必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): Cape Girardeau

省份(region): Missouri

国家(country): United States

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 150.201.214.105
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 16951
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;150.201.214.105.		IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025012201 1800 900 604800 86400

;; Query time: 36 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Jan 23 08:31:02 CST 2025
;; MSG SIZE  rcvd: 108
HOST信息:
Host 105.214.201.150.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 105.214.201.150.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
2002:b9ea:db51::b9ea:db51 attackbotsspam
Apr 14 07:54:38 web01.agentur-b-2.de postfix/smtpd[861712]: warning: unknown[2002:b9ea:db51::b9ea:db51]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Apr 14 07:54:38 web01.agentur-b-2.de postfix/smtpd[861712]: lost connection after AUTH from unknown[2002:b9ea:db51::b9ea:db51]
Apr 14 07:56:39 web01.agentur-b-2.de postfix/smtpd[882683]: warning: unknown[2002:b9ea:db51::b9ea:db51]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Apr 14 07:56:39 web01.agentur-b-2.de postfix/smtpd[882683]: lost connection after AUTH from unknown[2002:b9ea:db51::b9ea:db51]
Apr 14 08:00:30 web01.agentur-b-2.de postfix/smtpd[884595]: warning: unknown[2002:b9ea:db51::b9ea:db51]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
2020-04-14 14:34:13
167.71.202.162 attackspambots
Apr 14 01:37:47 ws12vmsma01 sshd[41683]: Failed password for root from 167.71.202.162 port 37744 ssh2
Apr 14 01:40:01 ws12vmsma01 sshd[42102]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.71.202.162  user=root
Apr 14 01:40:02 ws12vmsma01 sshd[42102]: Failed password for root from 167.71.202.162 port 44608 ssh2
...
2020-04-14 14:34:46
106.12.86.205 attackspambots
Apr 13 22:58:59 server1 sshd\[21376\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.86.205  user=root
Apr 13 22:59:00 server1 sshd\[21376\]: Failed password for root from 106.12.86.205 port 55428 ssh2
Apr 13 23:02:11 server1 sshd\[22179\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.86.205  user=root
Apr 13 23:02:13 server1 sshd\[22179\]: Failed password for root from 106.12.86.205 port 39746 ssh2
Apr 13 23:05:27 server1 sshd\[22970\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.86.205  user=root
...
2020-04-14 14:05:55
193.70.43.220 attackbots
$f2bV_matches
2020-04-14 14:20:59
85.100.72.124 attackbotsspam
port scan and connect, tcp 23 (telnet)
2020-04-14 13:55:33
182.162.143.116 attack
(ftpd) Failed FTP login from 182.162.143.116 (KR/South Korea/-): 1 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_TRIGGER; Logs: Apr 14 09:44:11 ir1 pure-ftpd: (?@182.162.143.116) [WARNING] Authentication failed for user [admin@emad-security.com]
2020-04-14 14:20:32
213.55.2.212 attackbotsspam
Apr 13 19:33:07 auw2 sshd\[8856\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=212.2.55.213.rev.sfr.net  user=root
Apr 13 19:33:08 auw2 sshd\[8856\]: Failed password for root from 213.55.2.212 port 40544 ssh2
Apr 13 19:40:52 auw2 sshd\[9340\]: Invalid user jllmarcom from 213.55.2.212
Apr 13 19:40:52 auw2 sshd\[9340\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=212.2.55.213.rev.sfr.net
Apr 13 19:40:55 auw2 sshd\[9340\]: Failed password for invalid user jllmarcom from 213.55.2.212 port 43218 ssh2
2020-04-14 14:07:02
221.198.211.239 attackbots
FTP Brute Force
2020-04-14 14:13:00
140.143.225.188 attackspam
Apr 14 05:02:26 h1946882 sshd[450]: pam_unix(sshd:auth): authentication=
