必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): None

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 99.220.252.14
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 1879
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;99.220.252.14.			IN	A

;; AUTHORITY SECTION:
.			29	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025021901 1800 900 604800 86400

;; Query time: 64 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Feb 20 03:55:49 CST 2025
;; MSG SIZE  rcvd: 106
HOST信息:
Host 14.252.220.99.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 14.252.220.99.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
134.209.108.30 attack
Nov  3 10:19:29 foo sshd[23529]: Invalid user Oyster from 134.209.108.30
Nov  3 10:19:29 foo sshd[23529]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.209.108.30 
Nov  3 10:19:32 foo sshd[23529]: Failed password for invalid user Oyster from 134.209.108.30 port 50038 ssh2
Nov  3 10:19:32 foo sshd[23529]: Received disconnect from 134.209.108.30: 11: Bye Bye [preauth]
Nov  3 10:33:06 foo sshd[23752]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.209.108.30  user=r.r
Nov  3 10:33:08 foo sshd[23752]: Failed password for r.r from 134.209.108.30 port 51916 ssh2
Nov  3 10:33:09 foo sshd[23752]: Received disconnect from 134.209.108.30: 11: Bye Bye [preauth]
Nov  3 10:37:28 foo sshd[23916]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.209.108.30  user=r.r
Nov  3 10:37:30 foo sshd[23916]: Failed password for r.r from 134.209.108.30 port 34638 ........
-------------------------------
2019-11-07 16:52:10
180.101.227.173 attackbots
2019-11-07T08:41:15.593229abusebot-7.cloudsearch.cf sshd\[25486\]: Invalid user bat1323 from 180.101.227.173 port 50708
2019-11-07 17:05:11
185.2.31.10 attack
Nov  7 08:07:18 v22018076622670303 sshd\[26995\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=185.2.31.10  user=root
Nov  7 08:07:21 v22018076622670303 sshd\[26995\]: Failed password for root from 185.2.31.10 port 42474 ssh2
Nov  7 08:10:52 v22018076622670303 sshd\[27041\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=185.2.31.10  user=root
...
2019-11-07 17:02:06
62.234.145.195 attackbotsspam
Nov  5 07:51:37 mx01 sshd[4581]: Invalid user test from 62.234.145.195
Nov  5 07:51:37 mx01 sshd[4581]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=62.234.145.195 
Nov  5 07:51:39 mx01 sshd[4581]: Failed password for invalid user test from 62.234.145.195 port 47030 ssh2
Nov  5 07:51:39 mx01 sshd[4581]: Received disconnect from 62.234.145.195: 11: Bye Bye [preauth]
Nov  5 08:01:26 mx01 sshd[5717]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=62.234.145.195  user=r.r
Nov  5 08:01:28 mx01 sshd[5717]: Failed password for r.r from 62.234.145.195 port 46968 ssh2
Nov  5 08:01:28 mx01 sshd[5717]: Received disconnect from 62.234.145.195: 11: Bye Bye [preauth]
Nov  5 08:07:19 mx01 sshd[6296]: Invalid user io from 62.234.145.195
Nov  5 08:07:19 mx01 sshd[6296]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=62.234.145.195 
Nov  5 08:07:21 mx01 sshd[6296]:........
-------------------------------
2019-11-07 17:10:15
223.223.188.226 attackspambots
Nov  7 06:55:33 server6 sshd[15469]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=223.223.188.226  user=r.r
Nov  7 06:55:35 server6 sshd[15469]: Failed password for r.r from 223.223.188.226 port 57238 ssh2
Nov  7 06:55:35 server6 sshd[15469]: Received disconnect from 223.223.188.226: 11: Bye Bye [preauth]
Nov  7 07:14:19 server6 sshd[30709]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=223.223.188.226  user=r.r
Nov  7 07:14:21 server6 sshd[30709]: Failed password for r.r from 223.223.188.226 port 48913 ssh2
Nov  7 07:14:22 server6 sshd[30709]: Received disconnect from 223.223.188.226: 11: Bye Bye [preauth]
Nov  7 07:19:44 server6 sshd[2484]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=223.223.188.226  user=r.r
Nov  7 07:19:46 server6 sshd[2484]: Failed password for r.r from 223.223.188.226 port 39988 ssh2
Nov  7 07:19:46 server6 sshd[2484]: R........
-------------------------------
2019-11-07 17:19:48
37.105.161.162 attack
Trying to (more than 3 packets) bruteforce (not open) Samba/Microsoft-DS port 445
2019-11-07 17:33:26
49.88.112.77 attackbots
Nov  7 11:06:01 pkdns2 sshd\[25098\]: Failed password for root from 49.88.112.77 port 45879 ssh2Nov  7 11:06:03 pkdns2 sshd\[25098\]: Failed password for root from 49.88.112.77 port 45879 ssh2Nov  7 11:06:05 pkdns2 sshd\[25098\]: Failed password for root from 49.88.112.77 port 45879 ssh2Nov  7 11:08:10 pkdns2 sshd\[25174\]: Failed password for root from 49.88.112.77 port 36897 ssh2Nov  7 11:09:43 pkdns2 sshd\[25236\]: Failed password for root from 49.88.112.77 port 34854 ssh2Nov  7 11:10:20 pkdns2 sshd\[25308\]: Failed password for root from 49.88.112.77 port 47125 ssh2
...
2019-11-07 17:26:19
92.222.181.159 attackspambots
Nov  7 10:14:52 localhost sshd\[16577\]: Invalid user gamma123 from 92.222.181.159 port 35894
Nov  7 10:14:52 localhost sshd\[16577\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=92.222.181.159
Nov  7 10:14:54 localhost sshd\[16577\]: Failed password for invalid user gamma123 from 92.222.181.159 port 35894 ssh2
2019-11-07 17:20:54
103.94.2.154 attackbots
Nov  7 10:48:45 vtv3 sshd\[10454\]: Invalid user 887 from 103.94.2.154 port 50131
Nov  7 10:48:45 vtv3 sshd\[10454\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.94.2.154
Nov  7 10:48:48 vtv3 sshd\[10454\]: Failed password for invalid user 887 from 103.94.2.154 port 50131 ssh2
Nov  7 10:54:11 vtv3 sshd\[13884\]: Invalid user provider from 103.94.2.154 port 41682
Nov  7 10:54:11 vtv3 sshd\[13884\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.94.2.154
Nov  7 11:04:44 vtv3 sshd\[21009\]: Invalid user monkey from 103.94.2.154 port 53018
Nov  7 11:04:44 vtv3 sshd\[21009\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.94.2.154
Nov  7 11:04:46 vtv3 sshd\[21009\]: Failed password for invalid user monkey from 103.94.2.154 port 53018 ssh2
Nov  7 11:09:57 vtv3 sshd\[24487\]: Invalid user HUAWEI@123 from 103.94.2.154 port 44587
Nov  7 11:09:57 vtv3 sshd\[24487\]: pam_unix
2019-11-07 17:05:53
185.184.24.33 attackbots
Nov  6 22:54:45 web9 sshd\[1368\]: Invalid user ervin from 185.184.24.33
Nov  6 22:54:45 web9 sshd\[1368\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=185.184.24.33
Nov  6 22:54:47 web9 sshd\[1368\]: Failed password for invalid user ervin from 185.184.24.33 port 39642 ssh2
Nov  6 23:00:28 web9 sshd\[2177\]: Invalid user tari from 185.184.24.33
Nov  6 23:00:28 web9 sshd\[2177\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=185.184.24.33
2019-11-07 17:14:58
59.44.201.86 attackspambots
2019-11-07T08:44:49.456693abusebot-5.cloudsearch.cf sshd\[17745\]: Invalid user guest from 59.44.201.86 port 56633
2019-11-07 17:02:48
51.75.66.11 attackbots
Nov  7 07:45:44 SilenceServices sshd[3277]: Failed password for root from 51.75.66.11 port 39042 ssh2
Nov  7 07:49:26 SilenceServices sshd[4360]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.75.66.11
Nov  7 07:49:29 SilenceServices sshd[4360]: Failed password for invalid user web2 from 51.75.66.11 port 48682 ssh2
2019-11-07 17:13:15
189.123.234.183 attack
IP Ban Report :  
 https://help-dysk.pl/wordpress-firewall-plugins/ip/189.123.234.183/ 
 
