必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): None

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 116.58.249.214
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 55039
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;116.58.249.214.			IN	A

;; AUTHORITY SECTION:
.			406	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022030400 1800 900 604800 86400

;; Query time: 25 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Mar 05 05:10:25 CST 2022
;; MSG SIZE  rcvd: 107
HOST信息:
Host 214.249.58.116.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 214.249.58.116.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
139.198.191.217 attackbots
Jul 12 08:37:16 tux-35-217 sshd\[354\]: Invalid user webler from 139.198.191.217 port 45144
Jul 12 08:37:16 tux-35-217 sshd\[354\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.198.191.217
Jul 12 08:37:18 tux-35-217 sshd\[354\]: Failed password for invalid user webler from 139.198.191.217 port 45144 ssh2
Jul 12 08:42:16 tux-35-217 sshd\[444\]: Invalid user rameez from 139.198.191.217 port 60334
Jul 12 08:42:16 tux-35-217 sshd\[444\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.198.191.217
...
2019-07-12 15:26:15
112.198.194.243 attackspam
Jul 12 01:58:55 aat-srv002 sshd[3745]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.198.194.243
Jul 12 01:58:57 aat-srv002 sshd[3745]: Failed password for invalid user www from 112.198.194.243 port 34251 ssh2
Jul 12 02:05:21 aat-srv002 sshd[3968]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.198.194.243
Jul 12 02:05:23 aat-srv002 sshd[3968]: Failed password for invalid user tushar from 112.198.194.243 port 63386 ssh2
...
2019-07-12 15:27:56
103.101.156.18 attackspam
Jul 12 03:35:07 vps200512 sshd\[10998\]: Invalid user jay from 103.101.156.18
Jul 12 03:35:07 vps200512 sshd\[10998\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.101.156.18
Jul 12 03:35:09 vps200512 sshd\[10998\]: Failed password for invalid user jay from 103.101.156.18 port 35278 ssh2
Jul 12 03:41:30 vps200512 sshd\[11230\]: Invalid user caj from 103.101.156.18
Jul 12 03:41:30 vps200512 sshd\[11230\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.101.156.18
2019-07-12 15:56:37
14.63.118.249 attack
Lines containing failures of 14.63.118.249
Jul 12 03:23:31 shared12 sshd[21533]: Bad protocol version identification '' from 14.63.118.249 port 57406
Jul 12 03:23:38 shared12 sshd[21534]: Invalid user osboxes from 14.63.118.249 port 58140
Jul 12 03:23:39 shared12 sshd[21534]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=14.63.118.249
Jul 12 03:23:41 shared12 sshd[21534]: Failed password for invalid user osboxes from 14.63.118.249 port 58140 ssh2
Jul 12 03:23:42 shared12 sshd[21534]: Connection closed by invalid user osboxes 14.63.118.249 port 58140 [preauth]


