必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): Korea Republic of

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 1.214.192.219
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 62874
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;1.214.192.219.			IN	A

;; AUTHORITY SECTION:
.			207	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022092401 1800 900 604800 86400

;; Query time: 20 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Sep 25 07:32:43 CST 2022
;; MSG SIZE  rcvd: 106
HOST信息:
Host 219.192.214.1.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 219.192.214.1.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
152.32.161.246 attackbots
Nov  8 15:33:59 nextcloud sshd\[27874\]: Invalid user bestfriend from 152.32.161.246
Nov  8 15:33:59 nextcloud sshd\[27874\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=152.32.161.246
Nov  8 15:34:01 nextcloud sshd\[27874\]: Failed password for invalid user bestfriend from 152.32.161.246 port 52924 ssh2
...
2019-11-09 03:45:40
192.241.185.120 attack
Nov  8 16:15:58 dedicated sshd[17309]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=192.241.185.120  user=root
Nov  8 16:16:00 dedicated sshd[17309]: Failed password for root from 192.241.185.120 port 42111 ssh2
2019-11-09 04:06:54
115.114.111.94 attackbots
failed root login
2019-11-09 03:52:48
2409:4052:230c:3b2:e040:1dc5:cbd3:3e65 attackspambots
LGS,WP GET /wp-login.php
2019-11-09 04:11:03
218.92.0.161 attack
Nov  8 15:32:43 icinga sshd[29628]: Failed password for root from 218.92.0.161 port 60545 ssh2
Nov  8 15:32:46 icinga sshd[29628]: Failed password for root from 218.92.0.161 port 60545 ssh2
Nov  8 15:32:52 icinga sshd[29628]: Failed password for root from 218.92.0.161 port 60545 ssh2
Nov  8 15:32:57 icinga sshd[29628]: Failed password for root from 218.92.0.161 port 60545 ssh2
...
2019-11-09 04:22:22
200.164.217.210 attackspam
Nov  8 00:25:43 ast sshd[20190]: Invalid user brianboo from 200.164.217.210 port 35920
Nov  8 06:35:36 ast sshd[20743]: Invalid user oracle from 200.164.217.210 port 33472
Nov  8 12:46:33 ast sshd[21467]: Invalid user linux from 200.164.217.210 port 43263
...
2019-11-09 04:08:57
72.139.76.218 attackbots
Caught in portsentry honeypot
2019-11-09 04:20:06
51.255.86.223 attack
Nov  8 20:55:03 mail postfix/smtpd[11300]: warning: unknown[51.255.86.223]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Nov  8 20:55:03 mail postfix/smtpd[13137]: warning: unknown[51.255.86.223]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Nov  8 20:55:03 mail postfix/smtpd[12935]: warning: unknown[51.255.86.223]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
2019-11-09 04:16:11
137.74.158.143 attack
Automatic report - XMLRPC Attack
2019-11-09 03:57:18
176.52.96.64 attackspambots
Chat Spam
2019-11-09 03:45:18
41.90.105.94 attackbotsspam
Brute force attempt
2019-11-09 03:46:02
186.144.72.32 attackspambots
Brute force attempt
2019-11-09 04:13:51
123.110.117.246 attackbotsspam
Telnet Server BruteForce Attack
2019-11-09 03:50:57
106.12.11.160 attackbotsspam
Nov  8 05:08:40 tdfoods sshd\[3438\]: Invalid user pian from 106.12.11.160
Nov  8 05:08:40 tdfoods sshd\[3438\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.11.160
Nov  8 05:08:41 tdfoods sshd\[3438\]: Failed password for invalid user pian from 106.12.11.160 port 40752 ssh2
Nov  8 05:14:26 tdfoods sshd\[3995\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.11.160  user=root
Nov  8 05:14:28 tdfoods sshd\[3995\]: Failed password for root from 106.12.11.160 port 50422 ssh2
2019-11-09 03:51:17
94.51.77.209 attack
Chat Spam
2019-11-09 03:55:49

最近上报的IP列表

1.213.22.23 1.212.150.143 1.213.213.228 1.212.204.155
1.212.82.180 1.214.16.156 1.213.186.128 1.212.243.23
1.214.171.234 1.213.25.30 1.212.20.199 1.213.210.185
1.213.100.151 1.214.190.21 1.212.83.9 1.212.153.214
1.212.224.29 1.212.26.32 1.213.181.199 1.213.104.36