必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): Taiwan (Province of China)

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 39.14.117.104
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 42474
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;39.14.117.104.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025012801 1800 900 604800 86400

;; Query time: 33 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Jan 29 03:43:56 CST 2025
;; MSG SIZE  rcvd: 106
HOST信息:
104.117.14.39.in-addr.arpa domain name pointer 39-14-117-104.adsl.fetnet.net.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
104.117.14.39.in-addr.arpa	name = 39-14-117-104.adsl.fetnet.net.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
45.33.80.76 attack
10/28/2019-00:26:14.183850 45.33.80.76 Protocol: 6 ET SCAN NMAP -sS window 1024
2019-10-28 14:28:55
51.83.98.52 attack
$f2bV_matches
2019-10-28 14:22:51
112.119.38.127 attackbots
60001/tcp
[2019-10-28]1pkt
2019-10-28 14:18:41
106.12.56.17 attackspambots
2019-10-28T04:56:25.889627abusebot-8.cloudsearch.cf sshd\[12343\]: Invalid user deckelma from 106.12.56.17 port 51726
2019-10-28 14:25:51
86.194.66.80 attackbots
2019-10-28T05:38:25.797667tmaserv sshd\[6163\]: Failed password for root from 86.194.66.80 port 52354 ssh2
2019-10-28T06:41:48.189024tmaserv sshd\[9197\]: Invalid user map from 86.194.66.80 port 47408
2019-10-28T06:41:48.191768tmaserv sshd\[9197\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=lfbn-lyo-1-988-80.w86-194.abo.wanadoo.fr
2019-10-28T06:41:50.434808tmaserv sshd\[9197\]: Failed password for invalid user map from 86.194.66.80 port 47408 ssh2
2019-10-28T06:45:34.984614tmaserv sshd\[9265\]: Invalid user www from 86.194.66.80 port 57082
2019-10-28T06:45:34.986959tmaserv sshd\[9265\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=lfbn-lyo-1-988-80.w86-194.abo.wanadoo.fr
...
2019-10-28 14:19:12
222.186.180.9 attackbotsspam
2019-10-28T05:50:48.939439abusebot-7.cloudsearch.cf sshd\[2500\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.180.9  user=root
2019-10-28 13:53:49
45.82.153.34 attackspam
10/28/2019-00:11:42.121519 45.82.153.34 Protocol: 6 ET SCAN NMAP -sS window 1024
2019-10-28 14:09:41
111.230.15.197 attackbotsspam
Oct 28 05:57:19 MK-Soft-VM6 sshd[30714]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.230.15.197 
Oct 28 05:57:20 MK-Soft-VM6 sshd[30714]: Failed password for invalid user 321456 from 111.230.15.197 port 47978 ssh2
...
2019-10-28 13:54:19
222.186.175.212 attackbots
Oct 28 07:23:00 rotator sshd\[29097\]: Failed password for root from 222.186.175.212 port 47406 ssh2Oct 28 07:23:05 rotator sshd\[29097\]: Failed password for root from 222.186.175.212 port 47406 ssh2Oct 28 07:23:09 rotator sshd\[29097\]: Failed password for root from 222.186.175.212 port 47406 ssh2Oct 28 07:23:13 rotator sshd\[29097\]: Failed password for root from 222.186.175.212 port 47406 ssh2Oct 28 07:23:18 rotator sshd\[29097\]: Failed password for root from 222.186.175.212 port 47406 ssh2Oct 28 07:23:30 rotator sshd\[29103\]: Failed password for root from 222.186.175.212 port 26594 ssh2
...
2019-10-28 14:28:27
180.169.17.242 attackspam
Oct 28 02:43:02 firewall sshd[13767]: Failed password for invalid user user from 180.169.17.242 port 55120 ssh2
Oct 28 02:47:00 firewall sshd[13873]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.169.17.242  user=root
Oct 28 02:47:02 firewall sshd[13873]: Failed password for root from 180.169.17.242 port 35670 ssh2
...
2019-10-28 14:20:17
77.94.124.194 attack
445/tcp
[2019-10-28]1pkt
2019-10-28 14:16:51
106.12.17.43 attackbotsspam
Oct 28 06:43:45 vps691689 sshd[19985]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.17.43
Oct 28 06:43:47 vps691689 sshd[19985]: Failed password for invalid user admin from 106.12.17.43 port 35930 ssh2
...
2019-10-28 14:28:10
192.68.185.251 attackspam
Oct 28 05:55:10 MK-Soft-VM6 sshd[30703]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=192.68.185.251 
Oct 28 05:55:12 MK-Soft-VM6 sshd[30703]: Failed password for invalid user vdapp from 192.68.185.251 port 55104 ssh2
...
2019-10-28 14:22:31
163.177.40.85 attack
" "
2019-10-28 13:52:10
68.183.86.76 attack
5x Failed Password
2019-10-28 14:22:08

最近上报的IP列表

126.83.54.195 85.46.90.103 2.180.106.54 188.188.2.7
181.68.8.185 64.21.142.230 79.54.227.196 16.197.147.214
109.230.248.171 31.93.97.70 228.154.239.192 222.93.191.175
156.124.142.172 46.239.197.77 38.30.140.201 56.108.90.186
22.115.227.65 3.134.200.165 27.10.207.134 80.202.169.205