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=14.63.118.249
2019-07-12 15:22:01
137.74.199.177 attackspambots
Jul 12 08:00:23 MK-Soft-VM5 sshd\[22452\]: Invalid user terrariaserver from 137.74.199.177 port 40168
Jul 12 08:00:23 MK-Soft-VM5 sshd\[22452\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=137.74.199.177
Jul 12 08:00:25 MK-Soft-VM5 sshd\[22452\]: Failed password for invalid user terrariaserver from 137.74.199.177 port 40168 ssh2
...
2019-07-12 16:07:05
54.92.24.65 attackbots
Jul 12 08:46:02 * sshd[12755]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=54.92.24.65
Jul 12 08:46:04 * sshd[12755]: Failed password for invalid user test2 from 54.92.24.65 port 37212 ssh2
2019-07-12 15:41:46
112.170.27.139 attack
Jul 12 01:55:37 server sshd[24150]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.170.27.139
...
2019-07-12 15:32:58
167.99.65.138 attackspam
Apr 25 08:16:44 vtv3 sshd\[14843\]: Invalid user cmc from 167.99.65.138 port 59188
Apr 25 08:16:44 vtv3 sshd\[14843\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.99.65.138
Apr 25 08:16:46 vtv3 sshd\[14843\]: Failed password for invalid user cmc from 167.99.65.138 port 59188 ssh2
Apr 25 08:22:40 vtv3 sshd\[17636\]: Invalid user jt from 167.99.65.138 port 53160
Apr 25 08:22:40 vtv3 sshd\[17636\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.99.65.138
Apr 25 08:33:19 vtv3 sshd\[23251\]: Invalid user mqadmin from 167.99.65.138 port 43106
Apr 25 08:33:19 vtv3 sshd\[23251\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.99.65.138
Apr 25 08:33:21 vtv3 sshd\[23251\]: Failed password for invalid user mqadmin from 167.99.65.138 port 43106 ssh2
Apr 25 08:36:02 vtv3 sshd\[24795\]: Invalid user cv from 167.99.65.138 port 40592
Apr 25 08:36:02 vtv3 sshd\[24795\]: pam_unix\(s
2019-07-12 15:28:22
188.11.67.165 attackbotsspam
Jul 12 12:43:29 areeb-Workstation sshd\[2911\]: Invalid user lxm from 188.11.67.165
Jul 12 12:43:29 areeb-Workstation sshd\[2911\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.11.67.165
Jul 12 12:43:31 areeb-Workstation sshd\[2911\]: Failed password for invalid user lxm from 188.11.67.165 port 49514 ssh2
...
2019-07-12 15:27:35
222.186.15.28 attackspambots
Automatic report - Web App Attack
2019-07-12 15:59:26
144.217.79.233 attack
Jul 12 09:34:26 eventyay sshd[26656]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=144.217.79.233
Jul 12 09:34:28 eventyay sshd[26656]: Failed password for invalid user ftpuser from 144.217.79.233 port 39142 ssh2
Jul 12 09:39:25 eventyay sshd[27971]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=144.217.79.233
...
2019-07-12 15:49:42
193.112.4.36 attackbotsspam
2019-07-12T08:47:38.884772  sshd[24321]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=193.112.4.36  user=root
2019-07-12T08:47:40.955714  sshd[24321]: Failed password for root from 193.112.4.36 port 52074 ssh2
2019-07-12T08:54:26.655768  sshd[24411]: Invalid user rex from 193.112.4.36 port 52996
2019-07-12T08:54:26.672240  sshd[24411]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=193.112.4.36
2019-07-12T08:54:26.655768  sshd[24411]: Invalid user rex from 193.112.4.36 port 52996
2019-07-12T08:54:29.420777  sshd[24411]: Failed password for invalid user rex from 193.112.4.36 port 52996 ssh2
...
2019-07-12 15:50:09
187.87.39.147 attack
Jul 11 23:22:03 vtv3 sshd\[30670\]: Invalid user admin from 187.87.39.147 port 38232
Jul 11 23:22:04 vtv3 sshd\[30670\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=187.87.39.147
Jul 11 23:22:06 vtv3 sshd\[30670\]: Failed password for invalid user admin from 187.87.39.147 port 38232 ssh2
Jul 11 23:30:43 vtv3 sshd\[2596\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=187.87.39.147  user=root
Jul 11 23:30:45 vtv3 sshd\[2596\]: Failed password for root from 187.87.39.147 port 36756 ssh2
Jul 11 23:43:14 vtv3 sshd\[8410\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=187.87.39.147  user=root
Jul 11 23:43:17 vtv3 sshd\[8410\]: Failed password for root from 187.87.39.147 port 38860 ssh2
Jul 11 23:49:41 vtv3 sshd\[11401\]: Invalid user sc from 187.87.39.147 port 39908
Jul 11 23:49:41 vtv3 sshd\[11401\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh
2019-07-12 15:24:27
31.182.57.162 attackbotsspam
Jul 12 09:08:52 eventyay sshd[20133]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=31.182.57.162
Jul 12 09:08:54 eventyay sshd[20133]: Failed password for invalid user git from 31.182.57.162 port 65029 ssh2
Jul 12 09:14:29 eventyay sshd[21663]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=31.182.57.162
...
2019-07-12 15:20:40
176.112.103.60 attackspambots
[portscan] Port scan
2019-07-12 15:35:30

最近上报的IP列表

116.58.248.98 116.58.249.47 116.58.249.76 117.196.238.152
116.58.250.155 116.58.252.28 116.58.252.40 116.58.252.42
116.58.252.250 116.58.252.32 116.58.252.46 116.58.252.56
117.196.238.154 117.196.238.156 117.196.238.158 117.196.238.16
117.196.238.162 117.196.238.164 117.196.238.168 117.196.238.170