必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): United States of America (the)

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 74.11.114.114
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 26022
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;74.11.114.114.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025031303 1800 900 604800 86400

;; Query time: 12 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Mar 14 05:30:06 CST 2025
;; MSG SIZE  rcvd: 106
HOST信息:
Host 114.114.11.74.in-addr.arpa not found: 2(SERVFAIL)
NSLOOKUP信息:
;; Got SERVFAIL reply from 183.60.83.19, trying next server
Server:		183.60.82.98
Address:	183.60.82.98#53

** server can't find 114.114.11.74.in-addr.arpa: SERVFAIL
相关IP信息:
最新评论:
IP 类型 评论内容 时间
46.229.168.147 attackbotsspam
Malicious Traffic/Form Submission
2020-02-16 22:07:50
83.135.111.168 attackspam
Feb 16 14:41:47 srv-ubuntu-dev3 sshd[124040]: Invalid user www from 83.135.111.168
Feb 16 14:41:47 srv-ubuntu-dev3 sshd[124040]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=83.135.111.168
Feb 16 14:41:47 srv-ubuntu-dev3 sshd[124040]: Invalid user www from 83.135.111.168
Feb 16 14:41:48 srv-ubuntu-dev3 sshd[124040]: Failed password for invalid user www from 83.135.111.168 port 46654 ssh2
Feb 16 14:46:22 srv-ubuntu-dev3 sshd[124436]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=83.135.111.168  user=root
Feb 16 14:46:23 srv-ubuntu-dev3 sshd[124436]: Failed password for root from 83.135.111.168 port 48710 ssh2
Feb 16 14:50:50 srv-ubuntu-dev3 sshd[124781]: Invalid user test1 from 83.135.111.168
Feb 16 14:50:50 srv-ubuntu-dev3 sshd[124781]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=83.135.111.168
Feb 16 14:50:50 srv-ubuntu-dev3 sshd[124781]: Invalid user test1 
...
2020-02-16 22:09:59
222.186.15.91 attack
2020-02-16T15:05:41.537656scmdmz1 sshd[31034]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.15.91  user=root
2020-02-16T15:05:43.268289scmdmz1 sshd[31034]: Failed password for root from 222.186.15.91 port 30181 ssh2
2020-02-16T15:05:45.845860scmdmz1 sshd[31034]: Failed password for root from 222.186.15.91 port 30181 ssh2
2020-02-16T15:05:41.537656scmdmz1 sshd[31034]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.15.91  user=root
2020-02-16T15:05:43.268289scmdmz1 sshd[31034]: Failed password for root from 222.186.15.91 port 30181 ssh2
2020-02-16T15:05:45.845860scmdmz1 sshd[31034]: Failed password for root from 222.186.15.91 port 30181 ssh2
2020-02-16T15:05:41.537656scmdmz1 sshd[31034]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.15.91  user=root
2020-02-16T15:05:43.268289scmdmz1 sshd[31034]: Failed password for root from 222.186.15.91 port 30181 ssh2
2020-02-1
2020-02-16 22:22:53
106.12.241.106 attack
2020-02-16T13:50:38.842730homeassistant sshd[14648]: Invalid user vnc from 106.12.241.106 port 34030
2020-02-16T13:50:38.849584homeassistant sshd[14648]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.241.106
...
2020-02-16 22:23:31
90.6.129.32 attackspambots
Automatic report - Port Scan Attack
2020-02-16 22:27:58
58.182.189.192 attackbots
1581861053 - 02/16/2020 14:50:53 Host: 58.182.189.192/58.182.189.192 Port: 21 TCP Blocked
2020-02-16 22:08:28
176.113.161.95 attackbotsspam
MultiHost/MultiPort Probe, Scan, Hack -
2020-02-16 21:47:45
106.12.57.165 attackbots
Feb 16 04:15:51 web9 sshd\[12014\]: Invalid user maria from 106.12.57.165
Feb 16 04:15:51 web9 sshd\[12014\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.57.165
