sep 12 16:31:24 lvps5-35-247-183 sshd[13882]: Invalid user admin from 67.207.95.247
Sep 12 16:31:24 lvps5-35-247-183 sshd[13882]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=67.207.95.247 
Sep 12 16:31:26 lvps5-35-247-183 sshd[13882]: Failed password for invalid user admin from 67.207.95.247 port 50662 ssh2
Sep 12 16:31:26 lvps5-35-247-183 sshd[13882]: Received disconnect from 67.207.95.247: 11: Bye Bye [preauth]
Sep 12 16:31:27 lvps5-35-247-183 sshd[13884]: Invalid user admin from 67.207.95.247
Sep 12 16:31:27 lvps5-35-247-183 sshd[13884]: pam_unix(sshd:auth): a........
-------------------------------
2019-09-13 05:53:58
115.202.131.3 attackbots
22/tcp
[2019-09-12]1pkt
2019-09-13 05:48:50
182.71.209.203 attack
www.geburtshaus-fulda.de 182.71.209.203 \[12/Sep/2019:16:46:42 +0200\] "POST /wp-login.php HTTP/1.1" 200 5785 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0"
www.geburtshaus-fulda.de 182.71.209.203 \[12/Sep/2019:16:46:45 +0200\] "POST /wp-login.php HTTP/1.1" 200 5789 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0"
2019-09-13 05:59:02
101.228.38.149 attackspam
23/tcp
[2019-09-12]1pkt
2019-09-13 05:57:09

最近上报的IP列表

31.147.230.16 231.22.113.24 235.235.66.79 23.181.167.100
228.240.108.191 12.84.225.189 212.188.10.135 146.68.127.12
203.46.3.225 202.116.29.155 201.15.43.55 20.81.75.156
199.63.96.147 190.34.22.111 190.29.165.199 190.25.207.236
190.248.176.43 65.108.103.97 190.190.19.92 190.126.2.241