必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): Dien Ban

省份(region): Tinh Quang Nam

国家(country): Vietnam

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 116.105.220.213
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 58008
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;116.105.220.213.		IN	A

;; AUTHORITY SECTION:
.			418	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022061102 1800 900 604800 86400

;; Query time: 25 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Jun 12 08:47:04 CST 2022
;; MSG SIZE  rcvd: 108
HOST信息:
213.220.105.116.in-addr.arpa has no PTR record
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
*** Can't find 213.220.105.116.in-addr.arpa.: No answer

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
119.63.74.25 attack
port scan and connect, tcp 1433 (ms-sql-s)
2019-12-15 06:49:03
121.18.166.70 attack
Dec 15 00:02:27 localhost sshd\[15533\]: Invalid user nagarajan from 121.18.166.70
Dec 15 00:02:27 localhost sshd\[15533\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.18.166.70
Dec 15 00:02:29 localhost sshd\[15533\]: Failed password for invalid user nagarajan from 121.18.166.70 port 19398 ssh2
Dec 15 00:07:38 localhost sshd\[15760\]: Invalid user es from 121.18.166.70
Dec 15 00:07:38 localhost sshd\[15760\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.18.166.70
...
2019-12-15 07:19:04
104.168.250.71 attackbots
Dec 14 12:47:48 eddieflores sshd\[7140\]: Invalid user temp from 104.168.250.71
Dec 14 12:47:48 eddieflores sshd\[7140\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=hwsrv-563046.hostwindsdns.com
Dec 14 12:47:50 eddieflores sshd\[7140\]: Failed password for invalid user temp from 104.168.250.71 port 52658 ssh2
Dec 14 12:54:31 eddieflores sshd\[7769\]: Invalid user pomplun from 104.168.250.71
Dec 14 12:54:31 eddieflores sshd\[7769\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=hwsrv-563046.hostwindsdns.com
2019-12-15 07:04:34
106.13.146.93 attack
Dec 14 23:46:29 legacy sshd[28451]: Failed password for root from 106.13.146.93 port 56906 ssh2
Dec 14 23:52:14 legacy sshd[28812]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.146.93
Dec 14 23:52:16 legacy sshd[28812]: Failed password for invalid user akane from 106.13.146.93 port 53910 ssh2
...
2019-12-15 06:57:45
138.197.21.218 attackbotsspam
Dec 14 22:46:59 game-panel sshd[17104]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.197.21.218
Dec 14 22:47:01 game-panel sshd[17104]: Failed password for invalid user banan from 138.197.21.218 port 38964 ssh2
Dec 14 22:52:10 game-panel sshd[17412]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.197.21.218
2019-12-15 07:07:13
190.14.57.81 attackbotsspam
Unauthorized connection attempt detected from IP address 190.14.57.81 to port 445
2019-12-15 06:53:33
74.63.250.6 attackspam
Dec 14 12:18:43 kapalua sshd\[3922\]: Invalid user niquette from 74.63.250.6
Dec 14 12:18:43 kapalua sshd\[3922\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=74.63.250.6
Dec 14 12:18:45 kapalua sshd\[3922\]: Failed password for invalid user niquette from 74.63.250.6 port 60046 ssh2
Dec 14 12:23:54 kapalua sshd\[4498\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=74.63.250.6  user=backup
Dec 14 12:23:56 kapalua sshd\[4498\]: Failed password for backup from 74.63.250.6 port 39078 ssh2
2019-12-15 06:52:08
200.70.56.204 attack
Dec 14 20:38:25 legacy sshd[18361]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=200.70.56.204
Dec 14 20:38:27 legacy sshd[18361]: Failed password for invalid user galois from 200.70.56.204 port 39220 ssh2
Dec 14 20:46:35 legacy sshd[18738]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=200.70.56.204
...
2019-12-15 06:44:32
106.13.141.135 attack
Dec 14 13:00:11 web9 sshd\[12406\]: Invalid user ncim from 106.13.141.135
Dec 14 13:00:11 web9 sshd\[12406\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.141.135
Dec 14 13:00:13 web9 sshd\[12406\]: Failed password for invalid user ncim from 106.13.141.135 port 55964 ssh2
Dec 14 13:05:56 web9 sshd\[13236\]: Invalid user smmsp from 106.13.141.135
Dec 14 13:05:56 web9 sshd\[13236\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.141.135
2019-12-15 07:17:39
179.181.109.10 attack
Honeypot attack, port: 23, PTR: 179.181.109.10.dynamic.adsl.gvt.net.br.
2019-12-15 07:06:32
218.92.0.173 attack
Dec 14 23:52:40 meumeu sshd[13934]: Failed password for root from 218.92.0.173 port 3877 ssh2
Dec 14 23:52:56 meumeu sshd[13934]: error: maximum authentication attempts exceeded for root from 218.92.0.173 port 3877 ssh2 [preauth]
Dec 14 23:53:03 meumeu sshd[13986]: Failed password for root from 218.92.0.173 port 43700 ssh2
...
2019-12-15 06:56:16
77.42.74.154 attackspambots
1576363935 - 12/14/2019 23:52:15 Host: 77.42.74.154/77.42.74.154 Port: 8080 TCP Blocked
2019-12-15 06:58:57
110.49.70.242 attackbots
SSH invalid-user multiple login attempts
2019-12-15 06:55:19
106.13.99.221 attackspambots
Dec 14 12:47:12 eddieflores sshd\[7110\]: Invalid user vl from 106.13.99.221
Dec 14 12:47:12 eddieflores sshd\[7110\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.99.221
Dec 14 12:47:14 eddieflores sshd\[7110\]: Failed password for invalid user vl from 106.13.99.221 port 43288 ssh2
Dec 14 12:52:08 eddieflores sshd\[7531\]: Invalid user iitd from 106.13.99.221
Dec 14 12:52:08 eddieflores sshd\[7531\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.99.221
2019-12-15 07:08:20
185.50.198.121 attackspambots
Automatic report - XMLRPC Attack
2019-12-15 07:10:13

最近上报的IP列表

5.167.66.79 45.70.14.58 185.158.175.6 124.223.35.208
5.167.70.189 5.167.70.207 5.167.70.210 43.134.205.252
192.241.220.48 137.226.7.21 138.3.253.123 137.226.4.225
5.167.68.196 5.167.68.193 138.124.183.5 5.167.68.225
221.187.50.180 137.226.5.19 5.167.68.249 5.167.69.4