必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): United States of America (the)

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 19.100.214.220
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 4276
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;19.100.214.220.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025012901 1800 900 604800 86400

;; Query time: 11 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Jan 30 03:56:44 CST 2025
;; MSG SIZE  rcvd: 107
HOST信息:
Host 220.214.100.19.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 220.214.100.19.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
192.35.168.234 attackbotsspam
firewall-block, port(s): 12229/tcp
2020-06-21 02:37:22
118.69.225.57 attackbots
Jun 19 09:21:45 WHD8 dovecot: imap-login: Disconnected \(auth failed, 1 attempts in 6 secs\): user=\, method=PLAIN, rip=118.69.225.57, lip=10.64.89.208, TLS: Disconnected, session=\
Jun 19 15:44:06 WHD8 dovecot: imap-login: Disconnected \(auth failed, 1 attempts in 5 secs\): user=\, method=PLAIN, rip=118.69.225.57, lip=10.64.89.208, TLS, session=\
Jun 19 17:30:29 WHD8 dovecot: imap-login: Disconnected \(auth failed, 1 attempts in 4 secs\): user=\, method=PLAIN, rip=118.69.225.57, lip=10.64.89.208, TLS: Disconnected, session=\
Jun 19 19:43:34 WHD8 dovecot: imap-login: Disconnected \(auth failed, 1 attempts in 5 secs\): user=\, method=PLAIN, rip=118.69.225.57, lip=10.64.89.208, TLS: Disconnected, session=\
Jun 19 20:19:49 WHD8 dovecot: imap-login: Disconnected \(auth failed, 1 attempts in 4 secs\): user=\
2020-06-21 02:21:26
222.186.175.154 attackbotsspam
Jun 20 20:16:41 vps sshd[155017]: Failed password for root from 222.186.175.154 port 43708 ssh2
Jun 20 20:16:45 vps sshd[155017]: Failed password for root from 222.186.175.154 port 43708 ssh2
Jun 20 20:16:48 vps sshd[155017]: Failed password for root from 222.186.175.154 port 43708 ssh2
Jun 20 20:16:51 vps sshd[155017]: Failed password for root from 222.186.175.154 port 43708 ssh2
Jun 20 20:16:55 vps sshd[155017]: Failed password for root from 222.186.175.154 port 43708 ssh2
...
2020-06-21 02:18:44
192.35.169.17 attack
Honeypot attack, port: 81, PTR: PTR record not found
2020-06-21 02:33:46
27.221.97.4 attackspam
2020-06-20T20:06:11.190482galaxy.wi.uni-potsdam.de sshd[22173]: Invalid user developer from 27.221.97.4 port 55384
2020-06-20T20:06:11.195807galaxy.wi.uni-potsdam.de sshd[22173]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=27.221.97.4
2020-06-20T20:06:11.190482galaxy.wi.uni-potsdam.de sshd[22173]: Invalid user developer from 27.221.97.4 port 55384
2020-06-20T20:06:13.146707galaxy.wi.uni-potsdam.de sshd[22173]: Failed password for invalid user developer from 27.221.97.4 port 55384 ssh2
2020-06-20T20:07:53.770536galaxy.wi.uni-potsdam.de sshd[22332]: Invalid user bruce from 27.221.97.4 port 38512
2020-06-20T20:07:53.775098galaxy.wi.uni-potsdam.de sshd[22332]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=27.221.97.4
2020-06-20T20:07:53.770536galaxy.wi.uni-potsdam.de sshd[22332]: Invalid user bruce from 27.221.97.4 port 38512
2020-06-20T20:07:55.730672galaxy.wi.uni-potsdam.de sshd[22332]: Failed password 
...
2020-06-21 02:19:46
118.89.115.224 attack
Jun 20 19:47:48 inter-technics sshd[5323]: Invalid user pdm from 118.89.115.224 port 35494
