必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): Vila do Conde

省份(region): Porto

国家(country): Portugal

运营商(isp): NOS

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 94.132.14.47
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 36737
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;94.132.14.47.			IN	A

;; AUTHORITY SECTION:
.			208	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019123001 1800 900 604800 86400

;; Query time: 502 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Dec 31 04:42:26 CST 2019
;; MSG SIZE  rcvd: 116
HOST信息:
47.14.132.94.in-addr.arpa domain name pointer a94-132-14-47.cpe.netcabo.pt.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
47.14.132.94.in-addr.arpa	name = a94-132-14-47.cpe.netcabo.pt.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
132.232.71.124 attackspambots
Automatic report - Banned IP Access
2019-09-27 03:12:43
123.201.105.105 attackbotsspam
Unauthorized connection attempt from IP address 123.201.105.105 on Port 445(SMB)
2019-09-27 02:59:31
128.199.197.53 attack
Sep 26 19:11:57 game-panel sshd[32220]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.199.197.53
Sep 26 19:12:00 game-panel sshd[32220]: Failed password for invalid user donna from 128.199.197.53 port 54958 ssh2
Sep 26 19:17:05 game-panel sshd[32393]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.199.197.53
2019-09-27 03:19:49
188.166.208.131 attack
2019-09-26T18:12:36.760107abusebot-2.cloudsearch.cf sshd\[22705\]: Invalid user superuser from 188.166.208.131 port 36594
2019-09-27 03:24:56
144.217.4.14 attackbotsspam
Sep 26 20:23:54 XXX sshd[45010]: Invalid user ofsaa from 144.217.4.14 port 36684
2019-09-27 03:05:26
121.9.226.219 attackspambots
Automatic report - CMS Brute-Force Attack
2019-09-27 03:07:36
189.112.228.153 attackbots
Automatic report - Banned IP Access
2019-09-27 03:18:20
119.29.16.76 attackspam
Sep 26 15:16:10 debian sshd\[14401\]: Invalid user ts from 119.29.16.76 port 64173
Sep 26 15:16:10 debian sshd\[14401\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=119.29.16.76
Sep 26 15:16:13 debian sshd\[14401\]: Failed password for invalid user ts from 119.29.16.76 port 64173 ssh2
...
2019-09-27 03:20:33
158.255.7.20 attack
Attempted connection from this IP address against phished account - blocked
2019-09-27 03:22:57
59.99.8.60 attack
445/tcp
[2019-09-26]1pkt
2019-09-27 03:17:23
193.194.69.99 attackspambots
Sep 26 08:17:05 lcprod sshd\[3057\]: Invalid user raph from 193.194.69.99
Sep 26 08:17:05 lcprod sshd\[3057\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=193.194.69.99
Sep 26 08:17:07 lcprod sshd\[3057\]: Failed password for invalid user raph from 193.194.69.99 port 60232 ssh2
Sep 26 08:21:08 lcprod sshd\[3415\]: Invalid user zxcloudsetup from 193.194.69.99
Sep 26 08:21:08 lcprod sshd\[3415\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=193.194.69.99
2019-09-27 02:52:53
201.108.51.47 attack
Unauthorized connection attempt from IP address 201.108.51.47 on Port 445(SMB)
2019-09-27 03:27:34
177.190.66.210 attackspambots
Honeypot attack, port: 23, PTR: PTR record not found
2019-09-27 03:23:57
115.79.215.240 attack
Unauthorized connection attempt from IP address 115.79.215.240 on Port 445(SMB)
2019-09-27 03:27:47
103.80.117.214 attack
Sep 26 14:34:01 [host] sshd[25975]: Invalid user gwool from 103.80.117.214
Sep 26 14:34:01 [host] sshd[25975]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.80.117.214
Sep 26 14:34:03 [host] sshd[25975]: Failed password for invalid user gwool from 103.80.117.214 port 38366 ssh2
2019-09-27 02:53:47

最近上报的IP列表

134.130.200.33 212.170.55.234 200.82.170.206 190.24.11.73
190.94.149.82 64.179.139.60 62.33.168.132 191.243.120.52
120.109.173.16 194.208.49.133 168.211.37.245 188.255.72.89
195.88.59.84 126.134.160.97 112.26.4.213 149.56.142.198
96.70.249.200 1.93.177.96 206.248.97.26 166.224.108.63