必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): United States

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 19.106.103.214
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 50881
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;19.106.103.214.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025121502 1800 900 604800 86400

;; Query time: 15 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Dec 16 12:21:05 CST 2025
;; MSG SIZE  rcvd: 107
HOST信息:
Host 214.103.106.19.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 214.103.106.19.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
79.8.196.108 attackspambots
Sep 22 02:43:02 firewall sshd[12300]: Invalid user sss from 79.8.196.108
Sep 22 02:43:03 firewall sshd[12300]: Failed password for invalid user sss from 79.8.196.108 port 62821 ssh2
Sep 22 02:49:32 firewall sshd[12497]: Invalid user test123 from 79.8.196.108
...
2020-09-22 13:49:44
209.105.243.145 attack
Sep 22 06:10:00 sip sshd[14770]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=209.105.243.145
Sep 22 06:10:02 sip sshd[14770]: Failed password for invalid user marvin from 209.105.243.145 port 51264 ssh2
Sep 22 06:21:29 sip sshd[17800]: Failed password for root from 209.105.243.145 port 40279 ssh2
2020-09-22 14:01:09
13.68.101.242 attackbots
IP 13.68.101.242 attacked honeypot on port: 3389 at 9/21/2020 10:03:00 AM
2020-09-22 14:04:10
115.97.83.124 attack
Port probing on unauthorized port 23
2020-09-22 14:11:09
151.80.41.64 attackbots
$f2bV_matches
2020-09-22 13:46:11
159.203.47.229 attackspambots
Brute-force general attack.
2020-09-22 13:55:09
60.20.87.56 attackbots
SP-Scan 40800:8080 detected 2020.09.21 02:50:20
blocked until 2020.11.09 18:53:07
2020-09-22 14:16:13
94.191.75.220 attack
Sep 22 07:55:45 serwer sshd\[8313\]: Invalid user hadoop from 94.191.75.220 port 58238
Sep 22 07:55:45 serwer sshd\[8313\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=94.191.75.220
Sep 22 07:55:46 serwer sshd\[8313\]: Failed password for invalid user hadoop from 94.191.75.220 port 58238 ssh2
...
2020-09-22 14:20:35
156.96.112.211 attack
"GET / HTTP/1.1"
2020-09-22 14:22:37
101.78.149.142 attackbotsspam
Sep 22 07:49:31 h1745522 sshd[22932]: Invalid user robin from 101.78.149.142 port 51956
Sep 22 07:49:31 h1745522 sshd[22932]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=101.78.149.142
Sep 22 07:49:31 h1745522 sshd[22932]: Invalid user robin from 101.78.149.142 port 51956
Sep 22 07:49:33 h1745522 sshd[22932]: Failed password for invalid user robin from 101.78.149.142 port 51956 ssh2
Sep 22 07:53:31 h1745522 sshd[23077]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=101.78.149.142  user=root
Sep 22 07:53:34 h1745522 sshd[23077]: Failed password for root from 101.78.149.142 port 34712 ssh2
Sep 22 07:57:50 h1745522 sshd[23278]: Invalid user mcserver from 101.78.149.142 port 45696
Sep 22 07:57:50 h1745522 sshd[23278]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=101.78.149.142
Sep 22 07:57:50 h1745522 sshd[23278]: Invalid user mcserver from 101.78.149.142 port 45
...
2020-09-22 14:08:26
36.92.134.59 attackspam
Cluster member 52.76.172.150 (SG/Singapore/-/Singapore/badguy.nocsupport.net/[AS16509 AMAZON-02]) said, TEMPDENY 36.92.134.59, Reason:[badguy php honeypot trigger]; Ports: *; Direction: in; Trigger: LF_CLUSTER; Logs:
2020-09-22 13:59:06
186.188.149.60 attackspambots
Sep 21 17:01:34 ssh2 sshd[36032]: Invalid user pi from 186.188.149.60 port 49458
Sep 21 17:01:34 ssh2 sshd[36032]: Failed password for invalid user pi from 186.188.149.60 port 49458 ssh2
Sep 21 17:01:35 ssh2 sshd[36032]: Connection closed by invalid user pi 186.188.149.60 port 49458 [preauth]
...
2020-09-22 14:21:42
91.210.168.76 attack
2020-09-21T21:18:21.182771abusebot-5.cloudsearch.cf sshd[9823]: Invalid user ruben from 91.210.168.76 port 38088
2020-09-21T21:18:21.190075abusebot-5.cloudsearch.cf sshd[9823]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=337490-ck61069.tmweb.ru
2020-09-21T21:18:21.182771abusebot-5.cloudsearch.cf sshd[9823]: Invalid user ruben from 91.210.168.76 port 38088
2020-09-21T21:18:23.026980abusebot-5.cloudsearch.cf sshd[9823]: Failed password for invalid user ruben from 91.210.168.76 port 38088 ssh2
2020-09-21T21:26:52.887340abusebot-5.cloudsearch.cf sshd[10061]: Invalid user mongodb from 91.210.168.76 port 36884
2020-09-21T21:26:52.894034abusebot-5.cloudsearch.cf sshd[10061]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=337490-ck61069.tmweb.ru
2020-09-21T21:26:52.887340abusebot-5.cloudsearch.cf sshd[10061]: Invalid user mongodb from 91.210.168.76 port 36884
2020-09-21T21:26:54.882034abusebot-5.cloudsearch.cf
...
2020-09-22 14:05:27
116.237.116.146 attackspam
Sep 22 05:04:15 rush sshd[22795]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=116.237.116.146
Sep 22 05:04:17 rush sshd[22795]: Failed password for invalid user testuser from 116.237.116.146 port 45230 ssh2
Sep 22 05:13:55 rush sshd[23048]: Failed password for root from 116.237.116.146 port 44558 ssh2
...
2020-09-22 13:48:18
128.199.156.25 attackbots
Sep 22 05:28:09 mail sshd[10489]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.199.156.25
2020-09-22 14:03:16

最近上报的IP列表

144.7.23.9 102.39.165.191 188.207.108.121 138.100.168.241
217.54.251.192 46.229.175.90 237.149.30.231 35.173.81.115
7.252.166.234 97.50.216.221 198.93.5.7 187.70.195.114
192.70.117.57 233.154.162.2 48.35.236.229 145.246.162.103
154.16.156.51 175.45.144.185 121.216.43.93 204.142.29.27