必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): None

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 13.53.91.214
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 27260
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;13.53.91.214.			IN	A

;; AUTHORITY SECTION:
.			96	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022030802 1800 900 604800 86400

;; Query time: 81 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Mar 09 05:10:53 CST 2022
;; MSG SIZE  rcvd: 105
HOST信息:
214.91.53.13.in-addr.arpa domain name pointer ec2-13-53-91-214.eu-north-1.compute.amazonaws.com.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
214.91.53.13.in-addr.arpa	name = ec2-13-53-91-214.eu-north-1.compute.amazonaws.com.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
150.242.213.189 attackspambots
2019-10-03T06:16:55.917823shield sshd\[7021\]: Invalid user user1 from 150.242.213.189 port 59772
2019-10-03T06:16:55.922022shield sshd\[7021\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=150.242.213.189
2019-10-03T06:16:57.841711shield sshd\[7021\]: Failed password for invalid user user1 from 150.242.213.189 port 59772 ssh2
2019-10-03T06:21:03.306973shield sshd\[7655\]: Invalid user jeffrey from 150.242.213.189 port 37466
2019-10-03T06:21:03.311246shield sshd\[7655\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=150.242.213.189
2019-10-03 15:05:05
190.0.159.86 attack
$f2bV_matches
2019-10-03 15:01:32
106.13.52.234 attack
Oct  1 00:45:49 eola sshd[25568]: Invalid user rf from 106.13.52.234 port 43924
Oct  1 00:45:49 eola sshd[25568]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.52.234 
Oct  1 00:45:52 eola sshd[25568]: Failed password for invalid user rf from 106.13.52.234 port 43924 ssh2
Oct  1 00:45:52 eola sshd[25568]: Received disconnect from 106.13.52.234 port 43924:11: Bye Bye [preauth]
Oct  1 00:45:52 eola sshd[25568]: Disconnected from 106.13.52.234 port 43924 [preauth]
Oct  1 01:02:12 eola sshd[25883]: Invalid user mapruser from 106.13.52.234 port 34046
Oct  1 01:02:12 eola sshd[25883]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.52.234 
Oct  1 01:02:14 eola sshd[25883]: Failed password for invalid user mapruser from 106.13.52.234 port 34046 ssh2
Oct  1 01:02:15 eola sshd[25883]: Received disconnect from 106.13.52.234 port 34046:11: Bye Bye [preauth]
Oct  1 01:02:15 eola sshd[258........
-------------------------------
2019-10-03 15:05:31
64.202.187.152 attack
Oct  2 20:33:24 web1 sshd\[18944\]: Invalid user test from 64.202.187.152
Oct  2 20:33:24 web1 sshd\[18944\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=64.202.187.152
Oct  2 20:33:26 web1 sshd\[18944\]: Failed password for invalid user test from 64.202.187.152 port 44648 ssh2
Oct  2 20:37:39 web1 sshd\[19349\]: Invalid user hapten from 64.202.187.152
Oct  2 20:37:39 web1 sshd\[19349\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=64.202.187.152
2019-10-03 14:46:28
193.70.30.109 attack
Oct  3 07:59:41 pornomens sshd\[29507\]: Invalid user tf2 from 193.70.30.109 port 41086
Oct  3 07:59:41 pornomens sshd\[29507\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=193.70.30.109
Oct  3 07:59:43 pornomens sshd\[29507\]: Failed password for invalid user tf2 from 193.70.30.109 port 41086 ssh2
...
2019-10-03 14:45:19
14.63.167.192 attackbots
Oct  3 06:25:57 MK-Soft-VM4 sshd[15998]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=14.63.167.192 
Oct  3 06:25:58 MK-Soft-VM4 sshd[15998]: Failed password for invalid user ftp from 14.63.167.192 port 58304 ssh2
...
2019-10-03 14:35:58
116.58.226.188 attackbotsspam
Chat Spam
2019-10-03 15:06:49
138.197.152.113 attackbots
Oct  3 06:57:48 tuotantolaitos sshd[16172]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.197.152.113
Oct  3 06:57:50 tuotantolaitos sshd[16172]: Failed password for invalid user bernier1 from 138.197.152.113 port 55124 ssh2
...
2019-10-03 14:34:58
114.38.67.210 attackspam
" "
2019-10-03 15:08:01
124.204.68.210 attackbots
2019-10-03T08:05:40.576923  sshd[9008]: Invalid user right from 124.204.68.210 port 53971
2019-10-03T08:05:40.591250  sshd[9008]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=124.204.68.210
2019-10-03T08:05:40.576923  sshd[9008]: Invalid user right from 124.204.68.210 port 53971
2019-10-03T08:05:42.847421  sshd[9008]: Failed password for invalid user right from 124.204.68.210 port 53971 ssh2
2019-10-03T08:17:38.379858  sshd[9232]: Invalid user ftpuser from 124.204.68.210 port 62954
...
2019-10-03 14:52:58
14.63.223.226 attackbots
Oct  3 08:12:33 MK-Soft-Root1 sshd[30886]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=14.63.223.226 
Oct  3 08:12:35 MK-Soft-Root1 sshd[30886]: Failed password for invalid user abc123 from 14.63.223.226 port 57530 ssh2
...
2019-10-03 14:28:41
202.229.120.90 attack
Oct  3 07:15:06 tuotantolaitos sshd[16949]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=202.229.120.90
Oct  3 07:15:09 tuotantolaitos sshd[16949]: Failed password for invalid user postgres from 202.229.120.90 port 56965 ssh2
...
2019-10-03 14:51:13
185.209.0.32 attackspam
Port scan: Attack repeated for 24 hours
2019-10-03 14:43:55
218.201.214.177 attackspam
2019-09-05 14:38:00,166 fail2ban.actions        [814]: NOTICE  [sshd] Ban 218.201.214.177
2019-09-05 18:07:19,556 fail2ban.actions        [814]: NOTICE  [sshd] Ban 218.201.214.177
2019-09-05 21:54:20,637 fail2ban.actions        [814]: NOTICE  [sshd] Ban 218.201.214.177
...
2019-10-03 14:53:50
199.195.249.6 attackbotsspam
Oct  3 08:57:54 saschabauer sshd[12431]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=199.195.249.6
Oct  3 08:57:55 saschabauer sshd[12431]: Failed password for invalid user ronda from 199.195.249.6 port 46134 ssh2
2019-10-03 15:04:01

最近上报的IP列表

13.53.95.249 13.54.1.253 13.54.1.4 13.54.102.156
13.54.105.62 13.54.102.68 13.54.10.241 13.54.111.27
13.54.111.79 118.172.150.150 13.54.113.214 13.54.112.46
13.54.114.88 13.54.114.237 13.54.120.41 13.54.114.158
13.54.119.229 13.54.119.20 13.54.127.93 13.54.119.245