必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): Shanghai

省份(region): Shanghai

国家(country): China

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 1.94.21.216
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 5180
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;1.94.21.216.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025061702 1800 900 604800 86400

;; Query time: 37 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Jun 18 10:53:58 CST 2025
;; MSG SIZE  rcvd: 104
HOST信息:
216.21.94.1.in-addr.arpa domain name pointer ecs-1-94-21-216.compute.hwclouds-dns.com.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
216.21.94.1.in-addr.arpa	name = ecs-1-94-21-216.compute.hwclouds-dns.com.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
167.71.162.245 attackspam
[munged]::443 167.71.162.245 - - [01/Dec/2019:23:06:46 +0100] "POST /[munged]: HTTP/1.1" 200 9082 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
[munged]::443 167.71.162.245 - - [01/Dec/2019:23:06:57 +0100] "POST /[munged]: HTTP/1.1" 200 9082 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
[munged]::443 167.71.162.245 - - [01/Dec/2019:23:06:57 +0100] "POST /[munged]: HTTP/1.1" 200 9082 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
2019-12-02 06:24:42
106.13.62.26 attack
Dec  1 22:52:29 Ubuntu-1404-trusty-64-minimal sshd\[28131\]: Invalid user howlet from 106.13.62.26
Dec  1 22:52:29 Ubuntu-1404-trusty-64-minimal sshd\[28131\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.62.26
Dec  1 22:52:31 Ubuntu-1404-trusty-64-minimal sshd\[28131\]: Failed password for invalid user howlet from 106.13.62.26 port 48830 ssh2
Dec  1 23:06:37 Ubuntu-1404-trusty-64-minimal sshd\[7911\]: Invalid user chijoke from 106.13.62.26
Dec  1 23:06:37 Ubuntu-1404-trusty-64-minimal sshd\[7911\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.62.26
2019-12-02 06:22:45
183.156.231.36 attackspam
Unauthorised access (Dec  1) SRC=183.156.231.36 LEN=44 TTL=240 ID=23840 TCP DPT=1433 WINDOW=1024 SYN
2019-12-02 05:55:00
218.92.0.204 attack
Dec  1 22:01:03 zeus sshd[30149]: Failed password for root from 218.92.0.204 port 47946 ssh2
Dec  1 22:01:07 zeus sshd[30149]: Failed password for root from 218.92.0.204 port 47946 ssh2
Dec  1 22:01:11 zeus sshd[30149]: Failed password for root from 218.92.0.204 port 47946 ssh2
Dec  1 22:02:27 zeus sshd[30174]: Failed password for root from 218.92.0.204 port 34118 ssh2
2019-12-02 06:22:15
1.52.46.118 attack
Automatic report - Port Scan Attack
2019-12-02 05:57:03
177.128.233.123 attack
port scan and connect, tcp 23 (telnet)
2019-12-02 05:50:31
119.98.248.211 attack
Telnet/23 MH Probe, BF, Hack -
2019-12-02 06:25:52
139.155.118.138 attackspambots
Dec  1 15:33:24 jane sshd[15425]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.155.118.138 
Dec  1 15:33:26 jane sshd[15425]: Failed password for invalid user einarsson from 139.155.118.138 port 33974 ssh2
...
2019-12-02 06:27:31
106.13.123.29 attackspam
Dec  1 17:38:04 vmanager6029 sshd\[24503\]: Invalid user testman from 106.13.123.29 port 54976
Dec  1 17:38:04 vmanager6029 sshd\[24503\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.123.29
Dec  1 17:38:06 vmanager6029 sshd\[24503\]: Failed password for invalid user testman from 106.13.123.29 port 54976 ssh2
2019-12-02 06:28:10
94.191.58.157 attackbots
Fail2Ban - SSH Bruteforce Attempt
2019-12-02 05:57:55
182.61.36.38 attackbotsspam
Dec  1 22:28:29 vps666546 sshd\[9238\]: Invalid user viduya from 182.61.36.38 port 59786
Dec  1 22:28:29 vps666546 sshd\[9238\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.61.36.38
Dec  1 22:28:32 vps666546 sshd\[9238\]: Failed password for invalid user viduya from 182.61.36.38 port 59786 ssh2
Dec  1 22:34:28 vps666546 sshd\[9483\]: Invalid user myhrvold from 182.61.36.38 port 39810
Dec  1 22:34:28 vps666546 sshd\[9483\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.61.36.38
...
2019-12-02 05:55:51
141.98.80.176 attack
Portscan or hack attempt detected by psad/fwsnort
2019-12-02 06:10:41
183.150.139.62 attackbots
WordPress brute force
2019-12-02 06:24:27
51.77.212.124 attackbotsspam
Dec  1 18:25:54 MainVPS sshd[28507]: Invalid user mo from 51.77.212.124 port 41571
Dec  1 18:25:54 MainVPS sshd[28507]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.77.212.124
Dec  1 18:25:54 MainVPS sshd[28507]: Invalid user mo from 51.77.212.124 port 41571
Dec  1 18:25:56 MainVPS sshd[28507]: Failed password for invalid user mo from 51.77.212.124 port 41571 ssh2
Dec  1 18:30:11 MainVPS sshd[3729]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.77.212.124  user=root
Dec  1 18:30:13 MainVPS sshd[3729]: Failed password for root from 51.77.212.124 port 59144 ssh2
...
2019-12-02 06:20:55
123.207.142.31 attack
SSH bruteforce
2019-12-02 06:27:48

最近上报的IP列表

64.62.156.205 47.109.184.9 64.62.156.206 45.156.129.61
198.235.24.176 143.198.155.199 103.197.28.27 103.167.141.122
39.151.66.255 64.62.156.202 44.244.16.88 185.247.137.164
20.84.145.84 122.195.76.37 185.45.15.198 104.234.115.249
38.161.140.151 5.113.110.216 81.182.116.104 58.200.123.75