必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): United States

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 141.214.16.53
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 57634
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;141.214.16.53.			IN	A

;; AUTHORITY SECTION:
.			600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022022700 1800 900 604800 86400

;; Query time: 19 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Feb 27 14:00:15 CST 2022
;; MSG SIZE  rcvd: 106
HOST信息:
53.16.214.141.in-addr.arpa domain name pointer myuofmhealth-info.med.umich.edu.
53.16.214.141.in-addr.arpa domain name pointer clinicalimages.med.umich.edu.
53.16.214.141.in-addr.arpa domain name pointer mottentapps.med.umich.edu.
53.16.214.141.in-addr.arpa domain name pointer bioresearch.med.umich.edu.
53.16.214.141.in-addr.arpa domain name pointer thefanlab.med.umich.edu.
53.16.214.141.in-addr.arpa domain name pointer linuxteam.med.umich.edu.
53.16.214.141.in-addr.arpa domain name pointer diversity.med.umich.edu.
53.16.214.141.in-addr.arpa domain name pointer mstrides.med.umich.edu.
53.16.214.141.in-addr.arpa domain name pointer host-53.subnet-16.med.umich.edu.
53.16.214.141.in-addr.arpa domain name pointer diytech.med.umich.edu.
53.16.214.141.in-addr.arpa domain name pointer mberet.umms.med.umich.edu.
53.16.214.141.in-addr.arpa domain name pointer evpma.med.umich.edu.
53.16.214.141.in-addr.arpa domain name pointer ulam.med.umich.edu.
53.16.214.141.in-addr.arpa domain name pointer mmdp.med.umich.edu.
53.16.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
53.16.214.141.in-addr.arpa	name = mmdp.med.umich.edu.
53.16.214.141.in-addr.arpa	name = help.med.umich.edu.
53.16.214.141.in-addr.arpa	name = brcf.med.umich.edu.
53.16.214.141.in-addr.arpa	name = www.proteome.med.umich.edu.
53.16.214.141.in-addr.arpa	name = www.diytech.med.umich.edu.
53.16.214.141.in-addr.arpa	name = www.ulam.med.umich.edu.
53.16.214.141.in-addr.arpa	name = www.oto.med.umich.edu.
53.16.214.141.in-addr.arpa	name = www.bd.med.umich.edu.
53.16.214.141.in-addr.arpa	name = rri.med.umich.edu.
53.16.214.141.in-addr.arpa	name = oto.med.umich.edu.
53.16.214.141.in-addr.arpa	name = med.umich.edu.
53.16.214.141.in-addr.arpa	name = bd.med.umich.edu.
53.16.214.141.in-addr.arpa	name = communication.med.umich.edu.
53.16.214.141.in-addr.arpa	name = saintpublications.med.umich.edu.
53.16.214.141.in-addr.arpa	name = myuofmhealth-info.med.umich.edu.
53.16.214.141.in-addr.arpa	name = clinicalimages.med.umich.edu.
53.16.214.141.in-addr.arpa	name = mottentapps.med.umich.edu.
53.16.214.141.in-addr.arpa	name = bioresearch.med.umich.edu.
53.16.214.141.in-addr.arpa	name = thefanlab.med.umich.edu.

Authoritative answers can be found from:

