必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): Korea (the Republic of)

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 119.214.250.145
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 11033
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;119.214.250.145.		IN	A

;; AUTHORITY SECTION:
.			74	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2024061001 1800 900 604800 86400

;; Query time: 29 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Jun 11 04:54:43 CST 2024
;; MSG SIZE  rcvd: 108
HOST信息:
Host 145.250.214.119.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 145.250.214.119.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
222.120.192.106 attackbotsspam
Nov  3 09:20:14 thevastnessof sshd[1496]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.120.192.106
...
2019-11-03 20:17:24
103.75.103.211 attack
Nov  3 13:19:24 rotator sshd\[11919\]: Invalid user qqqqqqq from 103.75.103.211Nov  3 13:19:26 rotator sshd\[11919\]: Failed password for invalid user qqqqqqq from 103.75.103.211 port 33244 ssh2Nov  3 13:23:46 rotator sshd\[12696\]: Invalid user tosoigoceebatse from 103.75.103.211Nov  3 13:23:48 rotator sshd\[12696\]: Failed password for invalid user tosoigoceebatse from 103.75.103.211 port 42102 ssh2Nov  3 13:28:03 rotator sshd\[13473\]: Invalid user !@\#QWE123qwe from 103.75.103.211Nov  3 13:28:05 rotator sshd\[13473\]: Failed password for invalid user !@\#QWE123qwe from 103.75.103.211 port 50960 ssh2
...
2019-11-03 20:32:20
207.232.28.81 attackspam
Unauthorised access (Nov  3) SRC=207.232.28.81 LEN=44 PREC=0xC0 TTL=53 ID=54909 TCP DPT=8080 WINDOW=12363 SYN
2019-11-03 20:38:13
113.176.89.116 attackbotsspam
Nov  2 22:55:31 php1 sshd\[29721\]: Invalid user pcmc from 113.176.89.116
Nov  2 22:55:31 php1 sshd\[29721\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=113.176.89.116
Nov  2 22:55:33 php1 sshd\[29721\]: Failed password for invalid user pcmc from 113.176.89.116 port 39136 ssh2
Nov  2 22:59:51 php1 sshd\[30036\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=113.176.89.116  user=root
Nov  2 22:59:53 php1 sshd\[30036\]: Failed password for root from 113.176.89.116 port 45986 ssh2
2019-11-03 20:09:33
165.227.154.59 attack
Invalid user toker from 165.227.154.59 port 50856
2019-11-03 20:12:24
139.159.27.62 attack
" "
2019-11-03 20:41:14
36.155.113.223 attackbots
Nov  3 06:41:44 dev0-dcde-rnet sshd[31355]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=36.155.113.223
Nov  3 06:41:46 dev0-dcde-rnet sshd[31355]: Failed password for invalid user rocdai48 from 36.155.113.223 port 37748 ssh2
Nov  3 06:47:00 dev0-dcde-rnet sshd[31372]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=36.155.113.223
2019-11-03 20:24:50
39.109.13.230 attackspambots
Nov  2 07:27:18 reporting6 sshd[31531]: User r.r from 39.109.13.230 not allowed because not listed in AllowUsers
Nov  2 07:27:18 reporting6 sshd[31531]: Failed password for invalid user r.r from 39.109.13.230 port 37330 ssh2
Nov  2 07:33:02 reporting6 sshd[2461]: User r.r from 39.109.13.230 not allowed because not listed in AllowUsers
Nov  2 07:33:02 reporting6 sshd[2461]: Failed password for invalid user r.r from 39.109.13.230 port 58564 ssh2


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=39.109.13.230
2019-11-03 20:40:53
178.69.88.37 attackspambots
Nov  3 05:47:09 venus sshd\[30760\]: Invalid user admin from 178.69.88.37 port 48016
Nov  3 05:47:09 venus sshd\[30760\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.69.88.37
Nov  3 05:47:11 venus sshd\[30760\]: Failed password for invalid user admin from 178.69.88.37 port 48016 ssh2
...
2019-11-03 20:17:04
207.38.89.72 attackbotsspam
Nov  3 12:59:42 vps647732 sshd[30679]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=207.38.89.72
Nov  3 12:59:44 vps647732 sshd[30679]: Failed password for invalid user sabres from 207.38.89.72 port 35048 ssh2
...
2019-11-03 20:14:40
165.22.114.237 attack
Nov  3 13:10:03 dedicated sshd[3208]: Failed password for daemon from 165.22.114.237 port 41242 ssh2
Nov  3 13:13:38 dedicated sshd[3815]: Invalid user tweece from 165.22.114.237 port 52038
Nov  3 13:13:38 dedicated sshd[3815]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.22.114.237 
Nov  3 13:13:38 dedicated sshd[3815]: Invalid user tweece from 165.22.114.237 port 52038
Nov  3 13:13:40 dedicated sshd[3815]: Failed password for invalid user tweece from 165.22.114.237 port 52038 ssh2
2019-11-03 20:19:21
188.166.42.50 attackspam
2019-11-03T13:15:12.005558mail01 postfix/smtpd[25831]: warning: unknown[188.166.42.50]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
2019-11-03T13:17:52.085123mail01 postfix/smtpd[14312]: warning: unknown[188.166.42.50]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
2019-11-03T13:22:51.311953mail01 postfix/smtpd[4068]: warning: unknown[188.166.42.50]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
2019-11-03 20:30:36
43.242.212.81 attackbotsspam
Nov  3 09:39:08 dedicated sshd[1128]: Invalid user Qaz147852369 from 43.242.212.81 port 42893
2019-11-03 20:12:42
181.48.13.10 attackbotsspam
Unauthorized connection attempt from IP address 181.48.13.10 on Port 445(SMB)
2019-11-03 20:48:26
124.16.164.2 attack
Nov  3 01:53:16 mockhub sshd[20713]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=124.16.164.2
Nov  3 01:53:18 mockhub sshd[20713]: Failed password for invalid user user from 124.16.164.2 port 40337 ssh2
...
2019-11-03 20:33:14

最近上报的IP列表

57.175.4.54 186.200.83.66 223.222.91.158 155.157.70.138
40.70.163.23 85.118.168.64 136.60.130.49 79.145.130.168
15.76.243.28 165.194.128.85 101.83.164.146 19.69.0.203
223.190.54.252 139.155.241.34 162.77.81.57 91.44.63.93
218.36.14.51 183.229.92.194 181.117.207.178 21.184.250.81