必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): Beijing

国家(country): China

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 58.117.234.14
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 28332
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;58.117.234.14.			IN	A

;; AUTHORITY SECTION:
.			571	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019093002 1800 900 604800 86400

;; Query time: 140 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Oct 01 01:55:49 CST 2019
;; MSG SIZE  rcvd: 117
HOST信息:
Host 14.234.117.58.in-addr.arpa not found: 2(SERVFAIL)
NSLOOKUP信息:
Server:		192.168.31.1
Address:	192.168.31.1#53

** server can't find 14.234.117.58.in-addr.arpa: SERVFAIL

相关IP信息:
最新评论:
IP 类型 评论内容 时间
1.10.255.2 attackspam
2019-11-16T10:59:39.135170suse-nuc sshd[10182]: Invalid user avanthi from 1.10.255.2 port 62898
...
2020-09-27 05:54:33
157.230.243.163 attackspambots
Sep 26 23:58:51 hosting sshd[9999]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.230.243.163  user=root
Sep 26 23:58:53 hosting sshd[9999]: Failed password for root from 157.230.243.163 port 49722 ssh2
Sep 27 00:09:04 hosting sshd[10880]: Invalid user steam from 157.230.243.163 port 37712
Sep 27 00:09:04 hosting sshd[10880]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.230.243.163
Sep 27 00:09:04 hosting sshd[10880]: Invalid user steam from 157.230.243.163 port 37712
Sep 27 00:09:06 hosting sshd[10880]: Failed password for invalid user steam from 157.230.243.163 port 37712 ssh2
...
2020-09-27 05:37:15
1.179.185.50 attackspambots
2020-09-26T13:08:36.986023linuxbox-skyline sshd[173655]: Invalid user test1 from 1.179.185.50 port 42114
...
2020-09-27 05:36:44
112.85.42.174 attack
Sep 26 23:29:44 vps333114 sshd[25539]: Failed password for root from 112.85.42.174 port 37123 ssh2
Sep 26 23:29:48 vps333114 sshd[25539]: Failed password for root from 112.85.42.174 port 37123 ssh2
...
2020-09-27 05:40:27
222.186.175.217 attackbotsspam
Sep 26 18:33:57 firewall sshd[7258]: Failed password for root from 222.186.175.217 port 45844 ssh2
Sep 26 18:34:01 firewall sshd[7258]: Failed password for root from 222.186.175.217 port 45844 ssh2
Sep 26 18:34:05 firewall sshd[7258]: Failed password for root from 222.186.175.217 port 45844 ssh2
...
2020-09-27 05:34:11
1.180.133.42 attack
2019-11-04T11:23:39.711296suse-nuc sshd[12679]: Invalid user ts3 from 1.180.133.42 port 14472
...
2020-09-27 05:33:53
51.144.45.198 attackbotsspam
SSH Invalid Login
2020-09-27 05:58:12
1.186.57.150 attackbots
Sep 26 20:41:21 IngegnereFirenze sshd[15905]: Failed password for invalid user km from 1.186.57.150 port 51882 ssh2
...
2020-09-27 05:33:20
37.152.181.57 attackspam
Brute force attempt
2020-09-27 05:46:07
49.233.160.141 attackbots
2020-09-26T07:37:27.9450881495-001 sshd[10704]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.233.160.141
2020-09-26T07:37:27.9420411495-001 sshd[10704]: Invalid user postgres from 49.233.160.141 port 36964
2020-09-26T07:37:30.3413781495-001 sshd[10704]: Failed password for invalid user postgres from 49.233.160.141 port 36964 ssh2
2020-09-26T07:41:55.0759901495-001 sshd[10911]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.233.160.141  user=root
2020-09-26T07:41:56.9285691495-001 sshd[10911]: Failed password for root from 49.233.160.141 port 52790 ssh2
2020-09-26T07:54:25.6426911495-001 sshd[11437]: Invalid user firewall from 49.233.160.141 port 43768
...
2020-09-27 05:52:54
1.193.76.18 attack
2020-06-25T20:46:13.917475suse-nuc sshd[1901]: User root from 1.193.76.18 not allowed because listed in DenyUsers
...
2020-09-27 05:29:21
187.109.10.100 attackbotsspam
187.109.10.100 (BR/Brazil/-), 6 distributed sshd attacks on account [root] in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_DISTATTACK; Logs: Sep 25 22:38:58 server sshd[20897]: Failed password for root from 51.161.32.211 port 44522 ssh2
Sep 25 22:09:57 server sshd[16870]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=210.14.77.102  user=root
Sep 25 22:32:44 server sshd[20028]: Failed password for root from 190.104.157.142 port 55212 ssh2
Sep 25 22:09:59 server sshd[16870]: Failed password for root from 210.14.77.102 port 16885 ssh2
Sep 25 22:16:44 server sshd[17906]: Failed password for root from 187.109.10.100 port 36406 ssh2
Sep 25 22:32:42 server sshd[20028]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=190.104.157.142  user=root

IP Addresses Blocked:

51.161.32.211 (CA/Canada/-)
210.14.77.102 (CN/China/-)
190.104.157.142 (PY/Paraguay/-)
2020-09-27 05:43:00
52.164.231.178 attackspam
Invalid user admin from 52.164.231.178 port 24098
2020-09-27 05:35:33
40.80.146.217 attackspam
Cowrie Honeypot: Unauthorised SSH/Telnet login attempt with user "root" at 2020-09-26T21:24:32Z
2020-09-27 05:25:16
1.10.177.202 attackspambots
2019-10-14T17:34:50.405060suse-nuc sshd[28654]: Invalid user omu from 1.10.177.202 port 10044
...
2020-09-27 05:55:56

最近上报的IP列表

78.87.13.177 116.249.101.187 101.225.115.23 121.29.93.90
112.69.150.190 5.241.187.116 171.221.79.96 220.63.243.204
2605:de00:1:1:4a:1b:0:2 41.151.16.43 202.36.221.11 188.65.236.188
61.175.233.74 60.108.103.218 192.147.222.234 97.182.129.145
194.208.115.233 83.221.203.174 115.213.140.105 13.14.205.166