 BR - 1H : (291)  
 Protection Against DDoS WordPress plugin :  
 "odzyskiwanie danych help-dysk" 
 IP Address Ranges by Country : BR 
 NAME ASN : ASN28573 
 
 IP : 189.123.234.183 
 
 CIDR : 189.123.192.0/18 
 
 PREFIX COUNT : 1254 
 
 UNIQUE IP COUNT : 9653760 
 
 
 ATTACKS DETECTED ASN28573 :  
  1H - 1 
  3H - 3 
  6H - 7 
 12H - 21 
 24H - 27 
 
 DateTime : 2019-11-07 07:27:15 
 
 INFO : Port Scan TELNET Detected and Blocked by ADMIN  - data recovery
2019-11-07 17:07:01
196.29.99.2 attackbots
2019-11-07T07:26:09.013176struts4.enskede.local sshd\[15798\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=196.29.99.2  user=root
2019-11-07T07:26:12.066802struts4.enskede.local sshd\[15798\]: Failed password for root from 196.29.99.2 port 42852 ssh2
2019-11-07T07:26:13.947130struts4.enskede.local sshd\[15801\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=196.29.99.2  user=root
2019-11-07T07:26:16.533608struts4.enskede.local sshd\[15801\]: Failed password for root from 196.29.99.2 port 44452 ssh2
2019-11-07T07:26:18.382036struts4.enskede.local sshd\[15804\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=196.29.99.2  user=root
...
2019-11-07 17:14:11
78.128.113.120 attack
Nov  7 08:53:34 heicom postfix/smtpd\[5915\]: warning: unknown\[78.128.113.120\]: SASL PLAIN authentication failed: authentication failure
Nov  7 08:53:35 heicom postfix/smtpd\[5146\]: warning: unknown\[78.128.113.120\]: SASL PLAIN authentication failed: authentication failure
Nov  7 08:55:07 heicom postfix/smtpd\[5915\]: warning: unknown\[78.128.113.120\]: SASL PLAIN authentication failed: authentication failure
Nov  7 08:55:09 heicom postfix/smtpd\[5146\]: warning: unknown\[78.128.113.120\]: SASL PLAIN authentication failed: authentication failure
Nov  7 09:18:05 heicom postfix/smtpd\[5915\]: warning: unknown\[78.128.113.120\]: SASL PLAIN authentication failed: authentication failure
...
2019-11-07 17:21:28

最近上报的IP列表

47.177.167.32 2.14.135.43 224.233.20.234 194.211.232.136
185.124.116.143 143.149.112.232 7.141.189.9 157.29.142.199
127.101.240.251 224.242.237.66 71.250.91.48 192.204.234.183
52.55.149.63 4.251.41.93 143.194.39.224 185.54.171.56
187.186.193.69 72.47.72.227 228.60.57.45 205.3.180.86