必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): Japan

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 122.214.21.13
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 19454
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;122.214.21.13.			IN	A

;; AUTHORITY SECTION:
.			449	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2021123100 1800 900 604800 86400

;; Query time: 59 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Dec 31 17:42:23 CST 2021
;; MSG SIZE  rcvd: 106
HOST信息:
13.21.214.122.in-addr.arpa domain name pointer 122x214x21x13.ap122.ftth.ucom.ne.jp.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
13.21.214.122.in-addr.arpa	name = 122x214x21x13.ap122.ftth.ucom.ne.jp.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
14.241.227.216 attack
Failed password for invalid user job from 14.241.227.216 port 52626 ssh2
2020-07-20 02:02:09
192.185.219.16 attackspam
log:/wp-login.php
2020-07-20 02:04:59
94.177.231.4 attack
Invalid user cbt from 94.177.231.4 port 37392
2020-07-20 02:29:09
162.243.129.42 attack
 TCP (SYN) 162.243.129.42:44807 -> port 771, len 44
2020-07-20 02:29:45
220.248.20.74 attack
Tried our host z.
2020-07-20 01:55:28
142.44.240.82 attackspambots
142.44.240.82 - - [19/Jul/2020:20:01:23 +0200] "GET /wp-login.php HTTP/1.1" 200 6060 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
142.44.240.82 - - [19/Jul/2020:20:01:26 +0200] "POST /wp-login.php HTTP/1.1" 200 6377 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
142.44.240.82 - - [19/Jul/2020:20:01:27 +0200] "POST /xmlrpc.php HTTP/1.1" 200 427 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
2020-07-20 02:12:37
62.113.114.172 attack
Lines containing failures of 62.113.114.172 (max 1000)
Jul 19 16:22:24 archiv sshd[12499]: Invalid user archana from 62.113.114.172 port 46454
Jul 19 16:22:26 archiv sshd[12499]: Failed password for invalid user archana from 62.113.114.172 port 46454 ssh2
Jul 19 16:22:26 archiv sshd[12499]: Received disconnect from 62.113.114.172 port 46454:11: Bye Bye [preauth]
Jul 19 16:22:26 archiv sshd[12499]: Disconnected from 62.113.114.172 port 46454 [preauth]
Jul 19 16:32:24 archiv sshd[12645]: Invalid user cyril from 62.113.114.172 port 47364
Jul 19 16:32:27 archiv sshd[12645]: Failed password for invalid user cyril from 62.113.114.172 port 47364 ssh2
Jul 19 16:32:27 archiv sshd[12645]: Received disconnect from 62.113.114.172 port 47364:11: Bye Bye [preauth]
Jul 19 16:32:27 archiv sshd[12645]: Disconnected from 62.113.114.172 port 47364 [preauth]
Jul 19 16:40:01 archiv sshd[12801]: Invalid user sylvia from 62.113.114.172 port 38206


........
-----------------------------------------------
https://www.blocklist.de/en
2020-07-20 02:05:49
218.92.0.223 attack
Jul 19 11:19:40 dignus sshd[7379]: Failed password for root from 218.92.0.223 port 43608 ssh2
Jul 19 11:19:44 dignus sshd[7379]: Failed password for root from 218.92.0.223 port 43608 ssh2
Jul 19 11:19:48 dignus sshd[7379]: Failed password for root from 218.92.0.223 port 43608 ssh2
Jul 19 11:19:52 dignus sshd[7379]: Failed password for root from 218.92.0.223 port 43608 ssh2
Jul 19 11:19:55 dignus sshd[7379]: Failed password for root from 218.92.0.223 port 43608 ssh2
...
2020-07-20 02:26:56
111.229.226.212 attackbots
Jul 19 17:46:37 rush sshd[24446]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.229.226.212
Jul 19 17:46:39 rush sshd[24446]: Failed password for invalid user zwf from 111.229.226.212 port 58280 ssh2
Jul 19 17:50:44 rush sshd[24516]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.229.226.212
...
2020-07-20 02:18:11
167.172.98.198 attackbots
Jul 19 17:32:21 vlre-nyc-1 sshd\[32332\]: Invalid user javier from 167.172.98.198
Jul 19 17:32:21 vlre-nyc-1 sshd\[32332\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.172.98.198
Jul 19 17:32:23 vlre-nyc-1 sshd\[32332\]: Failed password for invalid user javier from 167.172.98.198 port 32774 ssh2
Jul 19 17:36:09 vlre-nyc-1 sshd\[32492\]: Invalid user web from 167.172.98.198
Jul 19 17:36:09 vlre-nyc-1 sshd\[32492\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.172.98.198
...
2020-07-20 01:57:15
94.102.51.166 attackbots
$f2bV_matches
2020-07-20 02:26:26
40.122.169.225 attackspambots
Jul 19 12:07:28 mail sshd\[7383\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=40.122.169.225  user=root
...
2020-07-20 01:54:55
222.186.180.6 attackbots
2020-07-19T14:26:52.181072uwu-server sshd[2908986]: Failed password for root from 222.186.180.6 port 18656 ssh2
2020-07-19T14:26:56.375627uwu-server sshd[2908986]: Failed password for root from 222.186.180.6 port 18656 ssh2
2020-07-19T14:27:01.228597uwu-server sshd[2908986]: Failed password for root from 222.186.180.6 port 18656 ssh2
2020-07-19T14:27:06.068413uwu-server sshd[2908986]: Failed password for root from 222.186.180.6 port 18656 ssh2
2020-07-19T14:27:10.913398uwu-server sshd[2908986]: Failed password for root from 222.186.180.6 port 18656 ssh2
...
2020-07-20 02:31:53
122.116.49.110 attackspam
Port probing on unauthorized port 88
2020-07-20 02:24:46
159.203.34.76 attackbotsspam
Jul 19 19:45:10 vm1 sshd[19791]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.203.34.76
Jul 19 19:45:12 vm1 sshd[19791]: Failed password for invalid user superman from 159.203.34.76 port 43923 ssh2
...
2020-07-20 01:54:38

最近上报的IP列表

225.146.85.197 67.32.48.140 72.143.233.147 192.180.60.157
242.72.222.174 110.24.160.228 217.61.18.90 123.24.212.138
254.234.98.164 187.107.147.221 21.104.110.229 53.23.238.169
82.71.30.9 2a01:598:a08e:7070:1:2:938e:12c4 51.225.113.9 193.116.81.123
174.253.0.116 145.57.56.234 86.31.249.52 35.181.65.211