Feb 16 04:15:52 web9 sshd\[12014\]: Failed password for invalid user maria from 106.12.57.165 port 50430 ssh2
Feb 16 04:19:22 web9 sshd\[12643\]: Invalid user amine from 106.12.57.165
Feb 16 04:19:22 web9 sshd\[12643\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.57.165
2020-02-16 22:20:58
190.134.178.242 attack
Automatic report - Port Scan Attack
2020-02-16 22:13:32
159.203.32.71 attack
Feb 16 03:48:11 hpm sshd\[2035\]: Invalid user ruzycki from 159.203.32.71
Feb 16 03:48:11 hpm sshd\[2035\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.203.32.71
Feb 16 03:48:13 hpm sshd\[2035\]: Failed password for invalid user ruzycki from 159.203.32.71 port 30372 ssh2
Feb 16 03:51:06 hpm sshd\[2328\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.203.32.71  user=root
Feb 16 03:51:08 hpm sshd\[2328\]: Failed password for root from 159.203.32.71 port 58314 ssh2
2020-02-16 21:56:22
188.192.161.152 attackspambots
2020-02-16T13:58:03.529530vps773228.ovh.net sshd[25128]: Invalid user backuppc from 188.192.161.152 port 46326
2020-02-16T13:58:03.554215vps773228.ovh.net sshd[25128]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=ipbcc0a198.dynamic.kabel-deutschland.de
2020-02-16T13:58:03.529530vps773228.ovh.net sshd[25128]: Invalid user backuppc from 188.192.161.152 port 46326
2020-02-16T13:58:05.538500vps773228.ovh.net sshd[25128]: Failed password for invalid user backuppc from 188.192.161.152 port 46326 ssh2
2020-02-16T14:24:23.331342vps773228.ovh.net sshd[25149]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=ipbcc0a198.dynamic.kabel-deutschland.de  user=root
2020-02-16T14:24:25.220722vps773228.ovh.net sshd[25149]: Failed password for root from 188.192.161.152 port 36852 ssh2
2020-02-16T14:50:30.818009vps773228.ovh.net sshd[25203]: Invalid user beatrice from 188.192.161.152 port 49802
2020-02-16T14:50:30.834106vps77
...
2020-02-16 22:29:08
178.128.81.125 attackspam
Feb 16 13:47:15 game-panel sshd[830]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.128.81.125
Feb 16 13:47:18 game-panel sshd[830]: Failed password for invalid user admin from 178.128.81.125 port 18524 ssh2
Feb 16 13:51:06 game-panel sshd[993]: Failed password for root from 178.128.81.125 port 48528 ssh2
2020-02-16 21:58:43
185.53.91.35 attackbots
Feb 16 14:51:11 debian-2gb-nbg1-2 kernel: \[4120291.954923\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=185.53.91.35 DST=195.201.40.59 LEN=440 TOS=0x00 PREC=0x00 TTL=51 ID=1797 DF PROTO=UDP SPT=5101 DPT=5060 LEN=420
2020-02-16 21:53:29
200.114.236.19 attackspam
Feb 15 20:27:56 php1 sshd\[26492\]: Invalid user 123456 from 200.114.236.19
Feb 15 20:27:56 php1 sshd\[26492\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=19-236-114-200.fibertel.com.ar
Feb 15 20:27:58 php1 sshd\[26492\]: Failed password for invalid user 123456 from 200.114.236.19 port 45310 ssh2
Feb 15 20:32:16 php1 sshd\[26931\]: Invalid user samurai from 200.114.236.19
Feb 15 20:32:16 php1 sshd\[26931\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=19-236-114-200.fibertel.com.ar
2020-02-16 21:47:11
185.119.120.197 attack
MultiHost/MultiPort Probe, Scan, Hack -
2020-02-16 22:20:42

最近上报的IP列表

219.16.147.22 133.137.115.217 202.8.228.15 160.71.105.66
41.60.84.21 127.106.231.18 162.88.46.182 254.129.0.245
210.74.51.154 121.1.58.140 203.101.161.212 161.184.17.185
191.232.120.73 210.252.140.248 177.48.115.55 151.182.142.121
145.157.227.198 246.207.206.191 67.18.49.124 65.167.117.77