必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): None

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
IP 类型 评论内容 时间
103.206.103.72 attackspambots
Unauthorized connection attempt detected from IP address 103.206.103.72 to port 8080 [T]
2020-08-29 20:27:32
103.206.103.132 attackspambots
Unauthorized connection attempt detected from IP address 103.206.103.132 to port 80 [J]
2020-03-02 21:52:36
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 103.206.103.214
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 46500
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;103.206.103.214.		IN	A

;; AUTHORITY SECTION:
.			7	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022022601 1800 900 604800 86400

;; Query time: 82 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Feb 27 03:04:15 CST 2022
;; MSG SIZE  rcvd: 108
HOST信息:
214.103.206.103.in-addr.arpa domain name pointer axntech-dynamic-214.103.206.103.axntechnologies.in.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
214.103.206.103.in-addr.arpa	name = axntech-dynamic-214.103.206.103.axntechnologies.in.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
223.204.158.51 attackbotsspam
Mail/25/465/587-993/995 Probe, Reject, BadAuth, Hack, SPAM -
2019-11-07 05:31:09
89.91.242.140 attackspam
Port Scan: TCP/445
2019-11-07 05:34:32
118.24.82.81 attackspambots
Nov  6 15:54:39 hcbbdb sshd\[8129\]: Invalid user sambaserver from 118.24.82.81
Nov  6 15:54:39 hcbbdb sshd\[8129\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.24.82.81
Nov  6 15:54:41 hcbbdb sshd\[8129\]: Failed password for invalid user sambaserver from 118.24.82.81 port 47824 ssh2
Nov  6 16:00:05 hcbbdb sshd\[8684\]: Invalid user VVCyuanminghuiguan-11A from 118.24.82.81
Nov  6 16:00:05 hcbbdb sshd\[8684\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.24.82.81
2019-11-07 05:29:07
218.92.0.188 attackspam
Nov  6 17:05:29 pkdns2 sshd\[47926\]: Failed password for root from 218.92.0.188 port 49236 ssh2Nov  6 17:05:32 pkdns2 sshd\[47926\]: Failed password for root from 218.92.0.188 port 49236 ssh2Nov  6 17:05:51 pkdns2 sshd\[47928\]: Failed password for root from 218.92.0.188 port 6414 ssh2Nov  6 17:06:01 pkdns2 sshd\[47928\]: Failed password for root from 218.92.0.188 port 6414 ssh2Nov  6 17:06:03 pkdns2 sshd\[47928\]: Failed password for root from 218.92.0.188 port 6414 ssh2Nov  6 17:06:10 pkdns2 sshd\[47953\]: Failed password for root from 218.92.0.188 port 30981 ssh2
...
2019-11-07 05:21:38
118.70.217.142 attackbots
Nov  6 21:53:05 lcl-usvr-01 sshd[31404]: refused connect from 118.70.217.142 (118.70.217.142)
Nov  6 21:53:05 lcl-usvr-01 sshd[31405]: refused connect from 118.70.217.142 (118.70.217.142)
Nov  6 22:01:02 lcl-usvr-01 sshd[1185]: refused connect from 118.70.217.142 (118.70.217.142)
Nov  6 22:01:02 lcl-usvr-01 sshd[1186]: refused connect from 118.70.217.142 (118.70.217.142)
2019-11-07 05:52:20
185.175.93.103 attackspam
Portscan or hack attempt detected by psad/fwsnort
2019-11-07 05:55:07
178.159.100.190 attackspam
B: zzZZzz blocked content access
2019-11-07 05:22:25
93.34.159.7 attack
Nov  6 15:31:51 server postfix/smtpd[11563]: NOQUEUE: reject: RCPT from 93-34-159-7.ip50.fastwebnet.it[93.34.159.7]: 554 5.7.1 Service unavailable; Client host [93.34.159.7] blocked using zen.spamhaus.org; https://www.spamhaus.org/query/ip/93.34.159.7; from= to= proto=ESMTP helo=<93-34-159-7.ip50.fastwebnet.it>
