必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): China

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 14.130.171.221
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 39891
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;14.130.171.221.			IN	A

;; AUTHORITY SECTION:
.			97	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2021122501 1800 900 604800 86400

;; Query time: 64 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Dec 26 07:15:26 CST 2021
;; MSG SIZE  rcvd: 107
HOST信息:
Host 221.171.130.14.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 221.171.130.14.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
219.93.20.155 attackspam
detected by Fail2Ban
2019-10-14 12:08:20
119.10.115.36 attack
Oct 13 17:51:52 auw2 sshd\[23835\]: Invalid user Qwerty\#111 from 119.10.115.36
Oct 13 17:51:52 auw2 sshd\[23835\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=119.10.115.36
Oct 13 17:51:53 auw2 sshd\[23835\]: Failed password for invalid user Qwerty\#111 from 119.10.115.36 port 42098 ssh2
Oct 13 17:58:05 auw2 sshd\[24332\]: Invalid user Coeur2017 from 119.10.115.36
Oct 13 17:58:05 auw2 sshd\[24332\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=119.10.115.36
2019-10-14 12:30:15
45.55.20.128 attackbotsspam
Oct 14 05:58:41 MK-Soft-VM7 sshd[5614]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.55.20.128 
Oct 14 05:58:43 MK-Soft-VM7 sshd[5614]: Failed password for invalid user Serveur@123 from 45.55.20.128 port 53449 ssh2
...
2019-10-14 12:11:23
153.36.242.143 attackbotsspam
Oct 14 00:14:23 plusreed sshd[31623]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=153.36.242.143  user=root
Oct 14 00:14:25 plusreed sshd[31623]: Failed password for root from 153.36.242.143 port 13626 ssh2
...
2019-10-14 12:16:07
185.90.117.5 attack
10/14/2019-00:13:52.336893 185.90.117.5 Protocol: 6 ET SCAN Potential SSH Scan
2019-10-14 12:20:52
45.80.64.127 attackbots
Oct 13 17:51:44 sachi sshd\[15300\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.80.64.127  user=root
Oct 13 17:51:46 sachi sshd\[15300\]: Failed password for root from 45.80.64.127 port 44294 ssh2
Oct 13 17:55:14 sachi sshd\[15578\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.80.64.127  user=root
Oct 13 17:55:15 sachi sshd\[15578\]: Failed password for root from 45.80.64.127 port 54598 ssh2
Oct 13 17:58:55 sachi sshd\[15889\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.80.64.127  user=root
2019-10-14 12:03:19
159.203.189.152 attack
2019-10-14T04:31:39.916044abusebot-2.cloudsearch.cf sshd\[29625\]: Invalid user Cent0s123 from 159.203.189.152 port 60080
2019-10-14 12:32:53
114.227.14.138 attackspambots
Oct 13 23:58:29 esmtp postfix/smtpd[25202]: lost connection after AUTH from unknown[114.227.14.138]
Oct 13 23:58:30 esmtp postfix/smtpd[25213]: lost connection after AUTH from unknown[114.227.14.138]
Oct 13 23:58:32 esmtp postfix/smtpd[24995]: lost connection after AUTH from unknown[114.227.14.138]
Oct 13 23:58:32 esmtp postfix/smtpd[25200]: lost connection after AUTH from unknown[114.227.14.138]
Oct 13 23:58:33 esmtp postfix/smtpd[25202]: lost connection after AUTH from unknown[114.227.14.138]

........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=114.227.14.138
2019-10-14 12:14:34
220.94.205.222 attackspam
2019-10-14T03:58:32.726179abusebot-5.cloudsearch.cf sshd\[16516\]: Invalid user rakesh from 220.94.205.222 port 52272
2019-10-14 12:16:53
181.48.95.130 attackspam
Oct 14 06:55:03 pkdns2 sshd\[3495\]: Address 181.48.95.130 maps to foodmanager.com.co, but this does not map back to the address - POSSIBLE BREAK-IN ATTEMPT!Oct 14 06:55:03 pkdns2 sshd\[3495\]: Invalid user Betrieb-123 from 181.48.95.130Oct 14 06:55:05 pkdns2 sshd\[3495\]: Failed password for invalid user Betrieb-123 from 181.48.95.130 port 42346 ssh2Oct 14 06:58:57 pkdns2 sshd\[3682\]: Address 181.48.95.130 maps to foodmanager.com.co, but this does not map back to the address - POSSIBLE BREAK-IN ATTEMPT!Oct 14 06:58:57 pkdns2 sshd\[3682\]: Invalid user Bizz123 from 181.48.95.130Oct 14 06:58:59 pkdns2 sshd\[3682\]: Failed password for invalid user Bizz123 from 181.48.95.130 port 52738 ssh2
...
2019-10-14 12:01:35
96.19.3.46 attack
Oct 14 06:54:48 www sshd\[55044\]: Invalid user Amadeus from 96.19.3.46Oct 14 06:54:49 www sshd\[55044\]: Failed password for invalid user Amadeus from 96.19.3.46 port 56318 ssh2Oct 14 06:59:01 www sshd\[55091\]: Failed password for root from 96.19.3.46 port 40174 ssh2
...
2019-10-14 12:00:32
188.165.220.213 attackbots
Oct 14 06:57:59 hosting sshd[22929]: Invalid user Paris@2016 from 188.165.220.213 port 56008
...
2019-10-14 12:34:20
185.90.118.21 attackbots
10/14/2019-00:28:27.302268 185.90.118.21 Protocol: 6 ET SCAN Potential SSH Scan
2019-10-14 12:34:36
222.186.173.154 attackbotsspam
Oct 14 06:09:28 MK-Soft-Root1 sshd[25578]: Failed password for root from 222.186.173.154 port 24438 ssh2
Oct 14 06:09:35 MK-Soft-Root1 sshd[25578]: Failed password for root from 222.186.173.154 port 24438 ssh2
...
2019-10-14 12:12:58
145.255.22.89 attack
Fail2Ban Ban Triggered
2019-10-14 08:25:57

最近上报的IP列表

133.104.74.110 133.166.217.203 198.2.181.152 2605:de00:1:1:4a:55:0:2
179.43.254.127 222.7.3.31 91.180.151.95 248.193.98.83
76.171.120.167 29.77.13.222 223.106.254.50 94.122.105.86
74.9.212.165 65.11.7.164 185.190.76.113 68.151.215.160
75.72.102.33 157.71.113.124 41.112.84.41 86.96.35.186