必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): Taiwan (Province of China)

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 61.20.114.22
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 14311
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;61.20.114.22.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2024121001 1800 900 604800 86400

;; Query time: 13 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Dec 11 04:49:36 CST 2024
;; MSG SIZE  rcvd: 105
HOST信息:
22.114.20.61.in-addr.arpa domain name pointer 61-20-114-22.adsl.fetnet.net.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
22.114.20.61.in-addr.arpa	name = 61-20-114-22.adsl.fetnet.net.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
66.240.205.34 attack
66.240.205.34 was recorded 16 times by 10 hosts attempting to connect to the following ports: 81,14344,5552,10134,2008,1177,53,4664,82,9633,1800,80,12345,54984. Incident counter (4h, 24h, all-time): 16, 85, 253
2019-11-08 18:05:28
160.16.201.22 attackspambots
Automatic report - XMLRPC Attack
2019-11-08 18:40:47
124.29.235.10 attackbots
Honeypot attack, port: 445, PTR: PTR record not found
2019-11-08 18:21:39
36.228.218.252 attackspam
Honeypot attack, port: 23, PTR: 36-228-218-252.dynamic-ip.hinet.net.
2019-11-08 18:26:53
216.218.206.102 attack
3389BruteforceFW21
2019-11-08 18:30:08
105.21.33.2 attackspam
Nov  8 06:38:27 firewall sshd[26530]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=105.21.33.2  user=root
Nov  8 06:38:29 firewall sshd[26530]: Failed password for root from 105.21.33.2 port 33173 ssh2
Nov  8 06:41:03 firewall sshd[26580]: Invalid user test from 105.21.33.2
...
2019-11-08 18:28:09
13.67.183.43 attackbots
WordPress login Brute force / Web App Attack on client site.
2019-11-08 18:36:31
194.190.129.18 attack
[portscan] Port scan
2019-11-08 18:10:12
89.45.17.11 attackspambots
3x Failed Password
2019-11-08 18:17:47
117.221.239.199 attack
Honeypot attack, port: 445, PTR: PTR record not found
2019-11-08 18:08:43
142.93.225.20 attackspam
2019-11-08T10:21:20.620860abusebot.cloudsearch.cf sshd\[2823\]: Invalid user admin from 142.93.225.20 port 38409
2019-11-08 18:34:58
2.50.170.48 attackspam
Honeypot attack, port: 445, PTR: PTR record not found
2019-11-08 18:37:55
77.247.109.37 attack
" "
2019-11-08 18:43:16
187.73.210.140 attack
Nov  8 11:19:07 sso sshd[20547]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=187.73.210.140
Nov  8 11:19:09 sso sshd[20547]: Failed password for invalid user walkie from 187.73.210.140 port 41618 ssh2
...
2019-11-08 18:33:12
183.88.42.20 attack
Honeypot attack, port: 445, PTR: mx-ll-183.88.42-20.dynamic.3bb.co.th.
2019-11-08 18:14:52

最近上报的IP列表

113.59.115.253 219.107.58.145 29.63.45.102 164.57.152.239
149.176.117.209 36.249.202.151 115.195.13.182 171.71.86.5
101.62.50.206 170.133.18.33 148.35.219.174 237.68.21.186
152.78.57.12 81.121.14.137 191.138.192.49 165.125.6.167
97.212.151.184 151.213.225.153 185.109.47.53 25.112.97.201