必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): United States of America (the)

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 75.214.114.119
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 44777
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;75.214.114.119.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025022200 1800 900 604800 86400

;; Query time: 33 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Feb 22 20:00:28 CST 2025
;; MSG SIZE  rcvd: 107
HOST信息:
119.114.214.75.in-addr.arpa domain name pointer 119.sub-75-214-114.myvzw.com.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
119.114.214.75.in-addr.arpa	name = 119.sub-75-214-114.myvzw.com.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
213.32.183.179 attackbots
2019-12-17T17:38:33.490775stark.klein-stark.info postfix/smtpd\[14357\]: NOQUEUE: reject: RCPT from nl.menedzserpraxis.hu\[213.32.183.179\]: 554 5.7.1 \: Relay access denied\; from=\ to=\ proto=ESMTP helo=\
...
2019-12-18 01:34:41
37.139.16.94 attack
Dec 17 00:08:47 server6 sshd[26711]: Address 37.139.16.94 maps to lukasklein.com, but this does not map back to the address - POSSIBLE BREAK-IN ATTEMPT!
Dec 17 00:08:47 server6 sshd[26711]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=37.139.16.94  user=r.r
Dec 17 00:08:49 server6 sshd[26711]: Failed password for r.r from 37.139.16.94 port 48222 ssh2
Dec 17 00:08:49 server6 sshd[26711]: Received disconnect from 37.139.16.94: 11: Bye Bye [preauth]
Dec 17 00:17:15 server6 sshd[13108]: Address 37.139.16.94 maps to lukasklein.com, but this does not map back to the address - POSSIBLE BREAK-IN ATTEMPT!
Dec 17 00:17:17 server6 sshd[13108]: Failed password for invalid user burgwell from 37.139.16.94 port 46168 ssh2
Dec 17 00:17:17 server6 sshd[13108]: Received disconnect from 37.139.16.94: 11: Bye Bye [preauth]
Dec 17 00:22:05 server6 sshd[23185]: Address 37.139.16.94 maps to lukasklein.com, but this does not map back to the address - ........
-------------------------------
2019-12-18 01:06:27
117.222.166.180 attackspam
TCP Port Scanning
2019-12-18 01:38:48
185.156.73.66 attackbots
12/17/2019-12:08:36.182655 185.156.73.66 Protocol: 6 ET SCAN NMAP -sS window 1024
2019-12-18 01:19:01
78.139.216.115 attack
2019-12-17 16:54:30,130 fail2ban.actions: WARNING [ssh] Ban 78.139.216.115
2019-12-18 01:35:20
222.186.173.142 attack
Dec 17 18:02:43 markkoudstaal sshd[22472]: Failed password for root from 222.186.173.142 port 52256 ssh2
Dec 17 18:02:56 markkoudstaal sshd[22472]: error: maximum authentication attempts exceeded for root from 222.186.173.142 port 52256 ssh2 [preauth]
Dec 17 18:03:07 markkoudstaal sshd[22514]: Failed password for root from 222.186.173.142 port 16950 ssh2
2019-12-18 01:05:54
45.73.12.218 attackspambots
Dec 17 17:06:09 pornomens sshd\[16251\]: Invalid user shastry from 45.73.12.218 port 44320
Dec 17 17:06:09 pornomens sshd\[16251\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.73.12.218
Dec 17 17:06:11 pornomens sshd\[16251\]: Failed password for invalid user shastry from 45.73.12.218 port 44320 ssh2
...
2019-12-18 01:22:50
50.239.163.172 attack
Invalid user rollinson from 50.239.163.172 port 51570
2019-12-18 01:44:58
177.1.213.19 attack
Dec 17 17:32:16 MK-Soft-VM6 sshd[14842]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=177.1.213.19 
Dec 17 17:32:18 MK-Soft-VM6 sshd[14842]: Failed password for invalid user 00000 from 177.1.213.19 port 2726 ssh2
...
2019-12-18 01:11:05
218.232.135.95 attack
$f2bV_matches
2019-12-18 01:13:52
76.80.1.2 attack
Lines containing failures of 76.80.1.2
Dec 17 05:16:37 supported sshd[17919]: Invalid user rin from 76.80.1.2 port 47363
Dec 17 05:16:37 supported sshd[17919]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=76.80.1.2 
Dec 17 05:16:39 supported sshd[17919]: Failed password for invalid user rin from 76.80.1.2 port 47363 ssh2
Dec 17 05:16:39 supported sshd[17919]: Received disconnect from 76.80.1.2 port 47363:11: Bye Bye [preauth]
Dec 17 05:16:39 supported sshd[17919]: Disconnected from invalid user rin 76.80.1.2 port 47363 [preauth]
Dec 17 05:33:57 supported sshd[19928]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=76.80.1.2  user=r.r
Dec 17 05:33:58 supported sshd[19928]: Failed password for r.r from 76.80.1.2 port 36023 ssh2
Dec 17 05:33:59 supported sshd[19928]: Received disconnect from 76.80.1.2 port 36023:11: Bye Bye [preauth]
Dec 17 05:33:59 supported sshd[19928]: Disconnected from au........
------------------------------
2019-12-18 01:29:49
130.162.66.198 attackbots
2019-12-17 02:27:37 server sshd[25454]: Failed password for invalid user server from 130.162.66.198 port 63454 ssh2
2019-12-18 01:29:17
40.92.64.69 attack
Dec 17 17:24:06 debian-2gb-vpn-nbg1-1 kernel: [971013.079818] [UFW BLOCK] IN=eth0 OUT= MAC=96:00:00:38:96:44:d2:74:7f:6e:37:e3:08:00 SRC=40.92.64.69 DST=78.46.192.101 LEN=52 TOS=0x02 PREC=0x00 TTL=110 ID=14003 DF PROTO=TCP SPT=16046 DPT=25 WINDOW=8192 RES=0x00 CWR ECE SYN URGP=0
2019-12-18 01:32:11
139.199.48.216 attack
Repeated brute force against a port
2019-12-18 01:44:32
182.61.175.96 attackspambots
Dec 17 18:16:27 lnxweb61 sshd[13452]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.61.175.96
Dec 17 18:16:29 lnxweb61 sshd[13452]: Failed password for invalid user joyko from 182.61.175.96 port 49274 ssh2
Dec 17 18:24:00 lnxweb61 sshd[19432]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.61.175.96
2019-12-18 01:43:53

最近上报的IP列表

195.213.205.67 4.202.180.31 250.30.69.192 161.78.163.25
191.122.150.226 238.204.120.209 146.71.150.132 177.196.39.175
109.110.173.73 61.70.151.76 169.58.21.46 204.175.3.1
31.227.191.100 103.33.114.48 212.252.78.242 55.206.207.107
136.28.38.45 235.104.227.127 49.126.157.170 215.239.12.206