Jun 20 19:47:48 inter-technics sshd[5323]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.89.115.224
Jun 20 19:47:48 inter-technics sshd[5323]: Invalid user pdm from 118.89.115.224 port 35494
Jun 20 19:47:49 inter-technics sshd[5323]: Failed password for invalid user pdm from 118.89.115.224 port 35494 ssh2
Jun 20 19:50:40 inter-technics sshd[5473]: Invalid user ftptest from 118.89.115.224 port 59882
...
2020-06-21 02:13:01
162.243.138.34 attackspambots
firewall-block, port(s): 2379/tcp
2020-06-21 02:45:54
129.211.7.173 attackbotsspam
2020-06-20T18:17:24.076535shield sshd\[9570\]: Invalid user manage from 129.211.7.173 port 38520
2020-06-20T18:17:24.080165shield sshd\[9570\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.211.7.173
2020-06-20T18:17:26.090884shield sshd\[9570\]: Failed password for invalid user manage from 129.211.7.173 port 38520 ssh2
2020-06-20T18:20:16.321133shield sshd\[9893\]: Invalid user tor from 129.211.7.173 port 54808
2020-06-20T18:20:16.324609shield sshd\[9893\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.211.7.173
2020-06-21 02:33:08
37.49.224.106 attackspambots
2020-06-20 20:27:03 auth_plain authenticator failed for (User) [37.49.224.106]: 535 Incorrect authentication data (set_id=test@com.ua,)
2020-06-20 20:49:54 auth_plain authenticator failed for (User) [37.49.224.106]: 535 Incorrect authentication data (set_id=admin@com.ua,)
...
2020-06-21 02:28:20
138.68.237.12 attackspam
Jun 20 17:50:24 scw-6657dc sshd[12474]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.68.237.12
Jun 20 17:50:24 scw-6657dc sshd[12474]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.68.237.12
Jun 20 17:50:26 scw-6657dc sshd[12474]: Failed password for invalid user gcr from 138.68.237.12 port 42284 ssh2
...
2020-06-21 02:29:12
141.98.81.6 attackbotsspam
Jun 20 18:11:05 scw-6657dc sshd[13241]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=141.98.81.6
Jun 20 18:11:05 scw-6657dc sshd[13241]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=141.98.81.6
Jun 20 18:11:08 scw-6657dc sshd[13241]: Failed password for invalid user 1234 from 141.98.81.6 port 60026 ssh2
...
2020-06-21 02:16:16
222.186.173.183 attack
Unauthorised connection attempt detected at AUO FR1 NODE2. System is sshd. Protected by AUO Stack Web Application Firewall (WAF)
2020-06-21 02:05:22
167.99.51.203 attackbotsspam
Jun 20 19:46:27 prod4 sshd\[17727\]: Invalid user postgres from 167.99.51.203
Jun 20 19:46:28 prod4 sshd\[17727\]: Failed password for invalid user postgres from 167.99.51.203 port 34644 ssh2
Jun 20 19:50:46 prod4 sshd\[18849\]: Invalid user ts3user from 167.99.51.203
...
2020-06-21 02:10:11
103.149.194.12 attackbots
IN_Kavya Internet Services Pvt. Ltd._<177>1592675421 [1:2403498:58145] ET CINS Active Threat Intelligence Poor Reputation IP TCP group 100 [Classification: Misc Attack] [Priority: 2]:  {TCP} 103.149.194.12:1789
2020-06-21 02:34:34
204.156.180.113 attack
2020-06-20T20:01:23+0200 Failed SSH Authentication/Brute Force Attack.(Server 2)
2020-06-21 02:48:28

最近上报的IP列表

51.168.242.18 193.72.229.179 136.37.0.144 37.88.63.254
33.169.192.72 51.123.20.34 70.32.188.54 25.141.79.39
214.129.133.21 225.45.237.100 76.89.100.164 242.211.90.68
191.223.21.173 140.20.50.11 178.95.35.61 157.142.90.141
211.94.107.176 222.216.252.201 174.83.138.142 23.189.145.83