必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): China

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 14.152.109.21
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 38654
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;14.152.109.21.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025020300 1800 900 604800 86400

;; Query time: 43 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Feb 04 01:24:33 CST 2025
;; MSG SIZE  rcvd: 106
HOST信息:
Host 21.109.152.14.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 21.109.152.14.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
189.58.197.3 attackbotsspam
2019-06-24T13:48:46.464130***.arvenenaske.de sshd[105942]: Invalid user hu from 189.58.197.3 port 57438
2019-06-24T13:48:46.471227***.arvenenaske.de sshd[105942]: pam_sss(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=189.58.197.3 user=hu
2019-06-24T13:48:46.472110***.arvenenaske.de sshd[105942]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=189.58.197.3
2019-06-24T13:48:46.464130***.arvenenaske.de sshd[105942]: Invalid user hu from 189.58.197.3 port 57438
2019-06-24T13:48:48.424807***.arvenenaske.de sshd[105942]: Failed password for invalid user hu from 189.58.197.3 port 57438 ssh2
2019-06-24T13:52:12.737970***.arvenenaske.de sshd[105947]: Invalid user stanchion from 189.58.197.3 port 43526
2019-06-24T13:52:12.744387***.arvenenaske.de sshd[105947]: pam_sss(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=189.58.197.3 user=stanchion
2019-06-24T13:52:12.745309***.arvene........
------------------------------
2019-06-26 01:54:07
45.13.36.35 attack
Jun 25 19:21:17 dev postfix/smtpd\[2516\]: warning: unknown\[45.13.36.35\]: SASL LOGIN authentication failed: authentication failure
Jun 25 19:21:26 dev postfix/smtpd\[2525\]: warning: unknown\[45.13.36.35\]: SASL LOGIN authentication failed: authentication failure
Jun 25 19:21:34 dev postfix/smtpd\[2525\]: warning: unknown\[45.13.36.35\]: SASL LOGIN authentication failed: authentication failure
Jun 25 19:21:43 dev postfix/smtpd\[2516\]: warning: unknown\[45.13.36.35\]: SASL LOGIN authentication failed: authentication failure
Jun 25 19:21:51 dev postfix/smtpd\[2525\]: warning: unknown\[45.13.36.35\]: SASL LOGIN authentication failed: authentication failure
2019-06-26 01:22:02
125.118.64.182 attackspam
Jun 25 19:16:43 mail sshd[7290]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=125.118.64.182  user=root
Jun 25 19:16:45 mail sshd[7290]: Failed password for root from 125.118.64.182 port 43170 ssh2
Jun 25 19:25:11 mail sshd[8351]: Invalid user sub from 125.118.64.182
Jun 25 19:25:11 mail sshd[8351]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=125.118.64.182
Jun 25 19:25:11 mail sshd[8351]: Invalid user sub from 125.118.64.182
Jun 25 19:25:13 mail sshd[8351]: Failed password for invalid user sub from 125.118.64.182 port 45002 ssh2
...
2019-06-26 01:47:11
178.128.232.84 attack
ssh failed login
2019-06-26 01:57:35
198.199.104.20 attackbotsspam
Triggered by Fail2Ban at Vostok web server
2019-06-26 01:27:23
103.18.4.8 attack
25.06.2019 17:24:52 SSH access blocked by firewall
2019-06-26 01:55:47
141.98.9.2 attack
2019-06-26 01:46:36
218.92.0.158 attackbotsspam
Jun 25 13:24:16 localhost sshd[15602]: Failed password for root from 218.92.0.158 port 37608 ssh2
Jun 25 13:24:19 localhost sshd[15602]: Failed password for root from 218.92.0.158 port 37608 ssh2
Jun 25 13:24:21 localhost sshd[15602]: Failed password for root from 218.92.0.158 port 37608 ssh2
Jun 25 13:24:23 localhost sshd[15602]: Failed password for root from 218.92.0.158 port 37608 ssh2
Jun 25 13:24:26 localhost sshd[15602]: Failed password for root from 218.92.0.158 port 37608 ssh2
...
2019-06-26 02:04:05
106.12.45.23 attackspambots
scan z
2019-06-26 02:05:51
80.28.234.134 attackbots
2019-06-25T19:25:33.7015401240 sshd\[14179\]: Invalid user audrey from 80.28.234.134 port 38326
2019-06-25T19:25:33.7067201240 sshd\[14179\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=80.28.234.134
2019-06-25T19:25:35.6060851240 sshd\[14179\]: Failed password for invalid user audrey from 80.28.234.134 port 38326 ssh2
...
2019-06-26 01:31:44
107.170.193.18 attack
Automatic report - Web App Attack
2019-06-26 01:55:12
103.27.237.67 attackbotsspam
Jun 25 19:24:14 nextcloud sshd\[5134\]: Invalid user ftpuser from 103.27.237.67
Jun 25 19:24:14 nextcloud sshd\[5134\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.27.237.67
Jun 25 19:24:15 nextcloud sshd\[5134\]: Failed password for invalid user ftpuser from 103.27.237.67 port 47440 ssh2
...
2019-06-26 02:07:27
156.198.184.176 attackspam
Detected by ModSecurity. Request URI: /wp-login.php
2019-06-26 01:40:53
81.22.45.148 attackspam
¯\_(ツ)_/¯
2019-06-26 02:07:49
125.64.94.212 attackspambots
Port scan: Attack repeated for 24 hours
2019-06-26 01:47:37

最近上报的IP列表

119.146.104.249 247.109.150.64 24.37.3.136 30.103.109.203
138.201.130.12 36.5.74.187 3.156.187.124 240.67.5.33
97.109.1.141 227.213.65.239 107.222.138.53 144.146.252.119
80.5.205.148 178.205.148.5 177.45.117.117 103.140.132.181
80.93.241.121 48.175.120.115 7.18.199.24 142.146.104.111