相关IP信息:
最新评论:
IP 类型 评论内容 时间
222.252.105.17 attackspam
Unauthorized connection attempt from IP address 222.252.105.17 on Port 445(SMB)
2020-07-29 01:34:41
54.38.187.5 attackbots
Jul 28 19:23:22 piServer sshd[1276]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=54.38.187.5 
Jul 28 19:23:24 piServer sshd[1276]: Failed password for invalid user yepeng from 54.38.187.5 port 36124 ssh2
Jul 28 19:27:22 piServer sshd[1745]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=54.38.187.5 
...
2020-07-29 01:32:01
222.186.180.17 attackbots
Jul 28 19:53:29 santamaria sshd\[16423\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.180.17  user=root
Jul 28 19:53:32 santamaria sshd\[16423\]: Failed password for root from 222.186.180.17 port 41458 ssh2
Jul 28 19:53:47 santamaria sshd\[16426\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.180.17  user=root
...
2020-07-29 01:55:53
94.3.58.26 attack
2020-07-28T16:53:32.860806shield sshd\[16921\]: Invalid user zhangxiaoyi from 94.3.58.26 port 42204
2020-07-28T16:53:32.868538shield sshd\[16921\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=94.3.58.26
2020-07-28T16:53:34.592811shield sshd\[16921\]: Failed password for invalid user zhangxiaoyi from 94.3.58.26 port 42204 ssh2
2020-07-28T17:02:54.783592shield sshd\[20991\]: Invalid user heyu from 94.3.58.26 port 53660
2020-07-28T17:02:54.800782shield sshd\[20991\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=94.3.58.26
2020-07-29 01:28:56
186.179.103.118 attack
Jul 28 18:55:07 havingfunrightnow sshd[6658]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=186.179.103.118 
Jul 28 18:55:09 havingfunrightnow sshd[6658]: Failed password for invalid user harry from 186.179.103.118 port 54190 ssh2
Jul 28 19:00:11 havingfunrightnow sshd[6835]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=186.179.103.118 
...
2020-07-29 01:22:49
185.202.1.79 attackbots
 TCP (SYN) 185.202.1.79:16929 -> port 2000, len 52
2020-07-29 01:20:44
189.87.174.206 attackspam
Unauthorized connection attempt from IP address 189.87.174.206 on Port 445(SMB)
2020-07-29 01:57:55
103.133.104.130 attackbots
Jul 28 21:42:06 our-server-hostname postfix/smtpd[29425]: connect from unknown[103.133.104.130]
Jul x@x
Jul 28 21:42:07 our-server-hostname postfix/smtpd[29425]: disconnect from unknown[103.133.104.130]
Jul 28 21:43:23 our-server-hostname postfix/smtpd[29425]: connect from unknown[103.133.104.130]
Jul x@x
Jul 28 21:43:24 our-server-hostname postfix/smtpd[29425]: disconnect from unknown[103.133.104.130]
Jul 28 21:44:40 our-server-hostname postfix/smtpd[29621]: connect from unknown[103.133.104.130]
Jul x@x
Jul 28 21:44:40 our-server-hostname postfix/smtpd[29621]: disconnect from unknown[103.133.104.130]
Jul 28 21:46:36 our-server-hostname postfix/smtpd[29658]: connect from unknown[103.133.104.130]
Jul x@x
Jul 28 21:46:37 our-server-hostname postfix/smtpd[29658]: disconnect from unknown[103.133.104.130]
Jul 28 21:46:53 our-server-hostname postfix/smtpd[29658]: connect from unknown[103.133.104.130]
Jul x@x
Jul 28 21:46:54 our-server-hostname postfix/smtpd[29658]: disconnect........
-------------------------------
2020-07-29 01:35:30
94.23.172.28 attackbots
Jul 28 19:43:32 home sshd[1788687]: Invalid user xuyz from 94.23.172.28 port 56822
Jul 28 19:43:32 home sshd[1788687]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=94.23.172.28 
Jul 28 19:43:32 home sshd[1788687]: Invalid user xuyz from 94.23.172.28 port 56822
Jul 28 19:43:35 home sshd[1788687]: Failed password for invalid user xuyz from 94.23.172.28 port 56822 ssh2
Jul 28 19:47:20 home sshd[1790078]: Invalid user akkornel from 94.23.172.28 port 39776
...
2020-07-29 01:59:10
187.188.50.158 attackspambots
Unauthorized connection attempt from IP address 187.188.50.158 on Port 445(SMB)
2020-07-29 01:53:55
124.123.191.184 attack
Unauthorized connection attempt from IP address 124.123.191.184 on Port 445(SMB)
2020-07-29 01:33:37
185.234.218.39 attackbots
RDP Bruteforce
2020-07-29 01:31:02
82.212.176.158 attack
Jul 28 17:11:01 cdc sshd[28428]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=82.212.176.158  user=pi
Jul 28 17:11:03 cdc sshd[28428]: Failed password for invalid user pi from 82.212.176.158 port 52728 ssh2
2020-07-29 01:40:08
116.193.163.235 attackspam
Unauthorized connection attempt from IP address 116.193.163.235 on Port 445(SMB)
2020-07-29 01:44:30
218.92.0.251 attackbotsspam
Jul 28 18:37:15 ajax sshd[13663]: Failed password for root from 218.92.0.251 port 28375 ssh2
Jul 28 18:37:19 ajax sshd[13663]: Failed password for root from 218.92.0.251 port 28375 ssh2
2020-07-29 01:43:33

最近上报的IP列表

141.223.5.51 141.224.254.11 141.226.253.90 141.226.253.46
141.219.68.207 141.237.11.228 141.228.141.43 141.226.253.94
141.237.108.31 200.12.125.240 141.8.226.5 141.8.196.67
141.8.225.68 141.8.3.49 141.8.195.92 141.88.214.201
141.80.181.91 141.88.214.77 141.84.225.217 141.8.224.143