2019-11-07 05:48:07
213.6.65.118 attackspambots
Unauthorized connection attempt from IP address 213.6.65.118 on Port 445(SMB)
2019-11-07 05:54:48
182.202.9.154 attackbotsspam
Nov  6 08:15:36 mailman postfix/smtpd[5515]: NOQUEUE: reject: RCPT from unknown[182.202.9.154]: 554 5.7.1 Service unavailable; Client host [182.202.9.154] blocked using sbl-xbl.spamhaus.org; https://www.spamhaus.org/query/ip/182.202.9.154; from= to= proto=ESMTP helo=<[182.202.9.154]>
Nov  6 08:32:20 mailman postfix/smtpd[5706]: NOQUEUE: reject: RCPT from unknown[182.202.9.154]: 554 5.7.1 Service unavailable; Client host [182.202.9.154] blocked using sbl-xbl.spamhaus.org; https://www.spamhaus.org/query/ip/182.202.9.154; from= to= proto=ESMTP helo=<[182.202.9.154]>
2019-11-07 05:23:06
14.161.14.159 attackspam
Unauthorized connection attempt from IP address 14.161.14.159 on Port 445(SMB)
2019-11-07 05:54:32
202.169.46.52 attack
Unauthorized connection attempt from IP address 202.169.46.52 on Port 445(SMB)
2019-11-07 05:51:10
139.59.5.179 attack
139.59.5.179 - - [06/Nov/2019:17:31:38 +0100] "GET /wp-login.php HTTP/1.1" 200 1238 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
139.59.5.179 - - [06/Nov/2019:17:31:45 +0100] "POST /wp-login.php HTTP/1.1" 200 1632 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
139.59.5.179 - - [06/Nov/2019:17:31:45 +0100] "GET /wp-login.php HTTP/1.1" 200 1238 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
139.59.5.179 - - [06/Nov/2019:17:31:46 +0100] "POST /wp-login.php HTTP/1.1" 200 1608 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
139.59.5.179 - - [06/Nov/2019:17:31:46 +0100] "GET /wp-login.php HTTP/1.1" 200 1238 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
139.59.5.179 - - [06/Nov/2019:17:31:47 +0100] "POST /wp-login.php HTTP/1.1" 200 1608 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
...
2019-11-07 05:27:32
1.22.172.66 attackspam
Unauthorized connection attempt from IP address 1.22.172.66 on Port 445(SMB)
2019-11-07 05:50:47
193.70.14.96 attackspambots
Lines containing failures of 193.70.14.96
Nov  5 01:35:37 shared07 sshd[11972]: Did not receive identification string from 193.70.14.96 port 33610
Nov  5 01:35:37 shared07 sshd[11973]: Did not receive identification string from 193.70.14.96 port 58352
Nov  5 01:38:27 shared07 sshd[13177]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=193.70.14.96  user=daemon
Nov  5 01:38:30 shared07 sshd[13177]: Failed password for daemon from 193.70.14.96 port 46178 ssh2
Nov  5 01:38:30 shared07 sshd[13177]: Received disconnect from 193.70.14.96 port 46178:11: Normal Shutdown, Thank you for playing [preauth]
Nov  5 01:38:30 shared07 sshd[13177]: Disconnected from authenticating user daemon 193.70.14.96 port 46178 [preauth]
Nov  5 01:38:31 shared07 sshd[13185]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=193.70.14.96  user=bin


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=193.70.14.96
2019-11-07 05:28:05

最近上报的IP列表

103.206.103.218 103.206.103.224 103.206.103.232 103.206.103.22
103.206.103.228 103.206.103.234 103.206.103.220 103.206.103.227
103.206.118.169 103.206.103.216 103.206.118.170 103.206.118.179
103.206.118.176 103.206.118.180 103.206.118.184 103.206.118.186
103.206.118.189 103.206.118.19 103.206.118.190 103.206.118.182