必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): unknown

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 119.114.21.157
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 36456
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;119.114.21.157.			IN	A

;; AUTHORITY SECTION:
.			297	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022030803 1800 900 604800 86400

;; Query time: 73 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Mar 09 11:26:23 CST 2022
;; MSG SIZE  rcvd: 107
HOST信息:
Host 157.21.114.119.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 157.21.114.119.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
51.254.207.92 attackspam
Jun 26 14:54:28 plex sshd[7809]: Invalid user jessie from 51.254.207.92 port 58796
2020-06-26 21:07:10
35.204.70.38 attackbotsspam
Jun 26 14:31:26 santamaria sshd\[13365\]: Invalid user gtp from 35.204.70.38
Jun 26 14:31:26 santamaria sshd\[13365\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=35.204.70.38
Jun 26 14:31:28 santamaria sshd\[13365\]: Failed password for invalid user gtp from 35.204.70.38 port 35304 ssh2
...
2020-06-26 21:04:12
45.80.64.246 attack
Jun 26 11:29:56 *** sshd[18295]: Invalid user tp from 45.80.64.246
2020-06-26 20:36:37
106.12.6.55 attackbots
Jun 26 05:58:35 server1 sshd\[19387\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.6.55  user=root
Jun 26 05:58:36 server1 sshd\[19387\]: Failed password for root from 106.12.6.55 port 38232 ssh2
Jun 26 06:01:36 server1 sshd\[21202\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.6.55  user=root
Jun 26 06:01:38 server1 sshd\[21202\]: Failed password for root from 106.12.6.55 port 50912 ssh2
Jun 26 06:04:57 server1 sshd\[23126\]: Invalid user ec2 from 106.12.6.55
Jun 26 06:04:58 server1 sshd\[23126\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.6.55 
Jun 26 06:05:01 server1 sshd\[23126\]: Failed password for invalid user ec2 from 106.12.6.55 port 35370 ssh2
...
2020-06-26 20:46:51
51.89.194.168 attack
Failed password for root from 51.89.194.168 port 57914 ssh2
Invalid user oracle from 51.89.194.168 port 37798
pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=ns3173509.ip-51-89-194.eu
Invalid user oracle from 51.89.194.168 port 37798
Failed password for invalid user oracle from 51.89.194.168 port 37798 ssh2
2020-06-26 21:13:33
183.87.134.134 attack
port scan and connect, tcp 80 (http)
2020-06-26 21:06:09
167.172.119.104 attack
Invalid user artifactory from 167.172.119.104 port 39616
2020-06-26 20:38:09
61.177.172.41 attackbots
Jun 26 15:09:38 sso sshd[29210]: Failed password for root from 61.177.172.41 port 5747 ssh2
Jun 26 15:09:47 sso sshd[29210]: Failed password for root from 61.177.172.41 port 5747 ssh2
...
2020-06-26 21:14:34
89.248.162.233 attackspam
Jun 26 14:55:52 debian-2gb-nbg1-2 kernel: \[15434809.479084\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=89.248.162.233 DST=195.201.40.59 LEN=40 TOS=0x00 PREC=0x00 TTL=247 ID=10211 PROTO=TCP SPT=49915 DPT=2074 WINDOW=1024 RES=0x00 SYN URGP=0
2020-06-26 20:57:48
46.38.150.193 attackspambots
2020-06-26 13:37:21 dovecot_login authenticator failed for \(User\) \[46.38.150.193\]: 535 Incorrect authentication data \(set_id=formname@no-server.de\)
2020-06-26 13:37:23 dovecot_login authenticator failed for \(User\) \[46.38.150.193\]: 535 Incorrect authentication data \(set_id=formname@no-server.de\)
2020-06-26 13:37:28 dovecot_login authenticator failed for \(User\) \[46.38.150.193\]: 535 Incorrect authentication data \(set_id=works@no-server.de\)
2020-06-26 13:37:33 dovecot_login authenticator failed for \(User\) \[46.38.150.193\]: 535 Incorrect authentication data \(set_id=works@no-server.de\)
2020-06-26 13:37:53 dovecot_login authenticator failed for \(User\) \[46.38.150.193\]: 535 Incorrect authentication data \(set_id=works@no-server.de\)
2020-06-26 13:37:54 dovecot_login authenticator failed for \(User\) \[46.38.150.193\]: 535 Incorrect authentication data \(set_id=works@no-server.de\)
2020-06-26 13:37:59 dovecot_login authenticator failed for \(User\) \[46.38.150.193\]: 5
...
2020-06-26 20:53:40
23.129.64.192 attackspam
$f2bV_matches
2020-06-26 21:07:38
218.92.0.191 attack
Jun 26 14:01:19 dcd-gentoo sshd[23243]: User root from 218.92.0.191 not allowed because none of user's groups are listed in AllowGroups
Jun 26 14:01:22 dcd-gentoo sshd[23243]: error: PAM: Authentication failure for illegal user root from 218.92.0.191
Jun 26 14:01:22 dcd-gentoo sshd[23243]: Failed keyboard-interactive/pam for invalid user root from 218.92.0.191 port 59748 ssh2
...
2020-06-26 20:33:15
89.3.236.207 attack
2020-06-26T15:39:32.848281lavrinenko.info sshd[4881]: Failed password for invalid user tam from 89.3.236.207 port 40900 ssh2
2020-06-26T15:42:38.300159lavrinenko.info sshd[5153]: Invalid user bnc from 89.3.236.207 port 39180
2020-06-26T15:42:38.310882lavrinenko.info sshd[5153]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=89.3.236.207
2020-06-26T15:42:38.300159lavrinenko.info sshd[5153]: Invalid user bnc from 89.3.236.207 port 39180
2020-06-26T15:42:40.486825lavrinenko.info sshd[5153]: Failed password for invalid user bnc from 89.3.236.207 port 39180 ssh2
...
2020-06-26 20:54:59
206.189.26.171 attack
Jun 26 14:04:31 haigwepa sshd[28958]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=206.189.26.171 
Jun 26 14:04:32 haigwepa sshd[28958]: Failed password for invalid user teste from 206.189.26.171 port 47338 ssh2
...
2020-06-26 20:53:56
222.186.15.62 attack
2020-06-26T15:50:15.823174lavrinenko.info sshd[5595]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.15.62  user=root
2020-06-26T15:50:17.738000lavrinenko.info sshd[5595]: Failed password for root from 222.186.15.62 port 12220 ssh2
2020-06-26T15:50:15.823174lavrinenko.info sshd[5595]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.15.62  user=root
2020-06-26T15:50:17.738000lavrinenko.info sshd[5595]: Failed password for root from 222.186.15.62 port 12220 ssh2
2020-06-26T15:50:20.966185lavrinenko.info sshd[5595]: Failed password for root from 222.186.15.62 port 12220 ssh2
...
2020-06-26 20:50:48

最近上报的IP列表

119.114.20.70 119.114.21.178 119.114.21.207 119.114.21.239
6.100.3.158 119.114.21.242 119.114.21.4 119.114.21.58
119.114.21.70 119.114.216.144 119.114.22.1 119.114.22.110
119.114.22.197 119.114.22.213 119.114.22.220 119.114.22.242
119.114.22.39 119.114.22.51 119.115.70.52 119.115.70.59