必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): United States

运营商(isp): Verizon

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 97.44.14.138
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 49768
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;97.44.14.138.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025021300 1800 900 604800 86400

;; Query time: 15 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Feb 13 19:48:40 CST 2025
;; MSG SIZE  rcvd: 105
HOST信息:
138.14.44.97.in-addr.arpa domain name pointer 138.sub-97-44-14.myvzw.com.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
138.14.44.97.in-addr.arpa	name = 138.sub-97-44-14.myvzw.com.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
171.25.193.25 attack
Aug 16 14:53:57 server sshd\[56286\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=171.25.193.25  user=root
Aug 16 14:53:59 server sshd\[56286\]: Failed password for root from 171.25.193.25 port 15030 ssh2
Aug 16 14:54:01 server sshd\[56286\]: Failed password for root from 171.25.193.25 port 15030 ssh2
...
2019-10-09 12:15:33
172.105.201.62 attackspambots
Aug 12 14:41:43 server sshd\[90487\]: Invalid user uftp from 172.105.201.62
Aug 12 14:41:43 server sshd\[90487\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=172.105.201.62
Aug 12 14:41:45 server sshd\[90487\]: Failed password for invalid user uftp from 172.105.201.62 port 56016 ssh2
...
2019-10-09 12:10:05
157.157.77.168 attack
Oct  9 06:14:05 markkoudstaal sshd[13070]: Failed password for root from 157.157.77.168 port 65164 ssh2
Oct  9 06:18:01 markkoudstaal sshd[13395]: Failed password for root from 157.157.77.168 port 62921 ssh2
2019-10-09 12:23:47
49.88.112.90 attackbots
Oct  9 06:13:14 MK-Soft-Root2 sshd[8440]: Failed password for root from 49.88.112.90 port 46569 ssh2
Oct  9 06:13:16 MK-Soft-Root2 sshd[8440]: Failed password for root from 49.88.112.90 port 46569 ssh2
...
2019-10-09 12:18:28
171.223.209.166 attackbotsspam
Aug 13 03:06:57 server sshd\[229060\]: Invalid user yeti from 171.223.209.166
Aug 13 03:06:57 server sshd\[229060\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=171.223.209.166
Aug 13 03:06:59 server sshd\[229060\]: Failed password for invalid user yeti from 171.223.209.166 port 2382 ssh2
...
2019-10-09 12:29:10
170.239.84.215 attackbotsspam
Apr 17 08:20:21 server sshd\[96657\]: Invalid user www from 170.239.84.215
Apr 17 08:20:21 server sshd\[96657\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=170.239.84.215
Apr 17 08:20:24 server sshd\[96657\]: Failed password for invalid user www from 170.239.84.215 port 51164 ssh2
...
2019-10-09 12:48:26
170.239.86.115 attackbotsspam
Apr 17 08:07:53 server sshd\[96304\]: Invalid user student from 170.239.86.115
Apr 17 08:07:53 server sshd\[96304\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=170.239.86.115
Apr 17 08:07:56 server sshd\[96304\]: Failed password for invalid user student from 170.239.86.115 port 44598 ssh2
...
2019-10-09 12:43:40
171.212.137.140 attackspam
Jun 24 02:47:47 server sshd\[57152\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=171.212.137.140  user=root
Jun 24 02:47:49 server sshd\[57152\]: Failed password for root from 171.212.137.140 port 59480 ssh2
Jun 24 02:48:02 server sshd\[57152\]: Failed password for root from 171.212.137.140 port 59480 ssh2
...
2019-10-09 12:31:50
171.8.199.77 attackspam
May 31 19:33:31 server sshd\[226261\]: Invalid user idynamic from 171.8.199.77
May 31 19:33:31 server sshd\[226261\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=171.8.199.77
May 31 19:33:32 server sshd\[226261\]: Failed password for invalid user idynamic from 171.8.199.77 port 38104 ssh2
...
2019-10-09 12:11:22
52.231.153.23 attack
Oct  9 05:57:18 ks10 sshd[9833]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=52.231.153.23 
Oct  9 05:57:20 ks10 sshd[9833]: Failed password for invalid user applmgr from 52.231.153.23 port 48060 ssh2
...
2019-10-09 12:22:43
170.80.225.115 attack
Jul 18 08:44:55 server sshd\[193457\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=170.80.225.115  user=root
Jul 18 08:44:58 server sshd\[193457\]: Failed password for root from 170.80.225.115 port 54627 ssh2
Jul 18 08:45:00 server sshd\[193457\]: Failed password for root from 170.80.225.115 port 54627 ssh2
...
2019-10-09 12:40:11
185.101.69.177 attackbots
B: Magento admin pass test (wrong country)
2019-10-09 12:32:40
188.131.135.245 attackbots
Oct  8 18:27:21 friendsofhawaii sshd\[31335\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.131.135.245  user=root
Oct  8 18:27:23 friendsofhawaii sshd\[31335\]: Failed password for root from 188.131.135.245 port 49344 ssh2
Oct  8 18:31:15 friendsofhawaii sshd\[31661\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.131.135.245  user=root
Oct  8 18:31:17 friendsofhawaii sshd\[31661\]: Failed password for root from 188.131.135.245 port 19393 ssh2
Oct  8 18:35:01 friendsofhawaii sshd\[31950\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.131.135.245  user=root
2019-10-09 12:36:51
171.244.49.128 attackbots
May  5 04:11:50 server sshd\[106072\]: Invalid user jonathan from 171.244.49.128
May  5 04:11:50 server sshd\[106072\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=171.244.49.128
May  5 04:11:52 server sshd\[106072\]: Failed password for invalid user jonathan from 171.244.49.128 port 30520 ssh2
...
2019-10-09 12:21:20
171.103.43.70 attack
Aug  1 15:11:40 server sshd\[86120\]: Invalid user admin from 171.103.43.70
Aug  1 15:11:40 server sshd\[86120\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=171.103.43.70
Aug  1 15:11:42 server sshd\[86120\]: Failed password for invalid user admin from 171.103.43.70 port 32956 ssh2
...
2019-10-09 12:32:54

最近上报的IP列表

208.121.111.9 185.177.24.176 204.223.139.95 160.160.96.222
99.31.78.26 239.106.70.159 222.146.43.167 69.224.120.192
205.243.88.167 231.179.211.19 156.58.157.12 101.170.105.60
215.230.161.73 12.219.16.38 141.247.79.93 228.98.212.160
46.122.81.238 144.13.200.86 83.237.40.22 240.90.96.49