 failure; logname=3D uid=3D0 euid=3D0 tty=3Dssh ruser=3D rhost=3D140.14=
3.225.188  user=3Dr.r
Apr 14 05:02:28 h1946882 sshd[450]: Failed password for r.r from 140.1=
43.225.188 port 45192 ssh2
Apr 14 05:02:28 h1946882 sshd[450]: Received disconnect from 140.143.22=
5.188: 11: Bye Bye [preauth]
Apr 14 05:21:43 h1946882 sshd[539]: pam_unix(sshd:auth): authentication=
 failure; logname=3D uid=3D0 euid=3D0 tty=3Dssh ruser=3D rhost=3D140.14=
3.225.188  user=3Dr.r
Apr 14 05:21:45 h1946882 sshd[539]: Failed password for r.r from 140.1=
43.225.188 port 34484 ssh2
Apr 14 05:21:45 h1946882 sshd[539]: Received disconnect from 140.143.22=
5.188: 11: Bye Bye [preauth]
Apr 14 05:27:49 h1946882 sshd[587]: pam_unix(sshd:auth): authentication=
 failure; logname=3D uid=3D0 euid=3D0 tty=3Dssh ruser=3D rhost=3D140.14=
3.225.188  user=3Dpostgres
Apr 14 05:27:50 h1946882 sshd[587]: Failed password for postgres from 1=
........
-------------------------------
2020-04-14 14:10:58
202.38.153.233 attackspam
2020-04-14T05:26:39.502063abusebot-7.cloudsearch.cf sshd[2293]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=202.38.153.233  user=root
2020-04-14T05:26:41.460356abusebot-7.cloudsearch.cf sshd[2293]: Failed password for root from 202.38.153.233 port 57179 ssh2
2020-04-14T05:31:45.306635abusebot-7.cloudsearch.cf sshd[2597]: Invalid user oracle from 202.38.153.233 port 46845
2020-04-14T05:31:45.310913abusebot-7.cloudsearch.cf sshd[2597]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=202.38.153.233
2020-04-14T05:31:45.306635abusebot-7.cloudsearch.cf sshd[2597]: Invalid user oracle from 202.38.153.233 port 46845
2020-04-14T05:31:47.610415abusebot-7.cloudsearch.cf sshd[2597]: Failed password for invalid user oracle from 202.38.153.233 port 46845 ssh2
2020-04-14T05:34:08.627316abusebot-7.cloudsearch.cf sshd[2806]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=202.38.1
...
2020-04-14 13:56:53
180.97.80.12 attack
Apr 14 06:55:33 localhost sshd\[23548\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.97.80.12  user=root
Apr 14 06:55:35 localhost sshd\[23548\]: Failed password for root from 180.97.80.12 port 33880 ssh2
Apr 14 06:59:20 localhost sshd\[23835\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.97.80.12  user=root
Apr 14 06:59:22 localhost sshd\[23835\]: Failed password for root from 180.97.80.12 port 58982 ssh2
Apr 14 07:03:21 localhost sshd\[24114\]: Invalid user maggie from 180.97.80.12
...
2020-04-14 14:14:55
103.208.152.253 attackbots
CMS (WordPress or Joomla) login attempt.
2020-04-14 13:57:47
51.75.203.98 attack
Repeated brute force against a port
2020-04-14 14:36:05
139.198.5.79 attackspam
Apr 14 10:47:24 itv-usvr-01 sshd[20774]: Invalid user upgrade from 139.198.5.79
Apr 14 10:47:24 itv-usvr-01 sshd[20774]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.198.5.79
Apr 14 10:47:24 itv-usvr-01 sshd[20774]: Invalid user upgrade from 139.198.5.79
Apr 14 10:47:26 itv-usvr-01 sshd[20774]: Failed password for invalid user upgrade from 139.198.5.79 port 49566 ssh2
Apr 14 10:52:24 itv-usvr-01 sshd[20979]: Invalid user edge from 139.198.5.79
2020-04-14 14:28:39
106.13.131.80 attackbots
DATE:2020-04-14 05:53:09,IP:106.13.131.80,MATCHES:10,PORT:ssh
2020-04-14 13:56:32

最近上报的IP列表

87.124.32.113 83.162.67.114 21.4.229.91 105.245.116.25
190.163.65.168 156.33.143.12 125.151.149.228 187.91.161.84
100.42.34.227 168.107.7.136 161.167.112.138 172.231.62.70
49.192.166.67 249.88.15.184 142.94.255.221 234.195.20.162
161.36.17.217 40.82.171.67 107.214.189.35 96.163.242.88